Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2023 08:07

General

  • Target

    tmp.exe

  • Size

    72KB

  • MD5

    ca24ecfb4ed0c1d4f6e2f9451943aa81

  • SHA1

    82efc58779cf1ba0736ecbffd35798e58e9658c3

  • SHA256

    87af3f03355baa7ed121958ee760ca52dbde2671532b582cc927f31eba6612ea

  • SHA512

    1522c4e421f98303e39d103a2d30a6ade398e2c804d6cd22a5e23b7abc23b4ffa8e340c5f2664e02dca18d809bb62d67c8ad60e15ce30a7bf5d8a23d59b39bcb

  • SSDEEP

    1536:0h168mCWXWnz3Fu/JzVTjhy4D/i4i+wpsTa+Cq45ijI3BBxfZ:SLmCWmnZuxzVxye/iIa+Cqu3Bh

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:2264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:2020
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
            PID:2068
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            2⤵
              PID:2544
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              2⤵
                PID:1932

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              bf8b05b9524118ca91a734fb10dd9291

              SHA1

              a3b1306df15ed984f55fca690ec4061402a7cbb1

              SHA256

              242e6ca87f41bec238f75c1bbe84eb887cf4659574f1467d76c6dcf652af055b

              SHA512

              25c3be6016c6365e296563b2b457c534a83f766e694d00cff58b22e233d35dfe07e739d1620c00b5fdae39d2e2743bec6f543ee8d60e720f80d3b6c7e7362b85

            • C:\Users\Admin\AppData\Local\Temp\Cab6338.tmp

              Filesize

              61KB

              MD5

              f3441b8572aae8801c04f3060b550443

              SHA1

              4ef0a35436125d6821831ef36c28ffaf196cda15

              SHA256

              6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

              SHA512

              5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

            • C:\Users\Admin\AppData\Local\Temp\Tar63D7.tmp

              Filesize

              163KB

              MD5

              9441737383d21192400eca82fda910ec

              SHA1

              725e0d606a4fc9ba44aa8ffde65bed15e65367e4

              SHA256

              bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

              SHA512

              7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

            • memory/1948-0-0x0000000000E40000-0x0000000000E56000-memory.dmp

              Filesize

              88KB

            • memory/1948-1-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

              Filesize

              9.9MB

            • memory/1948-2-0x000000001AE80000-0x000000001AF00000-memory.dmp

              Filesize

              512KB

            • memory/1948-3-0x00000000002F0000-0x00000000002FA000-memory.dmp

              Filesize

              40KB

            • memory/1948-75-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

              Filesize

              9.9MB