Analysis

  • max time kernel
    14s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 14:43

General

  • Target

    01e5b2c1bddb597755e111f4efd03115.exe

  • Size

    219KB

  • MD5

    01e5b2c1bddb597755e111f4efd03115

  • SHA1

    68dfa689aeb32efbb16f59a6c6408e216e861206

  • SHA256

    2369aa411275192c5f1c7d23a3aa7cc49fe0ca3d290a839ff3111a5ff2407cb2

  • SHA512

    492774b870ba6060f6ea8ab7fa00dbec6f8225db11b87c00b8948fbd7ac6af7ae680dc7cb1078ab183e505695fa718c442193e9538969e326bb2fd86c8886edc

  • SSDEEP

    3072:b+QcAga9e/QQr14TBbxBRtJkZTyU7n6QYSblFw1RZPDD4XCR5NvZVRKDb:lcR714TBdBRbkUUrNbzw1HPQXCfNbRKH

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e5b2c1bddb597755e111f4efd03115.exe
    "C:\Users\Admin\AppData\Local\Temp\01e5b2c1bddb597755e111f4efd03115.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies system certificate store
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    39KB

    MD5

    bd351014e8c13a5dc500c400bdda35f4

    SHA1

    ed95ea40b5cf4670c2d8bd3a5ff065cfbf5f9bcb

    SHA256

    56daf34543d973f53f190d69c560b780bc632b0098911329634999b8d00213cc

    SHA512

    6f1834379caaed89960ecc5d39102846f6bb6a7bf5ffba8f8fdcfe608d1fa8f6a32f3378030ed34746975f5cbbcea58e18e9f8a060f90f56bfd220e2e9de5e3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e784b39251ff982c72d0f741b6a9ab87

    SHA1

    2f549549d5799c518242b098eb6f9c4a8fad3f12

    SHA256

    aa9e2ea103f2752b091805a7820a2c4158c5cc609de587b4db6ccf94200e219d

    SHA512

    a6c56344f903794e1736787a1256f1894ca0de5b33dbcbc8a322bbcd2c1d1442473cc3bd56cf90c0beeb4a58109c37304758ae599993af08a44be8d27fa28fab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    2d275f4f63468d4bb07533bbf7af43ae

    SHA1

    0e5b62196f16f46accec83eee82bd87b6a2195a4

    SHA256

    489ab6e5c4528cc8e754ebd52791de31f3968721dc21a0f5d5bf573ba9594849

    SHA512

    997de318843d752bd2c7388ec9da5b663b425582712802e22ab649d23ebfd0383efad51d181d7f0f0510163a73888c9d9bf5a7d2fa7eff306930180041ad0fd1

  • C:\Users\Admin\AppData\Local\Temp\Tar5037.tmp

    Filesize

    36KB

    MD5

    ec9441f2e1af5b927705fa6be5e7462c

    SHA1

    7604f7c926703fa90fe042a2ec4db36bada86c42

    SHA256

    cbe963e1ad53636274641f16a5a0b19b9ef1dc4a3f07f28d3dc3bf41ae98a18d

    SHA512

    5255d46931722683147939ad5fb3443d683ccaf5a552b793981ebb84376d726b9dc29a039a3b7c7ebb904560dec16ab9e568b83cbe507f277d899c7f042298bc

  • memory/1736-4-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1736-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1736-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1736-17-0x0000000000110000-0x0000000000130000-memory.dmp

    Filesize

    128KB

  • memory/1736-2-0x0000000000110000-0x0000000000130000-memory.dmp

    Filesize

    128KB

  • memory/1736-3-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1736-5-0x0000000000150000-0x000000000017F000-memory.dmp

    Filesize

    188KB

  • memory/1736-9-0x0000000000110000-0x0000000000130000-memory.dmp

    Filesize

    128KB