Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:59

General

  • Target

    2c7e019fff6298cb0adc2c66854170f7.exe

  • Size

    385KB

  • MD5

    2c7e019fff6298cb0adc2c66854170f7

  • SHA1

    6a96d8dd39d747a88244d41093b5ddbe686a1ad9

  • SHA256

    8b14fafef96dc685581e798701f3e1720c25fc77f568e13125d407068d0b7494

  • SHA512

    472c5da27d4db35540de2322bbab59abc368908b68d20e45c048f4f6d92ba3a9c6d7395091955e13b03c165dd1c0ca016572a872edda4d577b937b9696dabede

  • SSDEEP

    12288:bu75D7J+Kqjmc7OScWMXzn+8Um0HQOkFvPfB:0dt+bmxrn1Um+ZkBXB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c7e019fff6298cb0adc2c66854170f7.exe
    "C:\Users\Admin\AppData\Local\Temp\2c7e019fff6298cb0adc2c66854170f7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\2c7e019fff6298cb0adc2c66854170f7.exe
      C:\Users\Admin\AppData\Local\Temp\2c7e019fff6298cb0adc2c66854170f7.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2c7e019fff6298cb0adc2c66854170f7.exe

          Filesize

          40KB

          MD5

          aa661f0f76281d40112c766e36d64173

          SHA1

          db8ef9184415c7d69eb788ca00925e26f1367b3a

          SHA256

          57a4a6414c5459c09330655f2cae5475d3e746e3b450cdfe11429dfa5ec2c562

          SHA512

          b580f549f156d890d5a462f78d5bcfe160622374013720a1f2947ecc63a0d43ec3fc7a98df681c773ee797aa85833fcdf627013e20e44da27e159ecf3c35c694

        • C:\Users\Admin\AppData\Local\Temp\Cab5830.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar5891.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • \Users\Admin\AppData\Local\Temp\2c7e019fff6298cb0adc2c66854170f7.exe

          Filesize

          107KB

          MD5

          22d68e159e373cbd990cbe17f2235cc8

          SHA1

          7fa637cc1ddb99c7deb144191eed7ba04624f8ce

          SHA256

          9d5a5cdc3672f0bf057af73e49992ca6fa0c9a8e5c926967044ef784f5cbf74d

          SHA512

          8cbaf1acc21dee01c134a0ad97395602701fee704454b1f270a3bc0db31331e96850943f32d219b04d4c5e03632699207c24463382415ada6c8638d37e080ad3

        • memory/2408-14-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2408-13-0x0000000001470000-0x00000000014D6000-memory.dmp

          Filesize

          408KB

        • memory/2408-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2408-2-0x0000000000230000-0x0000000000296000-memory.dmp

          Filesize

          408KB

        • memory/2408-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2748-16-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2748-24-0x0000000000260000-0x00000000002BF000-memory.dmp

          Filesize

          380KB

        • memory/2748-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2748-17-0x0000000001470000-0x00000000014D6000-memory.dmp

          Filesize

          408KB

        • memory/2748-79-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2748-84-0x000000000A580000-0x000000000A5BC000-memory.dmp

          Filesize

          240KB

        • memory/2748-85-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB