Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2023 06:20

General

  • Target

    ffb8b8c36012a6ddbb4ab91c9b2d9f64c280feffe2a2bd5d3ca536cea6b697b8.exe

  • Size

    2.0MB

  • MD5

    b7c3d07dd8c327f76763c4df0cc7018c

  • SHA1

    ac8b0daf52382c711836cbe00081a6584d7b5f4c

  • SHA256

    ffb8b8c36012a6ddbb4ab91c9b2d9f64c280feffe2a2bd5d3ca536cea6b697b8

  • SHA512

    c4b46878d93ac86e514bbf5323f42446a0b27c1c86fca8b55fca37efc92bb9136fa54f9554a9445686b96dfa3859438c671cb9841f82c21b175bd61cc881e0dd

  • SSDEEP

    49152:hHTpmAOOpc+PNsnlhYH3fPBCaWbWOSwXarJ/Z97CVExD2DWdkXCo+Yo3S:hVmAOOpc+P2hYHvPBCadOSwXarJ/Z9vr

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffb8b8c36012a6ddbb4ab91c9b2d9f64c280feffe2a2bd5d3ca536cea6b697b8.exe
    "C:\Users\Admin\AppData\Local\Temp\ffb8b8c36012a6ddbb4ab91c9b2d9f64c280feffe2a2bd5d3ca536cea6b697b8.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d25cef789f4def9aa7cf59c5e36dd822

    SHA1

    df772bd8de9ad89facf3cb53444e8b490713d11d

    SHA256

    403fe63f62f029f02a3dab23dfd756ce1cfbb98249770a113f54d4caaa2f076a

    SHA512

    35a5230180dc66d1d88a5eb56f4ec8b44c733dcf2d1e60a491f7adcceefaeb6c4d2fef00b7ad25c7b110531a3ecd73bdc2aac7771703c258aa89295814ceaf71

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\27V93E5X\f57cf0f1-5ca5-4808-b9e5-807335416626[5].png

    Filesize

    1KB

    MD5

    04cc33828e63eff5e06e73bd6dcb9176

    SHA1

    7ccdf8b895af29b73a66a9f32dee8f9541246752

    SHA256

    e26f5d01debd760ea0a1da2538db9e40a20f0357d816a757418a30208f74204a

    SHA512

    d859bb0aaf3d22960324851325bd1b61482ed38f178dd56f5d6e2c91d5ae3b50385b7395c132204a69b8ddd427828d2f1a012f85b73ce0f7580e1974bce57f33

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2SBOE92S\f57cf0f1-5ca5-4808-b9e5-807335416626[2].png

    Filesize

    1KB

    MD5

    9bfe363d3a4b348e587ceb34d0579365

    SHA1

    a01471e2bfb6d269b66a58bdab4e641d94746b7b

    SHA256

    624e6234c37d0eaa5a59263c0a2514113ebed9516c729175b3682758f1bc8f2c

    SHA512

    4596e34c05c0c028d14ed542d31b84a5b9c04af1902f8a3c5df4934a6559707a36369b170a742e20bee4272d444327c7fbfb2e6ed3d821f4a76297869b32471e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2SBOE92S\f57cf0f1-5ca5-4808-b9e5-807335416626[7].png

    Filesize

    1KB

    MD5

    cf923f4aac869b4a52e53a39949cd7dc

    SHA1

    3d5e09a2cec758251770c09ea62109f3c47134ab

    SHA256

    6b024edbb975539e1822ebad694a2eb25bba6840eadf11eac2999eb372ec270f

    SHA512

    c1835f1b3336c5662316b6b1ba0825d238ace0712d48e1ef2f2947aee74d7d93c498b32b44bc365470cb21037bbae68b0dd9632fc30ddc129d8b89360688606e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2SBOE92S\f57cf0f1-5ca5-4808-b9e5-807335416626[9].png

    Filesize

    1KB

    MD5

    78fee84248dc0979b32d9ee6e51b69c5

    SHA1

    4a485f0666c0ad908150029acbcb8900d0e1aec9

    SHA256

    3f2dea2fdddc3269df4cdcd8f031421ffef2db05d3f004767500986fcd391cbe

    SHA512

    368c84c830769257e3e7fc3d3bc760479f78686a56fa641b2a0e7abbb15f997005afb12e8dc5c542427e533f3ba3c7b6275779aeed49f83844ada91421b55ceb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJKHGHKT\f57cf0f1-5ca5-4808-b9e5-807335416626[4].png

    Filesize

    1KB

    MD5

    daed380708a6c939bcd7c1055d93fcc4

    SHA1

    8fbb8a1cbca12be037da899d072928cfc95ba6fc

    SHA256

    ee417809e675fe95fe4808f164e26f7453661e60a60f2398f505094d1dd1da14

    SHA512

    1427f51348dbe16f1548dbac26d2c5002a88cf7d9070a9fd07ca6507f2832cc8ab377aad0d7710c6b7aaa2cddf38142b73e447660015e9cddb0b70e28585c98a

  • C:\Users\Admin\AppData\Local\Temp\Cab3C57.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar3D53.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2012-184-0x0000000007CF0000-0x0000000007D10000-memory.dmp

    Filesize

    128KB

  • memory/2012-185-0x0000000007CF0000-0x0000000007D10000-memory.dmp

    Filesize

    128KB

  • memory/2012-200-0x0000000007CF0000-0x0000000007D10000-memory.dmp

    Filesize

    128KB