Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 00:23

General

  • Target

    087244a066d1e0a9f731d4a30869fb9b.exe

  • Size

    385KB

  • MD5

    087244a066d1e0a9f731d4a30869fb9b

  • SHA1

    2cab5efae9c09aea0d43a9a0a15e4ae445b31d0a

  • SHA256

    597b771b7d9ed87fb8ea06d98f326f3a5419f0a5375431c82e965bb343eaae37

  • SHA512

    0aba8e52e444eb5fc72af7b5a04df2afee21c1b9737eaffa99886d3799252be4cc13589d5bb183f8a31587752f0fb72ed3aaa433add8c3afc9036e8304c6850f

  • SSDEEP

    6144:2qfYDEnS/Bkg5TXvzlyZ6bAAWvLdLPDkqAR1mUDSlc7LqiPyIJsocnb+B:2qGEnS6gtfzwSavxYcUDr7LqlIMb+B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\087244a066d1e0a9f731d4a30869fb9b.exe
    "C:\Users\Admin\AppData\Local\Temp\087244a066d1e0a9f731d4a30869fb9b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\087244a066d1e0a9f731d4a30869fb9b.exe
      C:\Users\Admin\AppData\Local\Temp\087244a066d1e0a9f731d4a30869fb9b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\087244a066d1e0a9f731d4a30869fb9b.exe

    Filesize

    36KB

    MD5

    8b9b9e3589656be837250d62e5878052

    SHA1

    85006ed54a993c3cbc0fc29d38d3a48a384d55b4

    SHA256

    2498659788f46f58d4bb2da60465eea034d1cbe404a16a2111a410b983392560

    SHA512

    b4666a758ad0a9f07a3cf6e598ab41246cb5693628ac9840b7cccf71903d8bc862238b71c5f827e8775ec09e56f9cc27886e91151890dc27903910ae57bfcce5

  • C:\Users\Admin\AppData\Local\Temp\Cab6847.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6888.tmp

    Filesize

    39KB

    MD5

    b9f510d830db434e51fe2532016d2a12

    SHA1

    a1d20426e62420f864ea35980a86e76130e6b32f

    SHA256

    b47d8163c806a992e5a90dbe9f03d920a6ea78522f90fb6ee0dd1f7d793c59e7

    SHA512

    3e38431d0ca511ff765bc27ee3b535f856d75185f8439498fb2bea3e745c6888caae36e9ac97d922a5ff0ca2ce2841447de2fd397a395247837f23f398a99659

  • \Users\Admin\AppData\Local\Temp\087244a066d1e0a9f731d4a30869fb9b.exe

    Filesize

    31KB

    MD5

    f4947e80740f7931903c06e82d0817e5

    SHA1

    df68d1da0c21cf99dbb928ee162c2f83e83423e3

    SHA256

    6d645aeafda0f4cb426ac855ed83f7b9eb57e96dd27a278a39f82fe190421453

    SHA512

    d783cec98f077fbac541739968c35b455fb3fab91ad6dc748caaf4ba0b5585660420c70f4f2f9fd538a567aa165051f1ad853c6339f40b7d89d464495e2f1211

  • memory/2132-16-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2132-18-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2132-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2132-28-0x0000000001470000-0x00000000014CF000-memory.dmp

    Filesize

    380KB

  • memory/2132-78-0x0000000007550000-0x000000000758C000-memory.dmp

    Filesize

    240KB

  • memory/2132-83-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2132-77-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2848-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2848-12-0x0000000002E20000-0x0000000002E86000-memory.dmp

    Filesize

    408KB

  • memory/2848-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2848-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2848-6-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB