Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2023 18:18

General

  • Target

    2c79656a7e494a4c42267f4d521f37ab2fb60098a46840ad919e74bd58caab13.exe

  • Size

    1.9MB

  • MD5

    18743b35880606a7bb66f5e8cc4eba57

  • SHA1

    9a05b938f535086d3cc501123dd62d2dc1e05e2e

  • SHA256

    2c79656a7e494a4c42267f4d521f37ab2fb60098a46840ad919e74bd58caab13

  • SHA512

    2832423a5ed036c55dcad809b05af1b9b1ede94cb2cad8409d023bd7b962eba575eebd45c807d370fc02b2045821298b5bba5c4ed9eb8eb2edae7beb993fa79b

  • SSDEEP

    49152:HeeKdmQ4AhDw2Y9K9m9Nx7mN0XT5XZ44I1:nWDpY9/x7miD5JzI1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c79656a7e494a4c42267f4d521f37ab2fb60098a46840ad919e74bd58caab13.exe
    "C:\Users\Admin\AppData\Local\Temp\2c79656a7e494a4c42267f4d521f37ab2fb60098a46840ad919e74bd58caab13.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b6c692fc6568ae041bccc386d0d040b

    SHA1

    d5752474b0710c89ba5cd72d0c77168813109499

    SHA256

    eaa3aa970217098dc77ebc2ed67556bf78da73a9aaea73e49a1496c6be497ea1

    SHA512

    2f8c5dc982294b035713419c118a81523b21dc4931a8a2774129dc49cddc9341b883efb52e38c5a9da56dac658e88dd333bdbfb22a1b675e27e248d6219ac5e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5be1f39cc701d976d1f1da05e2617a65

    SHA1

    be89d03444a19ce2eb4a36eedb0af9733dca836d

    SHA256

    4fd1e91cf4a520a0df392aaf0cc3c2dab59778d4151b59f3e81e000f6a6a4cdb

    SHA512

    232188e780de24c68db887e16a1d077bf4fe3dc7ba5e9602ef762d4be595c24ec090a4fa5764f9ae7d4174bc7656f895329eaa2b20893e026aad1af6438608e1

  • C:\Users\Admin\AppData\Local\Temp\Cab16DB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1C6B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1920-2-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/1920-4-0x0000000002090000-0x000000000209A000-memory.dmp

    Filesize

    40KB

  • memory/1920-10-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/1920-0-0x0000000001FF0000-0x0000000002024000-memory.dmp

    Filesize

    208KB

  • memory/1920-5-0x0000000002090000-0x000000000209A000-memory.dmp

    Filesize

    40KB

  • memory/1920-6-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/1920-3-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/1920-1-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

    Filesize

    9.9MB

  • memory/1920-152-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

    Filesize

    9.9MB

  • memory/1920-153-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/1920-154-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/1920-155-0x0000000002090000-0x000000000209A000-memory.dmp

    Filesize

    40KB

  • memory/1920-156-0x0000000002090000-0x000000000209A000-memory.dmp

    Filesize

    40KB