Analysis

  • max time kernel
    117s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:17

General

  • Target

    2611a1db2b3aaf52d666e383e31242ad.exe

  • Size

    907KB

  • MD5

    2611a1db2b3aaf52d666e383e31242ad

  • SHA1

    cd94f8af6d789b5617b96f0d51a1425c145aa209

  • SHA256

    225c20667fce98bd3ecc5e8b6e11588647e617dda6693cce33f6c20c0b17e199

  • SHA512

    be663d8c33037098b110c103e4a986d6e4765edd078d8cf6498d8be07856dabb9252a62a1826a42f33bca2f14f5b17f14b60fe977efacdc344ceef83a495d706

  • SSDEEP

    24576:mqpV0r7hm1copV7ywN1lzEAlRGhTW0WkvrGa/ZS1:mOwhm1h7FNPAAlRGhtWCrGgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2611a1db2b3aaf52d666e383e31242ad.exe
    "C:\Users\Admin\AppData\Local\Temp\2611a1db2b3aaf52d666e383e31242ad.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\2611a1db2b3aaf52d666e383e31242ad.exe
      C:\Users\Admin\AppData\Local\Temp\2611a1db2b3aaf52d666e383e31242ad.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2611a1db2b3aaf52d666e383e31242ad.exe

          Filesize

          19KB

          MD5

          28ddd65ead884e40a82bf3e8bedc5cf9

          SHA1

          8a256db6befe41281b0aedd2a86d1afe0d128463

          SHA256

          5a561747738e0667c4e01b79e7a89df680b3732a7df635a9bb0c5502c73e508d

          SHA512

          d54c4070c55b314caa7fca294db3ab687349b4ba9c20aec9332425e8917ee5a94502b17da697ddf7ec17febfa6c3fa866d1f8643bc890023f538a44e524efbb1

        • C:\Users\Admin\AppData\Local\Temp\CabA8BF.tmp

          Filesize

          16KB

          MD5

          cf73de57fb1b427ecade575aefdfe1c1

          SHA1

          7c5748933c8715ecf9a9fe850a0620713fe2c73c

          SHA256

          b49f8aa390b30afcf7a9ba6a214397efa45b28524b2da62d268c24d33edfff9c

          SHA512

          b1087a72519f9305542af5c62e5b520a5243978b6cc15eb155446a95659ed4a666d0ab6e2dd1f9eaf7bd7279bdaf65f980604289002b4417fc55fa78e433fdbb

        • C:\Users\Admin\AppData\Local\Temp\TarA930.tmp

          Filesize

          22KB

          MD5

          a0d2c67e5c266c6b5b9decb46ee1e076

          SHA1

          b24853016f896cb0241610ef2bae1023f56f8353

          SHA256

          9d2e0d83756dfdf7d6abf831a221cdb30393eddcba73ebe32ae4bb4c533d0599

          SHA512

          d40503b3355b0c422414ecfddf4dca57f082875d8e9ce32844735be6cd3b677229e3c23781a0a3d353e9106f4bbcda66912c22f67463b44d0b2e60489d5381d0

        • \Users\Admin\AppData\Local\Temp\2611a1db2b3aaf52d666e383e31242ad.exe

          Filesize

          16KB

          MD5

          e576410ae0bb5eac4bbe2703abafae9e

          SHA1

          331718914b46a19b5c28f8ced93b7ad0eec583ea

          SHA256

          bd33fe8e4c2544af40e3c48be15ff75814ea824fb5ab9aa34b88462d7f1fb675

          SHA512

          1f1c7ad95a09446ee79f3a0bcf213e903cb57dee527601642d832ea83f272e7191dc6410e21abdcf197768121189ecf964a55950cc24aad0d05cae29d95fe06d

        • memory/1300-23-0x00000000015E0000-0x000000000169B000-memory.dmp

          Filesize

          748KB

        • memory/1300-22-0x0000000000400000-0x0000000000498000-memory.dmp

          Filesize

          608KB

        • memory/1300-21-0x00000000014F0000-0x00000000015D8000-memory.dmp

          Filesize

          928KB

        • memory/1300-78-0x000000000EC60000-0x000000000ECF8000-memory.dmp

          Filesize

          608KB

        • memory/1300-76-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1756-0-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB

        • memory/1756-14-0x0000000003290000-0x0000000003378000-memory.dmp

          Filesize

          928KB

        • memory/1756-13-0x0000000000400000-0x00000000004BB000-memory.dmp

          Filesize

          748KB

        • memory/1756-3-0x0000000000280000-0x0000000000368000-memory.dmp

          Filesize

          928KB

        • memory/1756-1-0x0000000000400000-0x00000000004BB000-memory.dmp

          Filesize

          748KB