Analysis

  • max time kernel
    119s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 02:50

General

  • Target

    252cf0aedd153118ab234b0878407721.exe

  • Size

    907KB

  • MD5

    252cf0aedd153118ab234b0878407721

  • SHA1

    d252273fe0621b58cbb9d6b055cfb5e1c85cc7d3

  • SHA256

    3a103d82b5fd34a79ea3e8482f16b284613014bd4a0ead87e719d13f8b2efd70

  • SHA512

    b73285c7248f731ff75c36c2d36776086c1fa333ca3fd8cd8bd6102bdada20ff3dc04eb967b4bd1ab9176d21bea063291ff2110e19ed7c03f2288e27516bebde

  • SSDEEP

    12288:AZRA1BfCeN3bBCrtjk8LYOGGODca2wdwHykFmYmJmE54zFMhBkBhcjVDa/ZS1:HbfLBC1kBGOxejmYIm/zFbBhCa/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\252cf0aedd153118ab234b0878407721.exe
    "C:\Users\Admin\AppData\Local\Temp\252cf0aedd153118ab234b0878407721.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Users\Admin\AppData\Local\Temp\252cf0aedd153118ab234b0878407721.exe
      C:\Users\Admin\AppData\Local\Temp\252cf0aedd153118ab234b0878407721.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\252cf0aedd153118ab234b0878407721.exe

    Filesize

    92KB

    MD5

    021983852cd51339c026f4d453d4f14c

    SHA1

    04437a01b547918b9d2c8d43ba642f7c32e389b8

    SHA256

    0f99577d5185ae562663351ea07ead63301754228437fb2234fa4140837f05d7

    SHA512

    297bf7744c15019b503de876396c9e0a6b05cd941ad571659f006d89c8f82f664c5be30c3b6b83d5ff052dcbe122a43e00b59cf2f7dd8efe66790a55751a0ca4

  • memory/760-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/760-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/760-4-0x00000000002F0000-0x00000000003D8000-memory.dmp

    Filesize

    928KB

  • memory/760-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2424-15-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2424-22-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2424-24-0x0000000002F50000-0x000000000300B000-memory.dmp

    Filesize

    748KB

  • memory/2424-21-0x0000000000310000-0x00000000003F8000-memory.dmp

    Filesize

    928KB

  • memory/2424-76-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2424-80-0x000000000EC40000-0x000000000ECD8000-memory.dmp

    Filesize

    608KB