Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:59

General

  • Target

    23a8618ca596037ed7814f9381d58c19.exe

  • Size

    385KB

  • MD5

    23a8618ca596037ed7814f9381d58c19

  • SHA1

    ac70f68a58ef20ef1793d85cdd0ef3db9ba8010d

  • SHA256

    3f530c057aebc5ee4550e2d6299030fdf07feb42406dd4c37acf9ee9fa19221a

  • SHA512

    02236b86969ac087ed7b4156aef04e18dcdcea99134de742c3a2c44989171f9f575fc72092ce73a32e6ea73eadd3ab07cd632d071b33ac97089bcfbc0583f405

  • SSDEEP

    6144:670xTF/tnnSuodgzxQQVz7mF0l27vzoS5XvUOVEBPNtZkDXrzB:9xJ1nnRo0GF0Cvn5XMXT2XrzB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe
    C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:2436
  • C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe
    "C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe

    Filesize

    382KB

    MD5

    0d91041036cedc7d347325912b7aa272

    SHA1

    f630892dfd851a48705f1df8f6157180ec619903

    SHA256

    d627b7ae4936a9adccada9ab0a499fdd707df454362f72fc1b95489b712e518a

    SHA512

    235c554a111cb661b50e5e91f9c0c9d3e7b2b4217267c25f381a2445fab25c196009bc907dd046bca39db35cc541203920718cfda9a367ec70549ecfbda16ee0

  • C:\Users\Admin\AppData\Local\Temp\Tar634A.tmp

    Filesize

    96KB

    MD5

    325a9f52a337369bbb3667d454dc0a16

    SHA1

    a3c1a8a5717c8a4405f3445ff6cb5dfbb142b60f

    SHA256

    f37973712d0aaec9621964d877e7ccafdce6eb9c725d02fae5c43d40eb5a9c8b

    SHA512

    8eec509108c221ed9fda02ca0548e8a66b2f0f0dd35361cf17903930be52c6abeb1f9d86811f5817c2aa3abca1474e6e3212b51405a2cb4d6ee68e3539dfe8af

  • \Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe

    Filesize

    385KB

    MD5

    e703e274dcf7fd410a89b6b46ce9bdf9

    SHA1

    2042dd756d0875c31bf892b1d51649c8290f3b8e

    SHA256

    48a5709d91b0788b0911c9d5982e6415668f945d39fa714ee6c8cc4f44da15e3

    SHA512

    6acdf059e11762ceae8a51fddae45a3987d9259b88f275c1a6e2704bee1dc5fd42f968c61fea0cc17b17aac182f17a7a0f9f37b89df6cfb274edf678409a9a62

  • memory/2436-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2436-20-0x0000000000380000-0x00000000003E6000-memory.dmp

    Filesize

    408KB

  • memory/2436-29-0x0000000002D00000-0x0000000002D5F000-memory.dmp

    Filesize

    380KB

  • memory/2436-18-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2436-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2436-87-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2436-88-0x0000000007730000-0x000000000776C000-memory.dmp

    Filesize

    240KB

  • memory/2436-89-0x0000000007730000-0x000000000776C000-memory.dmp

    Filesize

    240KB

  • memory/2848-16-0x0000000001550000-0x00000000015B6000-memory.dmp

    Filesize

    408KB

  • memory/2848-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2848-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2848-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2848-2-0x0000000000380000-0x00000000003E6000-memory.dmp

    Filesize

    408KB