Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:25

General

  • Target

    15dbf60036a5b616cdca06d335330b71.exe

  • Size

    907KB

  • MD5

    15dbf60036a5b616cdca06d335330b71

  • SHA1

    9bcde2c44d9ac04355e96e7c156a61cf6de99a7e

  • SHA256

    5b76d285199e653f74bbc88063867b2e3282502982718001585b0e5e79b7a095

  • SHA512

    5ebe6fa194854625ee7fa8c2dc998098090dee9a362041709490e6669a192e435f24a31eff67a669da316d2d1fff665b73b1148afe6509fdc3fd82a19a056ee4

  • SSDEEP

    24576:xoWSX8cJGXVuLV/lO8vd4598338H3vqa/ZS1:RSX8cJSU/Osd+83yigS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15dbf60036a5b616cdca06d335330b71.exe
    "C:\Users\Admin\AppData\Local\Temp\15dbf60036a5b616cdca06d335330b71.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\15dbf60036a5b616cdca06d335330b71.exe
      C:\Users\Admin\AppData\Local\Temp\15dbf60036a5b616cdca06d335330b71.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\15dbf60036a5b616cdca06d335330b71.exe

    Filesize

    137KB

    MD5

    8020f768eccefd2a9884c2b85e74cf91

    SHA1

    ad4d8fa9d14692edd52fc62b1ff4862e85708872

    SHA256

    ede3b28e67fe29b26e0c12602c26bb079f84129530ccbfe33b05b6f37d96767f

    SHA512

    09ce598b41b457a2f62e93ec6bb68c9f643beb710561c1926736992a57007765d46a18f75009d7256aa4403ca4036c3a7411db5dde76eda00c280d203ce22e95

  • C:\Users\Admin\AppData\Local\Temp\Cab18FF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1931.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7

  • \Users\Admin\AppData\Local\Temp\15dbf60036a5b616cdca06d335330b71.exe

    Filesize

    112KB

    MD5

    cd43139a151beedcd5edee54137806d1

    SHA1

    dec83b03a62672b1a16f0630f090f8339bb1d81a

    SHA256

    5155184aaa72e35b36ae7049bf53a2df295917385f8b7346286f26e93cc50d83

    SHA512

    48a6e2560bd0126a71eeb7037f970a784bc67368f0e1c27aa18793b5c406aea096572c60cd58c39d9b15c8e4f9f6084b27573527bcbd0b665ac27510ca1c527c

  • memory/2784-17-0x0000000000290000-0x0000000000378000-memory.dmp

    Filesize

    928KB

  • memory/2784-23-0x00000000017E0000-0x000000000189B000-memory.dmp

    Filesize

    748KB

  • memory/2784-22-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2784-15-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2784-76-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2784-82-0x00000000087C0000-0x0000000008858000-memory.dmp

    Filesize

    608KB

  • memory/3016-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3016-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/3016-5-0x0000000000310000-0x00000000003F8000-memory.dmp

    Filesize

    928KB

  • memory/3016-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB