Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 14:40

General

  • Target

    26448a57b7f7c95b6377012e72e7435e.exe

  • Size

    907KB

  • MD5

    26448a57b7f7c95b6377012e72e7435e

  • SHA1

    eade749c2d735734f2a24a65093538190532cdb7

  • SHA256

    03c82c5e3c9fc1a0fa7721cdd316ec20f479d85912fdd20583d1da8940ed1f65

  • SHA512

    30d5390b3e31a61ce3cf6a0b3ec2eded4a0a1e2d6066c5cd1762adfbd49632dc45e835a8c54ecada868a9c6ceb01f6bf6910a4a62e344d9f9cfd820f9849be0d

  • SSDEEP

    24576:yRJz9Rw1h24B/9o8Su7X8W7D7gJfDxa/ZS1:yRJzHOh24BVqXC7y7xgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26448a57b7f7c95b6377012e72e7435e.exe
    "C:\Users\Admin\AppData\Local\Temp\26448a57b7f7c95b6377012e72e7435e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\26448a57b7f7c95b6377012e72e7435e.exe
      C:\Users\Admin\AppData\Local\Temp\26448a57b7f7c95b6377012e72e7435e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\26448a57b7f7c95b6377012e72e7435e.exe

    Filesize

    57KB

    MD5

    ea5e5feb6a38998a3a8b6a76c9b0a17c

    SHA1

    c1c01576a08855e4a0422e1b2fa1147db4fecf0d

    SHA256

    8a22a14e94df3ecf793d4fb01936e0c4cfc8f57f4b2a6ed15d36bf9905246e13

    SHA512

    659488ef9e41f515155ae72ed0508e722fda27344579017210ce5f53cdbf32773f497e8fbdada69c33e88698045474c01c236dfc04928da644d672dd4afdec39

  • C:\Users\Admin\AppData\Local\Temp\Cab5C45.tmp

    Filesize

    30KB

    MD5

    9e63d4089ae36534ed9a316e91786ee1

    SHA1

    8d059c6cdc60c0b4d68e7c1242a9f035f0594f4c

    SHA256

    4a0727df7678462775cf5fb5a19a881aa9e9fea77683de8d3002c26daf4243c5

    SHA512

    5f8965c9827749323849539fc7795af96ade695eabe24303abb8abbdaec5b1665753022e301956e0b8015640f2d062f432752a44e9a8e1cb0129c3e090f2911f

  • C:\Users\Admin\AppData\Local\Temp\Tar5C77.tmp

    Filesize

    25KB

    MD5

    347c3ec2ff96af7621a06e6fabfd8e15

    SHA1

    9e523678ca61f3b15916671f6631ea657b0bf2af

    SHA256

    a2bedbd45288cde32b8d1d0be276fe3627d736e4b42914a5201418dd73f96a09

    SHA512

    45903508856589761dc24e94538e4d03db8f289f4c721f728f126d28c754a461555ded14d9f150107fcc9bb690a4de4886fd7b198cfec768783ec494f8f1915c

  • \Users\Admin\AppData\Local\Temp\26448a57b7f7c95b6377012e72e7435e.exe

    Filesize

    188KB

    MD5

    50e5378abc7c3e0386894c29197ab18a

    SHA1

    7cd62b0ff07559d80d6f4e93b752e5146c65401f

    SHA256

    b21f46b7875695a03a9e1b87addbf11066f86e03bec8595063a07fbc9e33f95a

    SHA512

    880b86c190ec708dc7d18cad1b4009ae296359dda591139b8172da2aa4783e081493fd85e98ba2dbc5f8236a2a9e62206b90674ce87245dcd01be967d69bd4a3

  • memory/2476-14-0x0000000003360000-0x0000000003448000-memory.dmp

    Filesize

    928KB

  • memory/2476-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2476-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2476-2-0x00000000015B0000-0x0000000001698000-memory.dmp

    Filesize

    928KB

  • memory/2476-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2868-27-0x0000000002F30000-0x0000000002FEB000-memory.dmp

    Filesize

    748KB

  • memory/2868-22-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2868-20-0x00000000002A0000-0x0000000000388000-memory.dmp

    Filesize

    928KB

  • memory/2868-76-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2868-81-0x000000000EC00000-0x000000000EC98000-memory.dmp

    Filesize

    608KB