Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 18:51

General

  • Target

    00f713c458a80152f1a3d0b36c9b59a1.exe

  • Size

    771KB

  • MD5

    00f713c458a80152f1a3d0b36c9b59a1

  • SHA1

    07580363b5d09bf02b6580ba10e750385b76e6ba

  • SHA256

    adc94097e82b3c9bc6d8500fd763c601a1fb82425e482b3f9c778d188cf73ab6

  • SHA512

    4353ca03138e231c7db3a987ccfa83ce6abe12e85d0bff48c7491e5e2024bd20d9fca652687e7b7fb4b8c1a48b07224a1bb278180bc095b3b3e0af44fa9838d6

  • SSDEEP

    24576:PkXncH8TXF52m0RbNMqDyb9JVRmiBIZTB:+cHkXf+GyyRJnTBC9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00f713c458a80152f1a3d0b36c9b59a1.exe
    "C:\Users\Admin\AppData\Local\Temp\00f713c458a80152f1a3d0b36c9b59a1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\00f713c458a80152f1a3d0b36c9b59a1.exe
      C:\Users\Admin\AppData\Local\Temp\00f713c458a80152f1a3d0b36c9b59a1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\00f713c458a80152f1a3d0b36c9b59a1.exe

          Filesize

          771KB

          MD5

          c0a340bc25aa166a5a655e7b74286986

          SHA1

          5c257803abe46a02807512b5394d95bf19a4d2a5

          SHA256

          ae72b95dcb6e90f030622464ef86ba553aec4c2e43a5bcb7f2b455a85066ccac

          SHA512

          c1f3e3ce14d670f7c4c46d0114ecb2b9d24c549ffcf091efc37c9fff1c88f4c10db6d8f0735db09a60647daf23658b4066d5ae7dfcace20dcf60f805c6e1a231

        • memory/1796-26-0x0000000002C90000-0x0000000002CEF000-memory.dmp

          Filesize

          380KB

        • memory/1796-21-0x0000000000190000-0x00000000001F6000-memory.dmp

          Filesize

          408KB

        • memory/1796-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1796-19-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1796-77-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1796-83-0x000000000A5D0000-0x000000000A60C000-memory.dmp

          Filesize

          240KB

        • memory/1796-82-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2064-16-0x00000000002B0000-0x0000000000316000-memory.dmp

          Filesize

          408KB

        • memory/2064-14-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2064-3-0x0000000000240000-0x00000000002A6000-memory.dmp

          Filesize

          408KB

        • memory/2064-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2064-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB