Analysis

  • max time kernel
    120s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:57

General

  • Target

    2ae1b3980e71fcc5e37094c2f561c434.exe

  • Size

    206KB

  • MD5

    2ae1b3980e71fcc5e37094c2f561c434

  • SHA1

    ceaf2cbddf40409a676e4a9fc0591b0a30aa039b

  • SHA256

    a57ec96822fe67acb7bb01bd1a1ea90467e7da767d002598f7586b16be5c8c5d

  • SHA512

    b63697b73b1b74c8c2fafc0b0aa13356e760d5cbd17a2aeaff36758289726ffd7abe4a1e71bd20c2bd82921638fb085b9e434174ad9bb69e8c94cea810e76e90

  • SSDEEP

    6144:orPiUVPw2PtLd3BqnEG8YV9aKxKfmge1QMNAr:orPiU9rJSnaYV9aKR8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ae1b3980e71fcc5e37094c2f561c434.exe
    "C:\Users\Admin\AppData\Local\Temp\2ae1b3980e71fcc5e37094c2f561c434.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 -s C:\Windows\system32\MSInet.ocx
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Windows\lsass.exe

    Filesize

    6KB

    MD5

    a5bb7793f51767f46ce1c12254149492

    SHA1

    aadb43df2addc25eddf4cb252641d39790ae72da

    SHA256

    6cf63146254cdb1b0e2531fa722d474c9e333e552fbb59f4ff383c0ec462e7f6

    SHA512

    d5d79dc8449f598fc72942de14bac07cec14806d78efae6a2383390095d5c10b85ad815019cdfd78f72da3c823f9f6404036478ef3e5d9d19e64714bfaa9b5b1

  • \Windows\SysWOW64\MSInet.ocx

    Filesize

    113KB

    MD5

    40d81470a19269d88bf44e766be7f84a

    SHA1

    4030e8e94297bc0aa5139fe241e8cf8f8142d8d4

    SHA256

    dd1215f01b484e7842763302d42749d516963d9ac74e2fe8825a5eaba34f6229

    SHA512

    e4a39613cc32885b67f6219281fbf99f50018b5fd2886b5389cfa04dc9dc4ebfc46fca2b9e89586116094fa3a7600c20b2ca0fa3535dd2615739621856506864

  • memory/2928-20-0x0000000075E90000-0x0000000075E9A000-memory.dmp

    Filesize

    40KB

  • memory/2928-10-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2928-6-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-5-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-8-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-7-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-12-0x00000000751A0000-0x00000000751AC000-memory.dmp

    Filesize

    48KB

  • memory/2928-16-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-3-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-22-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-21-0x0000000074DB0000-0x0000000074E0F000-memory.dmp

    Filesize

    380KB

  • memory/2928-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2928-13-0x0000000076C60000-0x0000000076D50000-memory.dmp

    Filesize

    960KB

  • memory/2928-4-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-9-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-35-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2928-2-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-57-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-58-0x00000000751A0000-0x00000000751AC000-memory.dmp

    Filesize

    48KB

  • memory/2928-62-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-1-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-70-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-69-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-68-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2928-67-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2928-71-0x0000000076C60000-0x0000000076D50000-memory.dmp

    Filesize

    960KB