Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 22:34

General

  • Target

    408355a0a90beebb6637719830b41ee5.exe

  • Size

    186KB

  • MD5

    408355a0a90beebb6637719830b41ee5

  • SHA1

    2d479e6e65c53e5615c8420aee9309c5bea108e0

  • SHA256

    2159bfb9b83d80708a9b4a81666ff2ac76c82c4d50dc94c02086e9383a8df958

  • SHA512

    a18fb0fe9dfb2b4d1435300c5c31fd3a5faa55b0c90e2e84b1e7aaa9fb5680a707e3989279240d3b67d81ebb63a26b3b84f06095989aabe82e9435f6ebea93cd

  • SSDEEP

    3072:7X7DItrfaocyTgfsqQOlJGa/UCAVa7zpBYQar3FT6rPxlivJE1uAKvsNLIkcZCsc:7saocyLCG8AVa7YL1eLxYO1DKUNL6N7g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\408355a0a90beebb6637719830b41ee5.exe
    "C:\Users\Admin\AppData\Local\Temp\408355a0a90beebb6637719830b41ee5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\nsyA7E.tmp\inst.exe
      C:\Users\Admin\AppData\Local\Temp\nsyA7E.tmp\inst.exe 519ccf03-7d58-4734-a488-45e35bc06f2f.exe /dT131650040S1541849476 /e8012553 /t1541849476 /u519ccf03-7d58-4734-a488-45e35bc06f2f
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\nsyA7E.tmp\519ccf03-7d58-4734-a488-45e35bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsyA7E.tmp\519ccf03-7d58-4734-a488-45e35bc06f2f.exe" /dT131650040S1541849476 /e8012553 /t1541849476 /u519ccf03-7d58-4734-a488-45e35bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab1B11.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1B24.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\nsyA7E.tmp\inst.exe

    Filesize

    93KB

    MD5

    f55fe54a1932d53798484d5fb039bccd

    SHA1

    25f5a7bfb741a1528a9e33d96a7cebb1a5d4fbc7

    SHA256

    14da9145437cebe945a074a8b0482f441ea2295ae9202a7c5ecbd9b03b8331b5

    SHA512

    aea7819359c3bc8eb23757674852809d1a769e81d594473b54a3a99e50d5bdc124ea88fb1e3d3128bac7755e56a79cb9c6a7c411283d5e9228869d278de6867f

  • \Users\Admin\AppData\Local\Temp\nsyA7E.tmp\inst.exe

    Filesize

    144KB

    MD5

    6c13897aac76495646cb21a0f3026459

    SHA1

    3b852f19dfe1efc220356abce7b99a491cc44e3a

    SHA256

    174d6c4705673cfbd506f0cb916a766dd4e1a45f3ba1b124d4cda16fcd66582c

    SHA512

    93ca87000dc1ec560f153da999f7489b3a856ded0653e981667bc5a2af7f4f4a886a3f982c6e2db05351668bf8fc20f80d8a27591e49f4d9bc20a11a260d8051

  • \Users\Admin\AppData\Local\Temp\nsyA7E.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/2520-20-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

    Filesize

    9.6MB

  • memory/2520-21-0x00000000002D0000-0x0000000000350000-memory.dmp

    Filesize

    512KB

  • memory/2520-71-0x00000000002D0000-0x0000000000350000-memory.dmp

    Filesize

    512KB

  • memory/2520-78-0x000007FEF57A0000-0x000007FEF613D000-memory.dmp

    Filesize

    9.6MB

  • memory/2520-70-0x0000000002050000-0x0000000002070000-memory.dmp

    Filesize

    128KB

  • memory/2884-99-0x00000000009C0000-0x0000000000A00000-memory.dmp

    Filesize

    256KB

  • memory/2884-98-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/2884-79-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/2884-101-0x00000000009C0000-0x0000000000A00000-memory.dmp

    Filesize

    256KB

  • memory/2884-100-0x00000000009C0000-0x0000000000A00000-memory.dmp

    Filesize

    256KB

  • memory/2884-102-0x00000000009C0000-0x0000000000A00000-memory.dmp

    Filesize

    256KB

  • memory/2884-103-0x00000000009C0000-0x0000000000A00000-memory.dmp

    Filesize

    256KB

  • memory/2884-104-0x0000000006430000-0x0000000006530000-memory.dmp

    Filesize

    1024KB

  • memory/2884-105-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/2896-97-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB