Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 17:28

General

  • Target

    088952a633a391914d077b3113b15063.exe

  • Size

    331KB

  • MD5

    088952a633a391914d077b3113b15063

  • SHA1

    14fa95d1ece1ef96746eb2f4d04673b0a56323e7

  • SHA256

    239da45fc8a7a9884c9a950f42dae25cf90711c3733c5eb33274861646ac4cb1

  • SHA512

    6c256b2300df77e6b9cc5ff0d2bc1e21f3b5be07750d1dbaaa4acc346573fe65729526fd5489e159a6a3ff343828d97127d142c355f488b7543fa22fee8ca5be

  • SSDEEP

    6144:bmp5IBr4WYcFIgpRL00AIPB72s9UYJ1dMvh:boeuXc3bL00AIPh2s51dMp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\088952a633a391914d077b3113b15063.exe
    "C:\Users\Admin\AppData\Local\Temp\088952a633a391914d077b3113b15063.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\ProgramData\EpicScale\EpicScale.exe
      "C:\ProgramData\EpicScale\EpicScale.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\EpicScale\EpicScale.exe

    Filesize

    331KB

    MD5

    088952a633a391914d077b3113b15063

    SHA1

    14fa95d1ece1ef96746eb2f4d04673b0a56323e7

    SHA256

    239da45fc8a7a9884c9a950f42dae25cf90711c3733c5eb33274861646ac4cb1

    SHA512

    6c256b2300df77e6b9cc5ff0d2bc1e21f3b5be07750d1dbaaa4acc346573fe65729526fd5489e159a6a3ff343828d97127d142c355f488b7543fa22fee8ca5be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1DE0551C14AAEC69FC037864EE3882EF

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1DE0551C14AAEC69FC037864EE3882EF

    Filesize

    422B

    MD5

    b873d8708476dd1d2af0e49e29255719

    SHA1

    5cee30c8d68826b2e3752890bc775e5d2311106b

    SHA256

    d193a747a8d6e66c273350d6a7cccd4ac53c0a4e9a35adbc633c7b8ce7647ad5

    SHA512

    14b4de443d362d9f9dfbf1face3c2279cea6079bf637625d8b66fa47ea860fe5786c51efbe4d731ed9c0c49333363abcc3801c138c5a6e84bd656901414d2750

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1DE0551C14AAEC69FC037864EE3882EF

    Filesize

    422B

    MD5

    352c9c86e1355fa5bf204441e220ef3d

    SHA1

    fed6154619363b26f069f7f748f78e41a5caf06b

    SHA256

    ea19c80bfa1cea1aae70b6dc9c36fde76457bddde57cc39dad01979c78990a8d

    SHA512

    1f2a8ac4d5eeb1487e24abe9e9034419fb3e9c1f30743650d1a1edc87eae0cd8eb56cab9036b8a25e8218dcbb19c008adb1ee54fd5d647d04f9ea1370f042117

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1DE0551C14AAEC69FC037864EE3882EF

    Filesize

    422B

    MD5

    e2f0066a25e08bfb8a0b3380ccbee943

    SHA1

    39af3ba12a3e6091b4a1dc9925ed4f6d59648422

    SHA256

    0fc2426d4546d668c15492438433d61910b18471e5606ed426e956b7a5d521cb

    SHA512

    975eef7e777d44227c47304243d4c95898976222074eacfc292df70c10c3d194c83ec72a706c37cc7797a5ab76a42e4be3f22bd7eefa9dfbbcfe8121307b4e60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b53e92c97956eb068162d16ae64613fa

    SHA1

    9a32f27247120a564b9057c5f9de6f1ea2c7427d

    SHA256

    33f18e4856e913df92dccecb942177dcacaaedb58b898c43bea1cc40dad9ba85

    SHA512

    48f8a118311b52c725b097925b1db55946b7325a0a3866b76c767392734c4af5d0352ab24a1ef489a4d7ff938c5d6399fff1c5ea9a41ec1205ba13f41fffc8c0

  • C:\Users\Admin\AppData\Local\Temp\Cab541B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar56CC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06