Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:46

General

  • Target

    2081732c92621aaf77c3fded7c393cca.exe

  • Size

    385KB

  • MD5

    2081732c92621aaf77c3fded7c393cca

  • SHA1

    f4251f8d54b05a0195cb31e50ef4d112c30802fc

  • SHA256

    c84e51e9d3db6b70bca2aa4f2a3610a4bc8de611d7fd58036b9a488006441b69

  • SHA512

    32c5725884d61b54ca2632a8dc289f7cf4f2dba141c95752379f0419018be25abc0fd3487ddd22fc50f43168d07fbaaf6309c1815f131d909c23eea8d1bd60aa

  • SSDEEP

    6144:PdT1fxSEVhz3ig83FMrh4VM66p5zGMrg831qbMbSNNed3aUDrSfujrB:1RfxSmiDM14VEpkMh314MbB3aFujrB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2081732c92621aaf77c3fded7c393cca.exe
    C:\Users\Admin\AppData\Local\Temp\2081732c92621aaf77c3fded7c393cca.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:3024
  • C:\Users\Admin\AppData\Local\Temp\2081732c92621aaf77c3fded7c393cca.exe
    "C:\Users\Admin\AppData\Local\Temp\2081732c92621aaf77c3fded7c393cca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2081732c92621aaf77c3fded7c393cca.exe

    Filesize

    381KB

    MD5

    244c90c8cc5c050fd51b390b1d184570

    SHA1

    56a108eb0d9f92696b9e28592fc234ce997fe051

    SHA256

    4ebe8c0a6d9e73d2fb66a93959ed976d8f3aadaf80fdec29ee2f6a0b3cfcce76

    SHA512

    7e1bc03025576b1db703866c8d2e15f83456abd914c41ed5aae80de2a25dfce2ec633bbc7c803f66cd692893750d11e36a6db9acaf1c86e9b18f576f968aaa91

  • \Users\Admin\AppData\Local\Temp\2081732c92621aaf77c3fded7c393cca.exe

    Filesize

    385KB

    MD5

    9ec651d57c51902f3ef73fc8842f737d

    SHA1

    ca9670a2911f65e7aefc07c308087b14c9383ba1

    SHA256

    bb0769c985045a60bb523a8f282c3c797a15d0299b8a689c1ec5fa3b2f5d7955

    SHA512

    2fb13f0af8b591dc2d0880716bb8854e67ba468a84378e7270eed1b5284d315abaee466b8425a565d3ba6c233505a258ad9f50b02b2c45c5dcdf3c77db41f1e5

  • memory/2800-14-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2800-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2800-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2800-2-0x0000000000210000-0x0000000000276000-memory.dmp

    Filesize

    408KB

  • memory/2800-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-17-0x0000000000320000-0x0000000000386000-memory.dmp

    Filesize

    408KB

  • memory/3024-29-0x0000000002CF0000-0x0000000002D4F000-memory.dmp

    Filesize

    380KB

  • memory/3024-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3024-20-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-83-0x000000000ED00000-0x000000000ED3C000-memory.dmp

    Filesize

    240KB

  • memory/3024-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3024-77-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB