Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2023 08:06

General

  • Target

    beb66b8f21479fc070be2171457266868ce74b2180ebec3a294971e83d820765.exe

  • Size

    1.3MB

  • MD5

    482439d7b222bc33a12dab37630a3620

  • SHA1

    29d733f496f18459c3683116dcb0be5286e7ab7a

  • SHA256

    beb66b8f21479fc070be2171457266868ce74b2180ebec3a294971e83d820765

  • SHA512

    6dbefb83b04b691c0361918d3d37fa60b9716a17550b6f437f2d7816a2b453a2774f03a820d29e4ed20d0bd294c86957044fa27db1dd8deaa3f909535702a1a6

  • SSDEEP

    24576:lAzdnRfOQMgv6YgYyQoYt/5vDSVXT5XLU1ioWuya:WhnRfOQMgiYlMXT5XL01

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beb66b8f21479fc070be2171457266868ce74b2180ebec3a294971e83d820765.exe
    "C:\Users\Admin\AppData\Local\Temp\beb66b8f21479fc070be2171457266868ce74b2180ebec3a294971e83d820765.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31d1d72f7d9da144ec34b6dc054df1fd

    SHA1

    fa905cfd1e8f97c5f38e2a2d129b230905f49d85

    SHA256

    ac3645a44418e6c8ca67dd64ae411290c80824f923df85421ac36ad1e9437920

    SHA512

    cd554f3961e39238634ca4f03e24ac30ee262fc0268ddf960c75d529df796ab28ced820465e44e1248d5d10b7c7036dbea4dbbe3bc039b8588bdf9d7ef45e2de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7918d5a2aa5d0c93667727d498fa18b

    SHA1

    e35eac231cdc9f6b3344c1b2068bd12e3cc9af7f

    SHA256

    147aa9815097881535cd61efdcf59bb99a2f78e9b6f3fa74392ea760fa8eb977

    SHA512

    66884a7f56dfad8391b5e072ea44d886d52d0533bd3f895ce7c800a0f0e152d0963963dd8a9a35fbbaa6e836616c8f7daf23fd78c03787d8b64eb34e69f14ae3

  • C:\Users\Admin\AppData\Local\FLiNGTrainer\TrainerSettings.ini

    Filesize

    37B

    MD5

    a733986b23235e9df2ed8652044f4718

    SHA1

    a6b37ab6584096eee4e0bb79013773eb752bfe83

    SHA256

    e34c9e06cdd656e5b901c1eedd6d28aa595ceebd80e3c585218980fbd5a9c473

    SHA512

    635f58eed8f3af8e3b167b9b7825589e17f2aa638449961a11c4c54538c8d262fca7a35001dc3bd1a86aabe7030ddd03e66757aa6b3882ae7c8f99c8aa3389c6

  • C:\Users\Admin\AppData\Local\Temp\CabAFD1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarB11C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/1448-3-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1448-6-0x000007FEF5740000-0x000007FEF612C000-memory.dmp

    Filesize

    9.9MB

  • memory/1448-10-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1448-5-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1448-4-0x0000000001C40000-0x0000000001C4A000-memory.dmp

    Filesize

    40KB

  • memory/1448-0-0x0000000001C00000-0x0000000001C34000-memory.dmp

    Filesize

    208KB

  • memory/1448-2-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1448-1-0x000007FEF5740000-0x000007FEF612C000-memory.dmp

    Filesize

    9.9MB

  • memory/1448-139-0x0000000001C40000-0x0000000001C4A000-memory.dmp

    Filesize

    40KB

  • memory/1448-140-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB