Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2023 20:00

General

  • Target

    f31c1587e95ca26a03d4b0609925750c4a55cbfd4b302324c9a2e030e589ac73.exe

  • Size

    1.7MB

  • MD5

    100c7080888f38bb0fa57d3380b0c9dc

  • SHA1

    1b791a5b09e883f388ab06f56a22823743ab483a

  • SHA256

    f31c1587e95ca26a03d4b0609925750c4a55cbfd4b302324c9a2e030e589ac73

  • SHA512

    7ac3c8bde8282a92bdba737211c5caf70d9949045e7f1e03d4afb0b9c8aec38d0fb695de7fad8bf0ed394a955f144642f5ba1b855613b6437da3c75cb49c76a9

  • SSDEEP

    24576:u2QpUGbjXOnUxvF6FxoP0E8/7jKeRZMZPjyN4DSVXT5Xf5qqya:u2EbYUx96FxNEA7jL4WN9XT5XRv1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f31c1587e95ca26a03d4b0609925750c4a55cbfd4b302324c9a2e030e589ac73.exe
    "C:\Users\Admin\AppData\Local\Temp\f31c1587e95ca26a03d4b0609925750c4a55cbfd4b302324c9a2e030e589ac73.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee89f2549b22ccc844863a46ae2bca60

    SHA1

    456d69d35a470e834ef35fc294d5ad2491584abe

    SHA256

    04c6eda9f273a1469592f190c9d20d75e001d1d4a83ec58095debbce27baecb7

    SHA512

    f3ca757924f4ff5b65e4fa55afb6f035f303f5c779d6f55057324b0d40dd13fdc7a3c4164c6e78b7a0566fc0005f79cd84e886be4d2a20197c6785fe08bebbfc

  • C:\Users\Admin\AppData\Local\Temp\Cab5717.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar5866.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2016-3-0x0000000002720000-0x00000000027A0000-memory.dmp

    Filesize

    512KB

  • memory/2016-5-0x0000000001DB0000-0x0000000001DBA000-memory.dmp

    Filesize

    40KB

  • memory/2016-4-0x0000000001DB0000-0x0000000001DBA000-memory.dmp

    Filesize

    40KB

  • memory/2016-10-0x0000000002720000-0x00000000027A0000-memory.dmp

    Filesize

    512KB

  • memory/2016-6-0x0000000002720000-0x00000000027A0000-memory.dmp

    Filesize

    512KB

  • memory/2016-0-0x0000000001D60000-0x0000000001D94000-memory.dmp

    Filesize

    208KB

  • memory/2016-2-0x0000000002720000-0x00000000027A0000-memory.dmp

    Filesize

    512KB

  • memory/2016-1-0x000007FEF5470000-0x000007FEF5E5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2016-157-0x000007FEF5470000-0x000007FEF5E5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2016-158-0x0000000002720000-0x00000000027A0000-memory.dmp

    Filesize

    512KB

  • memory/2016-159-0x0000000001DB0000-0x0000000001DBA000-memory.dmp

    Filesize

    40KB