Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:45

General

  • Target

    6f7af1594a7a71e1d117466f09caa604.exe

  • Size

    1.6MB

  • MD5

    6f7af1594a7a71e1d117466f09caa604

  • SHA1

    6497c9e98fc894a3aaf7c552ed7d9f89c3e4c40c

  • SHA256

    d14342b832e0db5f8dd8f130f5419e9cbea4f62247dcd01202938dc31ea6b312

  • SHA512

    6b3e37a52803e171a78a130e039e286d0492dcc0b5076d7d795421058b1c1cfec89d94cf81017b5b4339e9cffcbe2c7dcfba5ccee9a363627f77d212efc12fdd

  • SSDEEP

    49152:hZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9:hGIjR1Oh0T

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f7af1594a7a71e1d117466f09caa604.exe
    "C:\Users\Admin\AppData\Local\Temp\6f7af1594a7a71e1d117466f09caa604.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\6932.bat" "C:\Users\Admin\AppData\Local\Temp\E61682F798C74326BA24B4372F368F1C\""
      2⤵
        PID:628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6932.bat

      Filesize

      212B

      MD5

      668767f1e0c7ff2b3960447e259e9f00

      SHA1

      32d8abf834cce72f5e845175a0af2513b00504d8

      SHA256

      cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

      SHA512

      c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

    • C:\Users\Admin\AppData\Local\Temp\Cab36FA.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\E61682F798C74326BA24B4372F368F1C\E61682F798C74326BA24B4372F368F1C_LogFile.txt

      Filesize

      6KB

      MD5

      e219bb6305caa23a0cca0f47da5a3f8b

      SHA1

      b782eabd2e7d4a5140e508a2dfb7a636ed48942f

      SHA256

      2c1b86eb7fb0ac71432a6c50d89e4d5db22957eed274c27a90497cc92bfe4ab6

      SHA512

      cfeaad632ce3d6dcca852f9e8bda8d4a0b946b2a60232d92d62099f7eb53f7c6323babf15962d4d36a1cb31ea5e8260e6cffc47a68c7213c115fec3ab8fd0e24

    • C:\Users\Admin\AppData\Local\Temp\E61682F798C74326BA24B4372F368F1C\E61682F798C74326BA24B4372F368F1C_LogFile.txt

      Filesize

      2KB

      MD5

      3a09c4b55447f68077ca32bfa145702b

      SHA1

      0d625c4a527639459dd27c30dfaecfd275dc5765

      SHA256

      935b292657cccab2df6af0d1bef9cbef197f80b488760237a22ef4cef8718a5e

      SHA512

      d06d06f6705896340a8eba517fd22e1bd523e734218089444a8ae58a5223b10f3ecb53d6dbaf4f5f1e526fc6732df7e15222a2246cf31133dfe3a021c171fd98

    • C:\Users\Admin\AppData\Local\Temp\E61682F798C74326BA24B4372F368F1C\E61682~1.TXT

      Filesize

      103KB

      MD5

      71c6ffab74ef4963819eb64c75f4aa9e

      SHA1

      7dd036616bd130526f8ab5c5524c357f60ca27e1

      SHA256

      282c5c16b76bfdffa87cc0e6c166a55e5e8403db0ade3280e018579aade8971f

      SHA512

      c0eccfca61014e9c91f329837e59aeb80063f48fd91172c78a9002f69886384c91a2313eb8d0e03e8a456879eea1d1c696b7cd1deaecb8f80598f4c2e85b2e4e

    • C:\Users\Admin\AppData\Local\Temp\Tar370D.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • memory/1448-63-0x0000000000860000-0x0000000000861000-memory.dmp

      Filesize

      4KB