Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2023 11:07

General

  • Target

    09e2bed9f8e2b5211157c6d9b326e1b6cb02b103acb74ac5bfd020c20a8f33d2.exe

  • Size

    1.3MB

  • MD5

    d9859e9eebc0aff762570ed16bab695e

  • SHA1

    99642074ac1fd217bbf481c60d91f3b6d362beb7

  • SHA256

    09e2bed9f8e2b5211157c6d9b326e1b6cb02b103acb74ac5bfd020c20a8f33d2

  • SHA512

    e4bc9ddeb862f686be0df83c8bfb3d4192352b5bb2ac29b7ff0e61b327e8889cbdfb0749bc13476b90011888512e214372368290356f1df32573b1a92270db20

  • SSDEEP

    24576:w7JeIlrXu6oaYtM0ZZ44i68yhhIvgrQL7DSVXT5Xyhya:oJhlrXcaKMGZAyhRvXT5X01

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09e2bed9f8e2b5211157c6d9b326e1b6cb02b103acb74ac5bfd020c20a8f33d2.exe
    "C:\Users\Admin\AppData\Local\Temp\09e2bed9f8e2b5211157c6d9b326e1b6cb02b103acb74ac5bfd020c20a8f33d2.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb3792edb3e7544c69e2cf86878faf91

    SHA1

    aded2e17f4a2b1e0da27afb9d2f5ac1601984996

    SHA256

    a49b3a12ad59fbf39dec5c96f1cac1185c1639953167ed2cefd1f160a1a468c2

    SHA512

    418a53af0318ae065ab219fe39b9a438c962a588115530070e1c4561bf33321da2fb6c85268fd02e307f2ce7e5e590fa49ea4ca4654e2871d14eebc812794538

  • C:\Users\Admin\AppData\Local\Temp\Cab167F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar171E.tmp

    Filesize

    168KB

    MD5

    dc0ae51669e77e6fabf485034fd6df0e

    SHA1

    22d9e961bf308bd444b4f3e2ab15de556b509fac

    SHA256

    27c99076d338e39f88aef948dac1bd542f7532af052a1876ae770a2c82bad3b1

    SHA512

    030da1e1d22c4bb9bfc950e1f7bdeb8889c94b1acfd4ddbf31897f27bee40c0104ffd300c5b335e923d120225676ac0fe057b35bb0cfc650e2b33ea55a5abdf3

  • memory/1732-3-0x000000001B220000-0x000000001B2A0000-memory.dmp

    Filesize

    512KB

  • memory/1732-6-0x000000001B220000-0x000000001B2A0000-memory.dmp

    Filesize

    512KB

  • memory/1732-5-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/1732-4-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/1732-10-0x000000001B220000-0x000000001B2A0000-memory.dmp

    Filesize

    512KB

  • memory/1732-0-0x00000000002C0000-0x00000000002F4000-memory.dmp

    Filesize

    208KB

  • memory/1732-2-0x000000001B220000-0x000000001B2A0000-memory.dmp

    Filesize

    512KB

  • memory/1732-1-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1732-91-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1732-92-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/1732-93-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB