Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 20:11

General

  • Target

    100f5e90a9eb220b32e50b778c57c2dd.exe

  • Size

    771KB

  • MD5

    100f5e90a9eb220b32e50b778c57c2dd

  • SHA1

    b9d9c78e2b747f6fc869af1cfe41c0cddd74265e

  • SHA256

    accb3a4a93d260cb167ebea88920f4a57c1164808e744b9e156a5b35f835b096

  • SHA512

    d1af51a5e7ec2b200ba43a5d764f5658da4fbe9a7046c6d01e41e0ae40ed03245babaa8f4833af5c03aaecba218fc2385aa77c616bdedd9bc3f3899b8cc92ba9

  • SSDEEP

    12288:w18myemDer514dJ0+Fpg5F9FK9vWb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:mNyDSr514H65aOb10hJaothZ2/T6FBBB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe
    "C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe
      C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe

    Filesize

    35KB

    MD5

    8f043905e0d5263ecd8aeb96cdb0c76c

    SHA1

    f04649d51141adbb3de993464455e05bc5b2406a

    SHA256

    debf4115367c92d873f45dd00cdf04857d2282f4fb665cf134ff66bc2602fe42

    SHA512

    581c6ef4b6d1fad60136c3af0b930fbdd52236b0e06026b349cae0db4311aba0ab83b239a3a39775e822b9ae474438a20a0df3f963a9f223f1f38f8ab32effda

  • C:\Users\Admin\AppData\Local\Temp\Tar126D.tmp

    Filesize

    85KB

    MD5

    b4336c27a81019626050e233f1835df4

    SHA1

    cf7ecdc18c67841389711f678febca40f48d64a0

    SHA256

    74c2bc3b14e0d0c9d712c1a90630523eaddceb4c401848b8a2b0ef725c232998

    SHA512

    9f7c6952de25e40df3f9cda4fd7fcbd333e5a8066dc0c1b106b15c7ff5731a9129619ecd32fb44be4b620ce9eea4c7a8294c3402b7dbc405e190d1d57c01c79b

  • \Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe

    Filesize

    64KB

    MD5

    f6ac13bb9f6bfe8dbadb262c78d4270a

    SHA1

    9757cc630158c6f4fb27ffcb8ed978b44d69cdba

    SHA256

    903b4b60f2ad8e7d841e89a6ed3dcffea6f33a7863904dd7e77c62c79e25afde

    SHA512

    b237ec54feaf9f9358971050e6c3ad26d7fe98e55c5fe1b00201a610dc9c0549303ada09407e8e8ca5d0fed7f67fa0ab4376877c42c301d3105e255c3cb73961

  • memory/1376-29-0x0000000000320000-0x000000000037F000-memory.dmp

    Filesize

    380KB

  • memory/1376-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1376-20-0x0000000000270000-0x00000000002D6000-memory.dmp

    Filesize

    408KB

  • memory/1376-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1376-87-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1376-17-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1376-88-0x000000000A6C0000-0x000000000A6FC000-memory.dmp

    Filesize

    240KB

  • memory/2888-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2888-2-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2888-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2888-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2888-15-0x0000000000240000-0x00000000002A6000-memory.dmp

    Filesize

    408KB