Analysis

  • max time kernel
    173s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 02:45

General

  • Target

    fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc.exe

  • Size

    1.3MB

  • MD5

    b1a8871d431a77b73848b37a191fc4a1

  • SHA1

    67b63ab96f954fd20a962be472a22f4d703d2a75

  • SHA256

    fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc

  • SHA512

    c6bf8acc716cdc55d89441e44caf6eea00db1cd8c50e14f0bbf1955b324313707cd4b2629b86f19c3bb9cf3f413c7d75d390aa531f17c1cd72c8ef2041286c6f

  • SSDEEP

    24576:L8EvQaj/4D80cuEgesvILa/2IATCBPr0Bxv2cW1BZyaPDSVXT5X:4Exj/4D8duEgRvd2k4R2cWx1sXT5X

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc.exe
    "C:\Users\Admin\AppData\Local\Temp\fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aaa9d73071ff8e5a2d57560026a8257b

    SHA1

    e7ab015f82a0fddda8a776d5761053c66f9782dd

    SHA256

    4322e74f1df1c2911f66c8cf83d6742be096576578873107b32909e5cce0310c

    SHA512

    174ed5664708941dffb83c34f01882665cf6a491b252457a922a1a41ffdbe7658f53d1050f51f235ad4e50d3c6ec5528e8d3b3f7b7757633693937b34d4f55a0

  • C:\Users\Admin\AppData\Local\Temp\Cab927.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA14.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2760-5-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-2-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-6-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-7-0x0000000000510000-0x000000000051A000-memory.dmp

    Filesize

    40KB

  • memory/2760-9-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-8-0x0000000000510000-0x000000000051A000-memory.dmp

    Filesize

    40KB

  • memory/2760-13-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-14-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-4-0x000007FEF50C0000-0x000007FEF5AAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-1-0x000007FEF50C0000-0x000007FEF5AAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-3-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-0-0x0000000000440000-0x0000000000474000-memory.dmp

    Filesize

    208KB

  • memory/2760-149-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-150-0x0000000000510000-0x000000000051A000-memory.dmp

    Filesize

    40KB

  • memory/2760-151-0x0000000000510000-0x000000000051A000-memory.dmp

    Filesize

    40KB

  • memory/2760-152-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2760-153-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB