Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:17

General

  • Target

    15a0ab6b7123c4ebed34fac4d63d4ac3.exe

  • Size

    385KB

  • MD5

    15a0ab6b7123c4ebed34fac4d63d4ac3

  • SHA1

    31d2dd67bd7e9386abc9d1f06c76733d7a8b1368

  • SHA256

    63ba3123a8da68e9c44bf3211879bb6bbdd3e88eb0f0c8d7979f6d97d31e5d2a

  • SHA512

    ef6c4d90d024dc226ccfb8e2dd88da9302bb241173a0e345efd7f7a354eed8ff15d9cbda669050dee3c297b0493cb79e44459b9aa966d757c1d318990417c19d

  • SSDEEP

    12288:xAGcuCUuuSrqT7B2mypWgS7pXW9L5Pib/B:+GcuCCYJpWgS7BWh5Pib/B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15a0ab6b7123c4ebed34fac4d63d4ac3.exe
    C:\Users\Admin\AppData\Local\Temp\15a0ab6b7123c4ebed34fac4d63d4ac3.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:2988
  • C:\Users\Admin\AppData\Local\Temp\15a0ab6b7123c4ebed34fac4d63d4ac3.exe
    "C:\Users\Admin\AppData\Local\Temp\15a0ab6b7123c4ebed34fac4d63d4ac3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1476

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\15a0ab6b7123c4ebed34fac4d63d4ac3.exe

          Filesize

          99KB

          MD5

          1fa5b32d69a200bb08065725b84166bb

          SHA1

          3c148cc2168b40a2d0a46723f74039e6b8356bbe

          SHA256

          5ce1c8cfca1430fbaba3e8b0993cec11380011ebd370146d3fa27e4725027e12

          SHA512

          2660acb08ed91644d3b876e389ea8ce706896995808a99d3b5526920652cfbb6561937609f524b958385e972411bfc314bfa86b453b7f32fcbec00e9ef66ead1

        • C:\Users\Admin\AppData\Local\Temp\Tar11D1.tmp

          Filesize

          99KB

          MD5

          fa178920e56586a7d673ef62ab4575c0

          SHA1

          cfd02c6a6b26f3407a1f9a91411f6f4467b1ee54

          SHA256

          777c3d087168f5f42bbd550047ecf607a3a375eb621d7e30a38e9c8803a861b9

          SHA512

          12b20ccc55780883d3b4c36366e335a8d07d9581a2684de3e1c05055b6fff4dd3e0124cc210e93f5f4306c37a163a92584047d5eb0ff5d71f04ee30c593a836f

        • memory/1476-2-0x0000000000190000-0x00000000001F6000-memory.dmp

          Filesize

          408KB

        • memory/1476-14-0x0000000000340000-0x00000000003A6000-memory.dmp

          Filesize

          408KB

        • memory/1476-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/1476-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1476-13-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2988-17-0x0000000001470000-0x00000000014D6000-memory.dmp

          Filesize

          408KB

        • memory/2988-20-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2988-27-0x00000000015C0000-0x000000000161F000-memory.dmp

          Filesize

          380KB

        • memory/2988-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2988-82-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2988-88-0x000000000DD10000-0x000000000DD4C000-memory.dmp

          Filesize

          240KB

        • memory/2988-87-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB