Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 09:42

General

  • Target

    9a1398c315bc339f6ac805d876ca41f32821c090fe52af0b21a085f7fbc59512.exe

  • Size

    1.6MB

  • MD5

    95a4175919ccb7d52d6b6230d408dc15

  • SHA1

    1d1c03dd2c3fcadbbc8c1edb8b5852045632eaa8

  • SHA256

    9a1398c315bc339f6ac805d876ca41f32821c090fe52af0b21a085f7fbc59512

  • SHA512

    7c2d3a4a438bff34ac4cb735478541f742ddcbdf447e12ebcf2969c3eea5df1e67daa2d0a6cbd5b7a0c8f8dc0f02e96ff5ec1efb257b092657921a9fd949e23f

  • SSDEEP

    49152:a72LIF0ZXXJx75R4hr+dz5ErX9kcJIEXT5XVlE1:WxqHf7P6rqz5u9kS9D5Y1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a1398c315bc339f6ac805d876ca41f32821c090fe52af0b21a085f7fbc59512.exe
    "C:\Users\Admin\AppData\Local\Temp\9a1398c315bc339f6ac805d876ca41f32821c090fe52af0b21a085f7fbc59512.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc2eddda6fd7ce586f98add3daacda8b

    SHA1

    6dd2626b809fe89bce8f9e62c6cd8430fea59fee

    SHA256

    6ecd7fc194d1879484f07c1260f5caab08c56eae4eff5de0202e1f6c639c585a

    SHA512

    22af49c869b395bc29859225ab14a57877ad1f59c2693bd35e3cff3c0c5d179ce0f498ef49a8d96b5fe4b978a8e2dbd9167e54f614bd01136ac35ec7f28e062d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c10930c77f978462d92417a2d74ad64

    SHA1

    15abe04e32cfe22677762fab2ced553a5077f0ad

    SHA256

    e73fab4241ea8c817b904a9bfe51b88ff542cbbf8e0d641918338b77581a1eb5

    SHA512

    21259739e01ff4e0ab88721d618ee89acbf308599c41866c945550359e478cd10b2ea5235f38399bf396350196e6360ff68d9f3ff60d583aa319900dc776a60c

  • C:\Users\Admin\AppData\Local\Temp\Cab93AA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar94B6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2964-4-0x0000000000170000-0x000000000017A000-memory.dmp

    Filesize

    40KB

  • memory/2964-5-0x0000000000170000-0x000000000017A000-memory.dmp

    Filesize

    40KB

  • memory/2964-6-0x000000001AF80000-0x000000001B000000-memory.dmp

    Filesize

    512KB

  • memory/2964-10-0x000000001AF80000-0x000000001B000000-memory.dmp

    Filesize

    512KB

  • memory/2964-0-0x0000000000390000-0x00000000003C4000-memory.dmp

    Filesize

    208KB

  • memory/2964-3-0x000000001AF80000-0x000000001B000000-memory.dmp

    Filesize

    512KB

  • memory/2964-2-0x000000001AF80000-0x000000001B000000-memory.dmp

    Filesize

    512KB

  • memory/2964-1-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2964-116-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2964-117-0x000000001AF80000-0x000000001B000000-memory.dmp

    Filesize

    512KB

  • memory/2964-118-0x0000000000170000-0x000000000017A000-memory.dmp

    Filesize

    40KB

  • memory/2964-119-0x0000000000170000-0x000000000017A000-memory.dmp

    Filesize

    40KB