Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:27

General

  • Target

    29febba89277c809e45844c1fdf7b44e.exe

  • Size

    385KB

  • MD5

    29febba89277c809e45844c1fdf7b44e

  • SHA1

    ddd978ccc99465bc78ffd0f63bd3b2c156a65211

  • SHA256

    dfdf2009841854a38373f417760e36c88b21792edf690c8f0d3a3ccfb20d4348

  • SHA512

    0b4220a69b99becd8c52aced06a69454de28b67ccbb0260ec6c3f760c167b78be9daf11e1327d36de13c46a769e36a463efdf61f5d6ee84b2f43d0dc960b4be6

  • SSDEEP

    12288:jSNPeUOe4nX5UhTSH+bV5YSjYzVnTmRhN9LB:0Pf1KX+SW3YsqVnTmzLB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29febba89277c809e45844c1fdf7b44e.exe
    C:\Users\Admin\AppData\Local\Temp\29febba89277c809e45844c1fdf7b44e.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:1928
  • C:\Users\Admin\AppData\Local\Temp\29febba89277c809e45844c1fdf7b44e.exe
    "C:\Users\Admin\AppData\Local\Temp\29febba89277c809e45844c1fdf7b44e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\29febba89277c809e45844c1fdf7b44e.exe

    Filesize

    92KB

    MD5

    f841ea1e69b119798e92a100f16778a5

    SHA1

    4ec6c4cd73cc4813b3f502af95112351a857e8e4

    SHA256

    bf77d2c9dcf3edbb429b2db63bf68d5c89fed5ff8380f689cce2931b80ec3663

    SHA512

    f2210e320eec3ee93edc03a64aec1dc2d52a7423a26ab8c3b6a18b1a415fa1226e9df96d2012842bea6a294893bd07be09f0633218e94dc549fd548ff703875d

  • memory/1928-88-0x000000000D610000-0x000000000D64C000-memory.dmp

    Filesize

    240KB

  • memory/1928-89-0x000000000D610000-0x000000000D64C000-memory.dmp

    Filesize

    240KB

  • memory/1928-18-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1928-29-0x0000000001470000-0x00000000014CF000-memory.dmp

    Filesize

    380KB

  • memory/1928-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1928-20-0x0000000000250000-0x00000000002B6000-memory.dmp

    Filesize

    408KB

  • memory/1928-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1928-87-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2932-16-0x0000000002C70000-0x0000000002CD6000-memory.dmp

    Filesize

    408KB

  • memory/2932-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2932-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2932-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2932-2-0x0000000000310000-0x0000000000376000-memory.dmp

    Filesize

    408KB