Analysis

  • max time kernel
    142s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 02:31

General

  • Target

    lego-digital-designer-4.3.12-installer_F-Pq0i1.exe

  • Size

    1.7MB

  • MD5

    9402ecd688bb22ae501ee75565e15b4d

  • SHA1

    5671c2706b73f9a68c20a8b41702e9fd161ae240

  • SHA256

    34278d6fd8874bc12cd7498ded79852c87219e7d5d9ca75facfa3deb98089f36

  • SHA512

    f43256d5e52750269679f95311fb097c555f92c0e61779f29e2a2d4dbc55c91c8dbb8fad8ecf5c0643ce650b7e85053d065a1f5779b3a463868a2fa92e294ec0

  • SSDEEP

    24576:C4nXubIQGyxbPV0db26WKas4/Xnna2AVFwCGRjICE2lfWW0qXgoW1zSB:Cqe3f6mson6fNCNltv

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 14 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lego-digital-designer-4.3.12-installer_F-Pq0i1.exe
    "C:\Users\Admin\AppData\Local\Temp\lego-digital-designer-4.3.12-installer_F-Pq0i1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\is-91G2T.tmp\lego-digital-designer-4.3.12-installer_F-Pq0i1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-91G2T.tmp\lego-digital-designer-4.3.12-installer_F-Pq0i1.tmp" /SL5="$400F4,836075,831488,C:\Users\Admin\AppData\Local\Temp\lego-digital-designer-4.3.12-installer_F-Pq0i1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87dfb2244594ce6d256c1c87f660c5f4

    SHA1

    4db2dc35909fe4281c87266fccccbc5a856ea6ed

    SHA256

    93d3b5edb49e3932ee868e63dac2aa8f5182fe1cd22ff266e71674add664b401

    SHA512

    442787b15bea22e3341ae1446eb07d02b6c52acb0c168c90f55ede16c33887f8895a3aea632579389ab577e9df19047a233363c501229742c434e9f5c11e98f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b6f4f3af1320c034b29a8b100b93ac1

    SHA1

    70cadf4df2e4c91bd95ac15711f5aa5bd1b0d124

    SHA256

    c1e8c534f05a0087e81813b9f01b6818803f7ff897a7ae1d79959b47a8e3f334

    SHA512

    fed541473a45b7436c84fdc10ce96d4748713b00b08b0e800c3928f09f3944cd0d379459a5b54870fb5134c27d3cab3d9d3049d60ae956a1e5f6fe9881bd175a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72dacdd4723cde59d6e61bfb57155699

    SHA1

    f610b6326afe9a08de1289410b60d922e74974b4

    SHA256

    3cc085cea430b69325858c9001a0887391eb2bccedf6c6cb42dcd40d7bbc663a

    SHA512

    310fc47577958798412ae1e17d039e22a2a613c66fcc50efa6385131cb9fb8b874f75302affdb07528afcd04619d32b608bc2ed540c2d306ce74a7db2a1bb096

  • C:\Users\Admin\AppData\Local\Temp\Cab9BD4.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar9C06.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\is-7NPF4.tmp\mainlogo.jpg

    Filesize

    3KB

    MD5

    c1704c2a421783c1a4bb84c55def232a

    SHA1

    38f83ba3cb79843aba8bccdc795dbe954ba05e82

    SHA256

    204a2e0a54d3f13a339457ec4e6f37b8ec0ed2378579f436b809f3dc51822b4a

    SHA512

    20659fd265d1b406cd3ebf36a3dd2616806934ac4b2f9aa10fbea3a35dd278d1c1382d45753cbb5e312b3efe047aeea47d53a995b68fe6ee3a5136ede97d144e

  • C:\Users\Admin\AppData\Local\Temp\is-91G2T.tmp\lego-digital-designer-4.3.12-installer_F-Pq0i1.tmp

    Filesize

    3.1MB

    MD5

    c8c4d20b0a603fd1e0a2ea304fa05721

    SHA1

    608cd0a7e122682c6f0a0622accc2a6cc23b6c4d

    SHA256

    c1e0bf25484a1dacced5e782f6fa50c4994fbfd026f3a901ae93601eeaca921c

    SHA512

    e0f6226d280c221da8b5902629b9e29ec09dd1c311eba28ad739b3eee44f57608a3d276ca5740a7687106ea905ee12d40fd0983be8bc20daa8ff45d0834d766d

  • \Users\Admin\AppData\Local\Temp\is-91G2T.tmp\lego-digital-designer-4.3.12-installer_F-Pq0i1.tmp

    Filesize

    3.1MB

    MD5

    c8c4d20b0a603fd1e0a2ea304fa05721

    SHA1

    608cd0a7e122682c6f0a0622accc2a6cc23b6c4d

    SHA256

    c1e0bf25484a1dacced5e782f6fa50c4994fbfd026f3a901ae93601eeaca921c

    SHA512

    e0f6226d280c221da8b5902629b9e29ec09dd1c311eba28ad739b3eee44f57608a3d276ca5740a7687106ea905ee12d40fd0983be8bc20daa8ff45d0834d766d

  • memory/1040-1-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1040-10-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2612-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2612-127-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/2612-13-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2612-12-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/2612-201-0x0000000003380000-0x00000000034C0000-memory.dmp

    Filesize

    1.2MB

  • memory/2612-202-0x0000000003380000-0x00000000034C0000-memory.dmp

    Filesize

    1.2MB

  • memory/2612-204-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/2612-205-0x0000000003380000-0x00000000034C0000-memory.dmp

    Filesize

    1.2MB