Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 19:54

General

  • Target

    41c3f96ef89d41ecdbd1527db03eedcb.exe

  • Size

    385KB

  • MD5

    41c3f96ef89d41ecdbd1527db03eedcb

  • SHA1

    59b5e853046491dc3a4a4d39149527667f328823

  • SHA256

    258451171e15a3041ac70bf4f8f3ba60bd557f247b19b6ab20aa2fc900c46aa9

  • SHA512

    9bfbb0b9962d6bcacab5e360d1eac96789879e4ed224020fb11df0cf3538786802f4cb9015ad6db661279987b7f7d96630103adf6a7d8e3bd8e7e43e5117a256

  • SSDEEP

    6144:3gUlhEf//A4uwZ35emPL8bz2YAfdicdsKD0hHZjJxAPd5BGz/EzNqB:FlKnawZ35emmPAEcKKQVZjJuPd7Q/1B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe
    C:\Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:1856
  • C:\Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe
    "C:\Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe

    Filesize

    39KB

    MD5

    a7e92da21cf4e29a2ec4e14e97683d97

    SHA1

    b51abf25a3ab812793247fdf66f7ba363b4511fd

    SHA256

    a537a36809090d5e8ce5fdf9bbcb3debb0095d8a75a3b9e6e68460b6704172fd

    SHA512

    5e0f37adcc282fd7a5036d91497e7e3ba8c30385febd6007e5b3674fa1a8cd035f87188ece8d1e1b8230ac62710af9750cc8e27770a244f861d18eb840fb3f41

  • C:\Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe

    Filesize

    50KB

    MD5

    f3fa634c5e43e965e29032a8438da003

    SHA1

    55fd0d4f078268958faa836eec23e6a18ebc0b86

    SHA256

    a875ac70003802540b74388e5fb1162b84bccb2ce31208f6a962d5def60bb677

    SHA512

    7834c3ae7045954fae4a8df65f518a684fd0cc29f33c268e3c88505b6addbfc81ef68882883cce286a86dc7e2ea2458cdaa253289f4b5e2ee246229d3d2c45d1

  • C:\Users\Admin\AppData\Local\Temp\TarFFD.tmp

    Filesize

    124KB

    MD5

    8eedf15de34b38cb3a1cb20ffdcb363c

    SHA1

    dbe50ace899139ea16a80d4524f6e5553c13237f

    SHA256

    4fea1616ca7f4af17d1fb0cc31967471a746e8333dc8681ea989f689d2bb9e89

    SHA512

    464cb34fd25c2232b936b1da2a58be511f354dc1a33cf3ab17d7338a77c0e86368483938dd0e823448bf6a3d2defbad018f6eb8770ad7b215feb93ba4ab8852a

  • \Users\Admin\AppData\Local\Temp\41c3f96ef89d41ecdbd1527db03eedcb.exe

    Filesize

    74KB

    MD5

    ef668ad32e4b25bce9daec8e6e26e8bb

    SHA1

    98f4e44f316a42131f5f9449ffa0712ff74e5f11

    SHA256

    54b02e3262a0c137299d44da1a68d6a9142b6bf416e604317dae5193bb044ebf

    SHA512

    54d7e4a20ce3388232d5783f19f38587ae3f912dc5a8659018c36a2c78e13428376435779d85b13a606e9640af0de1e10bf10f81b8118800a5fd145d75a04a7d

  • memory/1688-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1688-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1688-16-0x0000000002DF0000-0x0000000002E56000-memory.dmp

    Filesize

    408KB

  • memory/1688-2-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/1688-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1856-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1856-21-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/1856-29-0x0000000001470000-0x00000000014CF000-memory.dmp

    Filesize

    380KB

  • memory/1856-19-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1856-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1856-88-0x000000000D620000-0x000000000D65C000-memory.dmp

    Filesize

    240KB

  • memory/1856-87-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1856-89-0x000000000D620000-0x000000000D65C000-memory.dmp

    Filesize

    240KB