Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:54

General

  • Target

    3978339928bca196f94ae79e9d8e502b.exe

  • Size

    225KB

  • MD5

    3978339928bca196f94ae79e9d8e502b

  • SHA1

    91d4568f41de48369643041e60e66d4f27f97e7d

  • SHA256

    14c1aa261944e5900b5ea78bd309049216e775f42f6047fd680beadbf0f6ee5c

  • SHA512

    1d33d162b741101112f53eaed8c05dabf61e3ba51b9b35bf8764fcca2e77f6c5f6e4181e2bc28e553b249ccd91b796b22e2a57624f5d85a7fa06fa51966f51ad

  • SSDEEP

    3072:o26Yt5uz0CLDtkQv1I3PiwhjKlZP23kPhN45b1xId82AoSQ8:jpt0b9l1I3qGji20Pj45bMrAoS9

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3978339928bca196f94ae79e9d8e502b.exe
    "C:\Users\Admin\AppData\Local\Temp\3978339928bca196f94ae79e9d8e502b.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies system certificate store
    PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    64KB

    MD5

    1c0d843720b6fb3873bd0fc916a89e5c

    SHA1

    a14128ef31457b4fa6fdcb7db0b24fdb98ba2d70

    SHA256

    4e48f95db599ce1acd840b8924d2219ce174f164eee2900bbed2c45ae00d83f9

    SHA512

    7a16e30a613ea2a56ebffaa874bd91cd941557ab2c49b93ef41d3f5f1dfd89a81e6af3abc9e40b46769e00f1b233c63e4014ac68dad4381f5e690e5f02be8a14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f3675972291f7d436eaaaa5e0e33688

    SHA1

    06318f576b67913a71f3653ca4650fcf641b8ab4

    SHA256

    b9182d7f89d862087e18e46e966c4413c4aee3dd3782b1290c9f53fd685853cf

    SHA512

    cd31ea504ffb3ba6e31a2dd371140c08730cb9ccbf013a95818c1c4a428492e53222ac8b5295339b1b4e7345c26b47dcb920a48b5f0d3e82d9d97b92e425f024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    cadb6be2c6fd6160fac8136c27ffba21

    SHA1

    a2452fae43260824d27c58ac1ee82a94fc9378cb

    SHA256

    4003dc276a221ca137ecb2d86b3e32dfbdbbf3e72d17630a9902b3f479240de0

    SHA512

    7678836efb11efec908b6e943d978a24986bb2717eb7f813bf9ec2d088b11d8c13c52b85e9d84d786f270b374d7348eaf935dce0eafdff68ed0f7946c2f96db6

  • C:\Users\Admin\AppData\Local\Temp\Tar4723.tmp

    Filesize

    96KB

    MD5

    6fabd34d7f1bfff66fbf47fba0d0a130

    SHA1

    84d1914fb41894c2e1d383778ec54655826ab193

    SHA256

    2f44e127b3fd289c37f7fcd9f7db281a8413a22611b211c8ef2b6d3da5bb1580

    SHA512

    ae15752ca91f19167369f2c67570e78b6118ad3e87d1a235b72e59a6d1b6cf30918552af5750fd8383bd6860e45877caab14f51ab3556240026bb705b1882ad2

  • memory/1724-4-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

    Filesize

    4KB

  • memory/1724-1-0x0000000000ED0000-0x0000000000EF0000-memory.dmp

    Filesize

    128KB

  • memory/1724-18-0x0000000000ED0000-0x0000000000EF0000-memory.dmp

    Filesize

    128KB

  • memory/1724-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1724-2-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1724-3-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1724-10-0x0000000000ED0000-0x0000000000EF0000-memory.dmp

    Filesize

    128KB

  • memory/1724-5-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1724-6-0x0000000000F10000-0x0000000000F3F000-memory.dmp

    Filesize

    188KB