Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 21:05

General

  • Target

    125241a8d5cc28ee0b3f9791cc85c399.exe

  • Size

    77KB

  • MD5

    125241a8d5cc28ee0b3f9791cc85c399

  • SHA1

    dcbbfd5be91ca2b0f2bcf59b5f88fc2ec7dc459c

  • SHA256

    ddb3f082fde21210c3d20257a9dc3ee23b853c61c40ee6a098f88ee788e91037

  • SHA512

    2c1f986ed02bee55fea52924993c44eecc6f858fd86de1e350e21da0bbab26a48c8a679c92f3c9ee0c1a4774d4219631eb5c305e02d392d946230e3c309f49aa

  • SSDEEP

    1536:bj9W9lp1+SLYUyw9o49anhnxwrYBa2uERbDbD5cw:bEbpd8UFoCgDwrOjDbD5d

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\125241a8d5cc28ee0b3f9791cc85c399.exe
    "C:\Users\Admin\AppData\Local\Temp\125241a8d5cc28ee0b3f9791cc85c399.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\go[1].htm

    Filesize

    287B

    MD5

    3fcad8a84d8d2a9fc395b9108ac96b89

    SHA1

    3b167f0a849577cb57df59b9fcbfbacf5d18227b

    SHA256

    a814adb185d2bb3fbd046ece9f2b26e4e6c7832290115581d2b23c8adc79203a

    SHA512

    3b9a813a991f6b417b6d8acedad5d031b6f3b15084a7e8981a38b00890cb6a9f2700c7ae331795ac032ff8706aeda0f6c86befdf19bb99a5d1b79e057e01ce80

  • C:\Users\Admin\AppData\Local\Temp\CabD29D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarD2DE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2284-1-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2284-0-0x00000000002A0000-0x00000000002B9000-memory.dmp

    Filesize

    100KB

  • memory/2284-2-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2284-43-0x00000000002A0000-0x00000000002B9000-memory.dmp

    Filesize

    100KB

  • memory/2284-44-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2284-111-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2284-110-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB