Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 04:07

General

  • Target

    2781d09349e62aaf2423ad21712938d4.exe

  • Size

    385KB

  • MD5

    2781d09349e62aaf2423ad21712938d4

  • SHA1

    b6d5b8c4a2904800a24953a0aa32a43ac032b543

  • SHA256

    c7f9a8de3ec6adb1dd9d1b492b1cbb8c7665afd9462d2226be7aa5574c337092

  • SHA512

    caaff5e2ebf413d99bb1cf28e5a47eb073ce5a28e80d9bd9c0d614f63a91782847b5cc1b21287437fafa31464600f3598d7e6d5583e8034832eded412c471aae

  • SSDEEP

    6144:UGwKZ5R/Qb5kaXTsV+18zNz1jIuP8ZzmRc4MGh4mgTAzYDB:XxdQb2aX9KNpEuP849MGhSDB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2781d09349e62aaf2423ad21712938d4.exe
    "C:\Users\Admin\AppData\Local\Temp\2781d09349e62aaf2423ad21712938d4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\2781d09349e62aaf2423ad21712938d4.exe
      C:\Users\Admin\AppData\Local\Temp\2781d09349e62aaf2423ad21712938d4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2781d09349e62aaf2423ad21712938d4.exe

    Filesize

    25KB

    MD5

    1b620fd8370472e1e8388f98c4109b6b

    SHA1

    0f7e40f0df0dfda4062de8d29a7516a888db179d

    SHA256

    9231372ef0c542b71a0687b72a85d3284b69fd05f9cd836cf19b24783bc1b395

    SHA512

    2a78aa356125b0c965b6b22f5b2e2f1eca7083c453a2b790dcad371a8df7f7caea1161428c90ed01b85b1de31ff2b20df3d96728c33db47f326eaeec0e77c99c

  • C:\Users\Admin\AppData\Local\Temp\CabE736.tmp

    Filesize

    33KB

    MD5

    acee706cd88b666d4ef69f418af8f059

    SHA1

    dccd0fa6feca847a8a6dccb2593a6a7a4c59e07f

    SHA256

    b8499e6da492b62c5eab7b395666ea859f07618cacc0a9fc79a07fbed8aff6f6

    SHA512

    bceddac18ad92bd70d3f3599fd94d211a3196a37bbb730eab4ff41732153827d8f2607b836a356532761134d3a137f9451701398b607065e954110794fd25a2b

  • C:\Users\Admin\AppData\Local\Temp\TarE767.tmp

    Filesize

    22KB

    MD5

    b8bc09fe8fc70921be95d51154c0859a

    SHA1

    14454b29ba10d9b27b4e77630a40931965caf59e

    SHA256

    a6dc838fa0ec70cc8bcc32f084a0037154ba996ef320c3ca2301a55f3e8355ef

    SHA512

    2c2f9000b34e094b1e5a5a35e08a6d7e51c5ba1b0b204f88ba586b173a2f1fe63868e468f1571aa7bd491a043aaa63da4ace4b95c4d283da6251168aa05fea3f

  • \Users\Admin\AppData\Local\Temp\2781d09349e62aaf2423ad21712938d4.exe

    Filesize

    78KB

    MD5

    d1f43b7d60dc9af01a9c661f2c6d0b23

    SHA1

    ec21b3b9f5d5131c1211d5f2744d6eace98ee793

    SHA256

    f831ca53444615d70d683ba34d55112b92a5c2f8a59a578b9a1c3171385725fa

    SHA512

    87bd2c9607b48dd42e4416c17769e806cf573fe4d4bfdffce32dbf05559ba5f3be895de5035e783a8f451b5e0d9fe95808c1a812d9fb5708faf90c19cce9e988

  • memory/1220-12-0x00000000002C0000-0x0000000000326000-memory.dmp

    Filesize

    408KB

  • memory/1220-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1220-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1220-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1220-2-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2136-17-0x0000000000270000-0x00000000002D6000-memory.dmp

    Filesize

    408KB

  • memory/2136-25-0x00000000002E0000-0x000000000033F000-memory.dmp

    Filesize

    380KB

  • memory/2136-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2136-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2136-82-0x0000000007710000-0x000000000774C000-memory.dmp

    Filesize

    240KB

  • memory/2136-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB