Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 14:13

General

  • Target

    24856092cf8647e938815ab78e278652.exe

  • Size

    169KB

  • MD5

    24856092cf8647e938815ab78e278652

  • SHA1

    5d2946f464199b12de54d3096e91694087241dfa

  • SHA256

    b52ac4937ab4b385b664c920f4e9b540cea1cb7db56c55083caa1dec76e60d18

  • SHA512

    7910fb0aa80fca4f5dae073a3b03b634f191a5371e1b4a93107d5eddb732481ebb3f010eb769a950d7f39d372b1c0db3c134c052bab20431cc3a4c44f09e9850

  • SSDEEP

    3072:XDpsmfqe2XjhNbP4N4QQ5GvhJJ3kOB5333:SmybzhctzJJ3T533

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24856092cf8647e938815ab78e278652.exe
    "C:\Users\Admin\AppData\Local\Temp\24856092cf8647e938815ab78e278652.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43a785742ad3b0cc9fa71ecc92a7a0a4

    SHA1

    e21a50fe98423c917aa78ad5f0ab95da11964536

    SHA256

    d0841bb838e7d52de51ef21dd90a43ddaff3873dc5f94b4b84302272f29e510d

    SHA512

    02d1b9345616c54edd628cb80dbdbba038a220d805cfe1660538fa4665af9659aa712959e855c53365b947f95da4276f52aef8b5631c137efb4abd1f4e07a953

  • C:\Users\Admin\AppData\Local\Temp\CabFF86.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar35.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2420-0-0x0000000000FB0000-0x0000000000FE4000-memory.dmp

    Filesize

    208KB

  • memory/2420-1-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2420-2-0x0000000000140000-0x0000000000146000-memory.dmp

    Filesize

    24KB

  • memory/2420-3-0x00000000002E0000-0x0000000000306000-memory.dmp

    Filesize

    152KB

  • memory/2420-4-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2420-5-0x000000001B040000-0x000000001B0C0000-memory.dmp

    Filesize

    512KB

  • memory/2420-67-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2420-68-0x000000001B040000-0x000000001B0C0000-memory.dmp

    Filesize

    512KB

  • memory/2420-87-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

    Filesize

    9.9MB