Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 23:07

General

  • Target

    1829db9dd223bd0390cfc507bead31b0.exe

  • Size

    385KB

  • MD5

    1829db9dd223bd0390cfc507bead31b0

  • SHA1

    39ddeed90db08111c27eaf65486c07412f1e820b

  • SHA256

    d3f1cdfe04d3606bde308f8d53dc57370a0ff1ac15bdbeea44b402a159f62fad

  • SHA512

    ba73b98477777fcc2c36d5928344eac57ff084795d69b779b2445e9e4012e3adc608b3138d406e95cba00e7de948d29b978e68c284aca1dc320f55a470332d36

  • SSDEEP

    6144:vgRtBh91WZln6WTG0YLfNnEKiLrTGyd2r6Ye/eKgxblxTCHtM3XtUb1B:vGtPTYULfNE/T5F2xblxei9Ub1B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe
    C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:3004
  • C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe
    "C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe

    Filesize

    385KB

    MD5

    a70286296d227d4474dcd453c7edf357

    SHA1

    2bd1c26530d8f6827390eac7ecaf4d1e486f36b7

    SHA256

    c4772aebbfaa9d41e060f9c313566610aabc7a5392cbbcccf81a67cd12fb2710

    SHA512

    12429fa4606e12a97a7671e0d07d130c63b3644568facecff5753c0d7641e26e1fe95722c5cc785ac214cc6f6ee276bdba40001be65f20752810d5aaad69cb5a

  • C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe

    Filesize

    93KB

    MD5

    489fdffd76c9f4819702b5a66114eb90

    SHA1

    136eff82d197cd5e2df24659fd2c75dafafc4daa

    SHA256

    bddddc592cc699ba2113d1eb900dfb67d6a8a6cb21c839569709d067f5a6e8b6

    SHA512

    170c2bf5994da7647b5d9b2f127ae7c0306c4870ae1e98f6d10673c8f48486658b8edf49d4c538789414c8ceea6434cdb1470474ad1bbbc5835ebd9783897c16

  • C:\Users\Admin\AppData\Local\Temp\Tar1E7E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe

    Filesize

    98KB

    MD5

    92c314e573df86b70c9baa7a9425d14b

    SHA1

    712a3dd653b6892b1e9d0de7d9f7afebcfb8c45b

    SHA256

    5564e2ede0bfc7bd893c0a6f23f3bcd315da65c72e3707cb775a2d94972f4fc6

    SHA512

    c753379698e7093bbbfce78f5c536890c0c783dfbc9e065614bf1db56560c4d92cde3af7380fb84a5429ab00c1353f990f99dc6d2d7fa08a3a6e3d9473cfc645

  • memory/2924-16-0x0000000002CC0000-0x0000000002D26000-memory.dmp

    Filesize

    408KB

  • memory/2924-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2924-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2924-2-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2924-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3004-19-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3004-21-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/3004-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3004-29-0x00000000003A0000-0x00000000003FF000-memory.dmp

    Filesize

    380KB

  • memory/3004-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3004-87-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3004-88-0x0000000005570000-0x00000000055AC000-memory.dmp

    Filesize

    240KB