Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 09:28

General

  • Target

    147ed0a890a96750cc0b596f46ac7e20.exe

  • Size

    2.6MB

  • MD5

    147ed0a890a96750cc0b596f46ac7e20

  • SHA1

    6bfb421f6bccf2a80b0756a9ae9289d300f51ee4

  • SHA256

    abebd3a601c204a7ba0b99ee1ec45ad8143d502c5b51c2b3353942b81fe6ddf3

  • SHA512

    d7fd1380d9242d76b415c8e33a128c96c7f5167aed2db9d428df4c1e84dc49bbf532c20648895702b71fd5abd01f101bb68b7b8dac0585743ea934ecefa7b28d

  • SSDEEP

    49152:pqe3f6aqzDYP6QkO6U6HP6Rbt2sAoHCL+WuTmuKwEL:ASi1DYP6Qk/U6iRbtbAoHCK5NKXL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\147ed0a890a96750cc0b596f46ac7e20.exe
    "C:\Users\Admin\AppData\Local\Temp\147ed0a890a96750cc0b596f46ac7e20.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\is-C1OK8.tmp\147ed0a890a96750cc0b596f46ac7e20.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-C1OK8.tmp\147ed0a890a96750cc0b596f46ac7e20.tmp" /SL5="$70122,1793774,899584,C:\Users\Admin\AppData\Local\Temp\147ed0a890a96750cc0b596f46ac7e20.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          915a495fe553301f56d931b65048de5b

          SHA1

          dfba93622b8d300cdf39d24ce4bcba9d0c3fa7f0

          SHA256

          fb37ff22cfbb7161c2ffaa5865aa69b1ee32b5d6b96e370e04d683e9e87e47e0

          SHA512

          c5d208fbbb3d4a315ab14ef5ba4d43653ebd503168bcffe7da7ed51209d73ac7a0060bc2973220fd9c71528868d5ca38c2e63afbf720f9984eaa04ce2e01734f

        • C:\Users\Admin\AppData\Local\Temp\Cab538E.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar53B1.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\is-58QQE.tmp\loader.gif

          Filesize

          10KB

          MD5

          042bbc484750db9686ac84d4ab62f771

          SHA1

          522e02ad62a95884fe50efc5d04a26593103c12a

          SHA256

          0a649da66beb5627ca167029ed8560c4a07f3cd611db37514a734230e00d637f

          SHA512

          cb347ebb856805a1a76511a724d52ff027ba79567c4a327ecfbcbf0e3a158048bf68755359623d2f4082760edf7b7ba665a057f229a3932c8fcc9fbae6294530

        • C:\Users\Admin\AppData\Local\Temp\is-C1OK8.tmp\147ed0a890a96750cc0b596f46ac7e20.tmp

          Filesize

          695KB

          MD5

          31673bca52c736725145789b49d6c0c4

          SHA1

          ad2441b2eed270259d073cf238df161b2ebdeb22

          SHA256

          97fe1ee974cf8e945c28b8a8f4390283a7522311c0556d129af9074be4adf391

          SHA512

          de78a471cd68c1253792ae4c7e098073c6ef8b9e3f08e9ee33fe3f08e58ed86a30ede749b6aec682ae2e525d53f4f9d87de4bd43cc793827f0cedb1fd8c9cb4d

        • \Users\Admin\AppData\Local\Temp\is-58QQE.tmp\botva2.dll

          Filesize

          37KB

          MD5

          67965a5957a61867d661f05ae1f4773e

          SHA1

          f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

          SHA256

          450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

          SHA512

          c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

        • \Users\Admin\AppData\Local\Temp\is-58QQE.tmp\zbShieldUtils.dll

          Filesize

          2.0MB

          MD5

          8b03d5f13240d4395654ac0074a95728

          SHA1

          89d0f5039379fdda7719fa8b5ab3a46a92e3a064

          SHA256

          f88d2226bbac1b61dbc22c968721f4b9f961c0a6aa75d88f303649bc930007d6

          SHA512

          bb8e2d2c34e8c2d84c1c9579130b8dcded2fa90dbc6d2dc6f54c9114f13a32941571c57a25e16e42e4652eda52201ceb560ba5a726fce1f053613e51752d52a3

        • \Users\Admin\AppData\Local\Temp\is-C1OK8.tmp\147ed0a890a96750cc0b596f46ac7e20.tmp

          Filesize

          1024KB

          MD5

          5d37322f9fa1382723246dba0913bf69

          SHA1

          98ef77992c78af1f6ebd8aacfc407c2c7d841c33

          SHA256

          51e92981bb2af775e3ecfecc27bc084a3827d1215c2e80786b8b90c8d80543ba

          SHA512

          6c0b87d73a3be329f4acbd7e15ce326343047359db7baf398cfec041fcbce4503c0d27d4b2d6d69b39c68775865322bf25253f94ea1fb2517cfcb6e96ade59a7

        • memory/1532-134-0x0000000000400000-0x000000000070B000-memory.dmp

          Filesize

          3.0MB

        • memory/1532-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/1532-22-0x0000000000400000-0x000000000070B000-memory.dmp

          Filesize

          3.0MB

        • memory/1532-135-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/1532-138-0x0000000000400000-0x000000000070B000-memory.dmp

          Filesize

          3.0MB

        • memory/1532-140-0x00000000077D0000-0x00000000077DF000-memory.dmp

          Filesize

          60KB

        • memory/1532-146-0x0000000000400000-0x000000000070B000-memory.dmp

          Filesize

          3.0MB

        • memory/2560-1-0x0000000000400000-0x00000000004E9000-memory.dmp

          Filesize

          932KB

        • memory/2560-21-0x0000000000400000-0x00000000004E9000-memory.dmp

          Filesize

          932KB

        • memory/2560-148-0x0000000000400000-0x00000000004E9000-memory.dmp

          Filesize

          932KB