Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:41

General

  • Target

    1ec56102c234f28619ca62a486fc6dba.exe

  • Size

    134KB

  • MD5

    1ec56102c234f28619ca62a486fc6dba

  • SHA1

    87d6dbf4358318b9ce4b1898afd1e0ad16622851

  • SHA256

    5862dc22e20acf9116c42d208d466e8dcaca6810d771fcf4a89b4a58c28c1f31

  • SHA512

    a3667cb2ccb0bbe5adf6e2c22faf6a1a2cd5a51441f729f9980b2f2a7216ac8fab1df2eb0486e253447fd1f017e008f8b16003ad1753844af574bb338df66896

  • SSDEEP

    3072:fnOn7t7XpdpCCTg/sxFgJceq8K0CNSgNHvjlsHwm6ECG03MjJ:fKpdcCrTf8KdNPNZsHNBt03MV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ec56102c234f28619ca62a486fc6dba.exe
    "C:\Users\Admin\AppData\Local\Temp\1ec56102c234f28619ca62a486fc6dba.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\nso3E5A.tmp\downloadmr.exe
      C:\Users\Admin\AppData\Local\Temp\nso3E5A.tmp\downloadmr.exe /e133231 /u4d488269-6268-4c29-b4c2-79305bc06ebe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab432A.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar437B.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\nso3E5A.tmp\downloadmr.exe

          Filesize

          58KB

          MD5

          cb5d44e3322b24d01a8750f96a92d8a3

          SHA1

          69b312391c605f2ed9af3ee3ea696af319af28b3

          SHA256

          47cb428d9b6f5f08976ef1ca208d6791eecb18a1e3e5807d05187fdee7898a1c

          SHA512

          71a99fc891cb546870a117e508d769f5468996e17f3a4f3ede382c7254d2375855e010bc07b510b2f52b698733c90802bec54294576ee144207437a93938063d

        • C:\Users\Admin\AppData\Local\Temp\nso3E5A.tmp\downloadmr.exe

          Filesize

          83KB

          MD5

          fcf561ffb7a6f1de71328a2754595846

          SHA1

          3ffb9d29689ba1dab76eee622d0096b7c48caadc

          SHA256

          75c97cc2a3fecb13070400206f74f8636e0888246357b3d7a4751404298f217d

          SHA512

          6d3e4cb4c035ec222e2bc8e09299168bb944b217b65a3d1b68565392389ab1682df429f4360847b92be78043901ff7033ec08597ff7b9062bb3732c5110c20a2

        • \Users\Admin\AppData\Local\Temp\nso3E5A.tmp\System.dll

          Filesize

          21KB

          MD5

          5ebc73650256e9c8ddbcda231db829a1

          SHA1

          988d4535e18754ab2a6248abae96c5697d7dbcd5

          SHA256

          1eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493

          SHA512

          b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270

        • \Users\Admin\AppData\Local\Temp\nso3E5A.tmp\downloadmr.exe

          Filesize

          88KB

          MD5

          7c8745ddd0626746da2de3d937b3dc74

          SHA1

          51d09e9542d36fb676b5f5bd9212d262f218c2fa

          SHA256

          f62b1203b135dc860f86273312fc6a9796b3cb23f4faf23b40a5122886b59883

          SHA512

          efda32922d197a71c578daf1f4400231fa75d0b2b1a9700d5cbd21239ad51fd9864e7d874c99149b09ede9b0033d2f86d7cfa3ce799d21a90d7af9b16951822e

        • memory/2104-83-0x000000006E3C0000-0x000000006E3CD000-memory.dmp

          Filesize

          52KB

        • memory/2104-88-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2104-82-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2356-15-0x0000000074020000-0x00000000745CB000-memory.dmp

          Filesize

          5.7MB

        • memory/2356-79-0x0000000001F70000-0x0000000001FB0000-memory.dmp

          Filesize

          256KB

        • memory/2356-80-0x0000000001F70000-0x0000000001FB0000-memory.dmp

          Filesize

          256KB

        • memory/2356-81-0x0000000006560000-0x0000000006660000-memory.dmp

          Filesize

          1024KB

        • memory/2356-78-0x0000000001F70000-0x0000000001FB0000-memory.dmp

          Filesize

          256KB

        • memory/2356-17-0x0000000001F70000-0x0000000001FB0000-memory.dmp

          Filesize

          256KB

        • memory/2356-84-0x0000000074020000-0x00000000745CB000-memory.dmp

          Filesize

          5.7MB

        • memory/2356-16-0x0000000074020000-0x00000000745CB000-memory.dmp

          Filesize

          5.7MB