Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 13:17

General

  • Target

    9e026042beea2469af4b31301fe94a72.exe

  • Size

    2.0MB

  • MD5

    9e026042beea2469af4b31301fe94a72

  • SHA1

    7363a0224c9d4498952cbd8c122f7729837e2bbb

  • SHA256

    50956c28d06ae321e79482964bce864bb07c552241017cb152a69c8078fea18c

  • SHA512

    e28861396f6d0f274fbad21ca382dc0a7b039a3a5370f1cc12ef12b61d6b7f2561bd45535666c225f1b368542d0815ffe4abbfa9a6b5c732760234d4e948a690

  • SSDEEP

    49152:2Syg4ubqAus098gygLHgpoQnB+UU6agyg:UgVMsk8oQnfU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e026042beea2469af4b31301fe94a72.exe
    "C:\Users\Admin\AppData\Local\Temp\9e026042beea2469af4b31301fe94a72.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Users\Admin\AppData\Local\Temp\9e026042beea2469af4b31301fe94a72.exe
      C:\Users\Admin\AppData\Local\Temp\9e026042beea2469af4b31301fe94a72.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    33KB

    MD5

    bc0f45cee150425394443d7926a3f291

    SHA1

    59345c01eaac60ef0e837ed5b9a91b192b50d7b5

    SHA256

    1480d3221568f78a2a097ee528862182efe52850d3c1c9856a6adf9a83fdb2fb

    SHA512

    086ac66bb338d8df910791d4c81597505ab803942d4ac3189bc5ae31dc8576032c5beffafb04bee3d3f1da80b68ae233bf0e439179492b433515fb0fe2d4ae97

  • C:\Users\Admin\AppData\Local\Temp\9e026042beea2469af4b31301fe94a72.exe

    Filesize

    119KB

    MD5

    30335c27c394273a0bee8bd8eb0c9c1b

    SHA1

    3d22a288c226c2d7fd7a4c8682e09c8079880456

    SHA256

    d192b1b1932fe44d4025e048ca601707cebfe6d919bd97d486f0e58eef30d2d2

    SHA512

    318337eec23b5cc39d1d0331fcd843b02d71db7ac608f376992b4642bafffe3e2429d0cf7c5f51e70d8bba47f2b2bc441e2fb0acaa67e546b53570559ee9cf5b

  • \Users\Admin\AppData\Local\Temp\9e026042beea2469af4b31301fe94a72.exe

    Filesize

    74KB

    MD5

    cdd813f8fa8ac7964932e00da59fa124

    SHA1

    21c1a44b535f35ae1bf99e380e97a99f6649bc7b

    SHA256

    df2ccb2f1a49dac8a8e4887c5893e486e77095f1b513e3544e174a4470071759

    SHA512

    0e045955d8d2ddc31d06fc8a0fbafcb62a38fc5329f6837f2ec5495a11aca6c9273475fb1146b2ebca78294316e1750c9e323127d5a2a19fe5af18f6138c95ce

  • memory/888-0-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/888-8-0x0000000002F30000-0x000000000303D000-memory.dmp

    Filesize

    1.1MB

  • memory/888-7-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/2356-11-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/2356-13-0x0000000002E20000-0x0000000002F2D000-memory.dmp

    Filesize

    1.1MB

  • memory/2356-10-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/2356-70-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2356-75-0x0000000007680000-0x0000000007723000-memory.dmp

    Filesize

    652KB