Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 01:23

General

  • Target

    203756f969ef6db28a792f24566642c3.exe

  • Size

    96KB

  • MD5

    203756f969ef6db28a792f24566642c3

  • SHA1

    b5f504c24a07de14f4136876e7392fa400a1df4d

  • SHA256

    5c4e65fec6657caef68eb006819e1ad1fde846f6c233b8b9a6ddbecccfdb5df9

  • SHA512

    de93088115515a643752e90c357a3962d446e6f50ee47dfc24c9d1267b278284d350bf7c98aba5e043bf41854c3d75efc61a0ce4c378de00f73fedfa218b12be

  • SSDEEP

    1536:DomALFDs+Kg2ORhfPe5lEA2CgnufjuUwfisAqBMh89CFMV2yaVUGz/:EmAe8/IlEA2Cgg1GisLBp9CEMUe/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\203756f969ef6db28a792f24566642c3.exe
    "C:\Users\Admin\AppData\Local\Temp\203756f969ef6db28a792f24566642c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\203756f969ef6db28a792f24566642c3.exe
      C:\Users\Admin\AppData\Local\Temp\203756f969ef6db28a792f24566642c3.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Roaming\taskhost.exe
        C:\Users\Admin\AppData\Roaming\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Users\Admin\AppData\Roaming\taskhost.exe
          C:\Users\Admin\AppData\Roaming\taskhost.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    7KB

    MD5

    5da20b844c34cda2b83a71b13db09cc4

    SHA1

    69e6d745c078011b171356b1257806a6e6bd1cfe

    SHA256

    6556af10ea7818bee690b6e39844a2ddc3a42bff4cf27434584de666ef7e459b

    SHA512

    f2686a91185d8500ee47df031a996e8143d3fd994283c9792e5992870e5cf67003dafdfd74694ac9f358b1e843fc93d34a559c6ba226ac4744f628f3115b4415

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    e934ecb9247e54275ce8a41e96d3be75

    SHA1

    155d32f5cf9e25039576d25d41bbbcb9873356f5

    SHA256

    9d2c47e8e55b20f0c29f6d3430a6c7c7a1ee5db55f7be3bf97326ab1c8046bee

    SHA512

    280e816e3feb5abe35edeea1b4d6f195d98f89a076ce7df87f6e41c80acacdbea202567d81aa1a1e7b4484966388ac40fdf6564455f5c1015e31722a10582aaf

  • C:\Users\Admin\AppData\Local\Temp\Tar76EA.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Roaming\taskhost.exe

    Filesize

    96KB

    MD5

    dc72fc708276ec90bc5b0a720cf7bd66

    SHA1

    430e659c75db35ce10ab645911275326998635c6

    SHA256

    f585ba5f371a9bc5a433c05a268485cbd12f5d2ea58cae1a33193b59ef32f9f1

    SHA512

    c72d6c13416f0600030c71988615f3c6713fac1d2effd0b6af06e9514536f01c341d78643e4e77b7eb090d7c57fa9c0f150b6ec4834b17a7804672bd35422ca5

  • memory/848-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/848-161-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2944-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2944-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2944-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2944-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2944-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB