Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 10:04

General

  • Target

    65cf4d9b8942262c739ac51a15afd5e2.exe

  • Size

    907KB

  • MD5

    65cf4d9b8942262c739ac51a15afd5e2

  • SHA1

    f6a42e9c42f66de210cd1c05d29da76d7d88ce5f

  • SHA256

    2b081e543491e3dacd3ee3b823ab485a6ee7d0b5ea1f272a1755ca7b104ec4ad

  • SHA512

    c0b7f47c9140a99189e7b94ac221fb4ed996cf9aa62b4a13c2323905a12288c65b1e5448de3e8405ccbe4ad445bad6168d55e5723230e8f4b7da97553e63710a

  • SSDEEP

    12288:QPs8l6E8n913mJMpeQrpz9eGNaK7W4xsOjpNIr3Q1xyIkjVDa/ZS1:QE8kKMp3p5eWWjOjbQQoa/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe
    C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:2864
  • C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe
    "C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe

    Filesize

    382KB

    MD5

    d01bf38f38fd41e6ea023366bb6e7d44

    SHA1

    f8a2255567e842a025b59eb8744d3af12ad6c352

    SHA256

    f3802cb535ce70e369fa2da7a700c511702181d7e33a8678bdddaeb752090b9b

    SHA512

    66cae3fda532989bce1d7aa294fe2b319ad2802a2545f521980123384f9d086051cce0e6b984207134f5aec16d207ce54efe3db85a5b0e6f6cacb83c1a975534

  • \Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe

    Filesize

    893KB

    MD5

    28a02af10d3324a7a40e2cf837b8e70c

    SHA1

    9ccc7bc3bd5b84630dd1c6f33bb31db16d701a92

    SHA256

    c1f3a7763f5da0f3901eec2ede7d5d8be03b0433ee2b80e00bb8caeeed5fedbf

    SHA512

    65f0ed8837e50b66d1ff0cab58c7558a5d1ee309995e518f6915884d73c90b0ace78b7748084bb99dbaa4cf66b2573c7dbb4e76148227cf5adcbe40a11be352d

  • memory/2076-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2076-3-0x0000000000270000-0x0000000000358000-memory.dmp

    Filesize

    928KB

  • memory/2076-15-0x0000000003280000-0x0000000003368000-memory.dmp

    Filesize

    928KB

  • memory/2076-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2076-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2864-20-0x0000000000290000-0x0000000000378000-memory.dmp

    Filesize

    928KB

  • memory/2864-24-0x0000000002F40000-0x0000000002FFB000-memory.dmp

    Filesize

    748KB

  • memory/2864-23-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2864-17-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2864-77-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2864-79-0x000000000D8F0000-0x000000000D988000-memory.dmp

    Filesize

    608KB