Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 14:59

General

  • Target

    2787c519f3535fac5d66a9bd9be51542.exe

  • Size

    420KB

  • MD5

    2787c519f3535fac5d66a9bd9be51542

  • SHA1

    6b3a06ee269fde86371b3d57707fa2a126dff81b

  • SHA256

    a4c60e4b6b2413f71f7c264a0931678a27744b6549f115ae822a17324c3ba065

  • SHA512

    a7944c00f4bccc229e4c6fa470d722957ed57c5f44c534087c697e1483563f960d99ed17a7fd30ff85f9955931f79f89f579836e2cc2b1333cfbf51d7b007b99

  • SSDEEP

    12288:uwaA3t7VPRw+8cOSQN2jyGFyFjISvfsJJa/oSdb:hpbw+8cze/jL4U7b

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2787c519f3535fac5d66a9bd9be51542.exe
    "C:\Users\Admin\AppData\Local\Temp\2787c519f3535fac5d66a9bd9be51542.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71ee8ff06253846c73c7b8047747e975

    SHA1

    7af749f04697c4c7474caffc9afc79650a7d4940

    SHA256

    3074eb3795d4aac092413804b9946c5fb3bbf771c448d1bd425f935ad7edefac

    SHA512

    b824f6fda95a31de338e704b666ac68aec59551eadb1cc0f6563756a2e7f6743c27fe580849a3a7ae982b4cb7e63e0ac03a5567e03789b7c349b140cbccacf95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e917aa8722c5fe5b36e1c43abd4ee43

    SHA1

    b5788a04feb8d311c1c15dae2dc7159314a1e562

    SHA256

    bfbc3407984e130923f6469d3e668b3e5ca81553edec3abefd9d0f6a3f23e0ff

    SHA512

    13f82d446280d4844e6876e4ce8c864760570c0aa669fd07ef9c9472f2942e576ec43b104d799cbab35e6c3b33a34b5ca5995edc9c83ce402e7cab1f02f17f70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2811d1e6d6f60dff6a7cf10dd9aed83

    SHA1

    fbe41f78906ff780f9bbcc1b7038c57d494bc571

    SHA256

    5ae134a99a1eb4cb2a8c88b9fcafa4d7871f29cb2c7c12ad0e7bf915b9976ea4

    SHA512

    edbae03ada89ede0ffa71427e786abeaf815f9043cfce4e11b14142ac8cbcf2784dd934f7e88ca88b2cb2b2dd4edbb2c91d51aa86335f7b18ddd2ba631d45c83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    075443836bc3258f97dca34842bbdf21

    SHA1

    d02d51248861425d722c4973ac6ddabee9a72b7a

    SHA256

    60dbb6f04ea49a79da739743cb64bbae4906e537de90dc302d54a26752f8854d

    SHA512

    4d2c0784b2ab90cbac44b1f9ebfea117df459ca311f9bc75340edafd42eb663be1f856bc196c8d2ddb293132cc5f12df295c6dcb58a1bd9146e9a9b9db46f849

  • C:\Users\Admin\AppData\Local\Temp\Cab9B29.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9CE0.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\2787c519f3535fac5d66a9bd9be51542.data

    Filesize

    912B

    MD5

    4287a8ecfb14b596fc8addc66fd627ef

    SHA1

    b934ca132738cf410fe2b962ff6e5f32cce10d9b

    SHA256

    3b960b44ebc5b40ccc72ffe12434fe94e6ad5c9e35db14dbf8d22d9d559f611b

    SHA512

    e07b6ed3b76a2df959388f438a768589ab968682a6ad0ddbc9b56914462c7ae50e9ee82738cb6211fcf06b15684a1b139c0fa19daf86d92b2606de7a8161ad7f

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\2787c519f3535fac5d66a9bd9be51542.htm

    Filesize

    87KB

    MD5

    2290e78ddaffaa73838e9a67d679cbc7

    SHA1

    5e2583a2c5bad107c82cab2a495d559e1385ae41

    SHA256

    ca6005b88259d61bfc9943b1236cd4f6f12833f3134a3c1553545247d95aca2d

    SHA512

    a2c6ae503b264e30925c685efb6389175138fb809989d5e4c61e62345662c0d7a6e0de57c6a8f883209c7bf613c6be3fb4ca2031876d562271c8b111ad338abc

  • memory/2168-0-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/2168-221-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB