Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:56

General

  • Target

    0ad3a168339c1ea019a3450fe22b49fb.exe

  • Size

    754KB

  • MD5

    0ad3a168339c1ea019a3450fe22b49fb

  • SHA1

    af0f0bfed710c4a81820f1ce1913c764fbb507ec

  • SHA256

    23661cf1ddcd3e3a1c467d3d1c4f0b8cc288648602fb138b925c5b5daffd5755

  • SHA512

    9aba80b5df361d9ab6d83ed7dd8202ab66db7d3fe33b781ede7e66f9e621efdc5c1abaf37d62c1a9cb221ae24dd1b9dfbc635190446eac4d0f046474a4222897

  • SSDEEP

    12288:iBhyRKF9Je6ouxOtgwl0VgcLD7cFM1MY1S1jeqcpfpu9ljNq3jbGNDmUAMNKoNNB:+oKF9JlCWTHDcFhY1SuUlNWjbqmUjNbt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ad3a168339c1ea019a3450fe22b49fb.exe
    "C:\Users\Admin\AppData\Local\Temp\0ad3a168339c1ea019a3450fe22b49fb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      C:\Users\Admin\AppData\Local\Temp\setup.exe relaunch
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          07e79727fe2163e76365bba9a03166ed

          SHA1

          9b7a4e64f8e4b6a18cdbbfea88ed52eb5a5dd34a

          SHA256

          383a4def2edb997416166536f74681e6b17f24bbcda25733a9af5875fa4e15f8

          SHA512

          65a5fcef7e782bf639ca91ce3187ec40504d86e83a10ae92ba06a79bd63485fe7d6a25c9ab6a3968198827465baa0ff0cdcd264afe643c9b1682ffa8ea376439

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6c19a6881e2230498ab583f1279a133f

          SHA1

          5c2b820874b37040aca83709e26ea4f872410813

          SHA256

          5da8b4a6bf68767007161644bdf3907b2e23076090e6563433557d1e156fe5d5

          SHA512

          9f4773379a58c4dd9a07880b30c1635a4309dfce19ee46996c8230de9532eb3f001d04986664e088540ec1aa01ae0c21a56a6e250b45cb47f06347722b4ea9e9

        • C:\Users\Admin\AppData\Local\Temp\Cab6386.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar63B8.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          537KB

          MD5

          697ae1949b07dab883002d207c0839e5

          SHA1

          fd693b4f9833515a9ba060a2b2d7f49145bf2012

          SHA256

          3f66cd12bd7101689688a400c44bdd0ac296ef711269b481efe750926e1cba3c

          SHA512

          c0e0edf734995f7ce75c16c7135460de5d3fafbbeade579a0606fa082b09b59e4be2c59e1e9ccd3865ecc131d4c2f299e2813e2f6daee8f5982464b2300e0f38

        • C:\Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          527KB

          MD5

          e57fce96051a7dbea592e0f9f35867a4

          SHA1

          1ba9514e81eb20163f7d1cf5b5be5769aacb3ed4

          SHA256

          df93e2e293a267e33f0c830c4bcfef37c48e401d98e3d47e8a440751498740fc

          SHA512

          b35d50a44c8b43c8d93b86fa517bc14ebe544f9cad176f884225ee7eb3f513e345e75ca055be0fec50727c10d2eed3e585614018f0b51280fc1570be2254ca68

        • \Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          1KB

          MD5

          e322b0e5ca1a5dbd0cb5dcebcb779fe2

          SHA1

          7c344fabdc6f6a5dd251c545e0708f0ed5bb059d

          SHA256

          a821fcac01bf6e0f549687188bb12191394a612d2b57b42a4c54ea22196574d2

          SHA512

          5e6fc025fa8753df7c8621c3750dacb4ca8e115dfd43e0527bcc4a97b2e6f5a164b9a0f3bbbaffedb44977f1fc287d8330be9bc07b04056946998fdd3956d751

        • memory/2212-7-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/2212-0-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/2212-4-0x0000000002610000-0x000000000287D000-memory.dmp

          Filesize

          2.4MB

        • memory/2212-105-0x0000000002610000-0x000000000287D000-memory.dmp

          Filesize

          2.4MB

        • memory/2772-9-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/2772-95-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/2772-103-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB