Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2023 10:01

General

  • Target

    1f65e4a559b6ca5bca255e34914d2a16.exe

  • Size

    1.2MB

  • MD5

    1f65e4a559b6ca5bca255e34914d2a16

  • SHA1

    35177abc3c3b2d8bde1e5fb5b91223d9f9a80d96

  • SHA256

    de49d99aca6f263329701def3789f4844cec7b66eada3ecdfc122d91a061beed

  • SHA512

    44c0560fd0fb995a07a4bda63bdc45184048c42038cd79a314949640353951862c511cdd8ff7f1b0c4c7bc1fce677124f9ef6c289893c0c534f65737aaf1cd8c

  • SSDEEP

    12288:aG3LBPOWjgduS18IFGL55r8eHwN6hKNCoJn1jZMPBP6IVmtQFLkw8tBKyp/DH2DS:hBry8IFQL8x8C1QOw8tBJtHaSlYITb26

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f65e4a559b6ca5bca255e34914d2a16.exe
    "C:\Users\Admin\AppData\Local\Temp\1f65e4a559b6ca5bca255e34914d2a16.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a827456bfd281eb57501b89fced74e1f

    SHA1

    2dccf7962c1227bb6185b6c3df232a5ebc054afc

    SHA256

    d68070a44d18a940d6f4d7e6f66692387311a41aa5692e041ccffbffbb8cfa60

    SHA512

    0de56af03ce1441f6e5ba7de05abcb05507deb0be60c2babadcb3cb00ad911bda6435e5628547783092a532868021988e38823408a083edcc58924458bb4daee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    887888637354d2cdb34ac48b7d2d8580

    SHA1

    db488bd2550948ad1c05e3e9b40ece4839f7d073

    SHA256

    534fd4bd93a8009b1d43ecc8b5e8a6652c65cc166108edd3dd5b1d747e1fdd15

    SHA512

    83a7df6c946e2f390c55b4af6151ae9bb76dfbc703df9881332494c9a83d19fea74c0a5516b7230ef7a12e09d3c030431348dbe074759fed0759acd4020be2bf

  • C:\Users\Admin\AppData\Local\Temp\Cab3F44.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar3FA4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf