Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 10:59

General

  • Target

    438194de19ad7eefd4762cbd6c68c991.exe

  • Size

    771KB

  • MD5

    438194de19ad7eefd4762cbd6c68c991

  • SHA1

    2268cec06ea9925a86cfd4e7b824613356b169e2

  • SHA256

    8fe1cb4180c5ed787e5d1583e525ddff3383edd503c4b95e14ed4655cb63412a

  • SHA512

    414e1a065291a52efe37fb35cdc8b9ac5c92b5208aad551e3199f2d528c91d0e073127ac590a8653e973d8b65283f5375e82546d1e43f4c081c011be11c74465

  • SSDEEP

    12288:h1cU4A1bkV1QnKMUQctX2ZQWjrBrb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:0V19MUQ87s9b10hJaothZ2/T6FBBB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\438194de19ad7eefd4762cbd6c68c991.exe
    "C:\Users\Admin\AppData\Local\Temp\438194de19ad7eefd4762cbd6c68c991.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\438194de19ad7eefd4762cbd6c68c991.exe
      C:\Users\Admin\AppData\Local\Temp\438194de19ad7eefd4762cbd6c68c991.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\438194de19ad7eefd4762cbd6c68c991.exe

    Filesize

    96KB

    MD5

    942a50164ff798d845f04f87bbdea5ba

    SHA1

    222e196cd06a9db41ddaac11136c8b00b578aa77

    SHA256

    300496b2f8e4ad4b43bee503280e3a34dd0c747a54d4a4af30dc4d6d066035fe

    SHA512

    7d52ef28427404f42892265b68ed2ecb1bbab9c33dabe8f97d6eb84dbf6f750c5ec1857ead07b045ce443070eec6b679241b9a350676db2838d70269a2dab27c

  • C:\Users\Admin\AppData\Local\Temp\CabE9A6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarEE3B.tmp

    Filesize

    142KB

    MD5

    f7483bf26f3a9fd6abd1d261f2ab5e45

    SHA1

    4efc8d1e8e2bd7c0e1d89f3154dc97979a4d2d6d

    SHA256

    966bde41c739ed119e5c78ac782bb98ea771ece09105f774117ff43d794528c5

    SHA512

    1534df790102c220d8447d50e962f9eb677abf908508cb7b5c4457d4b9a80d9afb1d592faca87ce634348258bea23284e4b0cd14257635e70fbf60691455ed05

  • \Users\Admin\AppData\Local\Temp\438194de19ad7eefd4762cbd6c68c991.exe

    Filesize

    22KB

    MD5

    2bea60a463eb78b476694d8270acf357

    SHA1

    80477f77938e1577b4d05a711f2a5b2ffe8d0955

    SHA256

    64624e6b3cfbe09132241f748266faac212202681cd884baa0f1fecd44bbd402

    SHA512

    dfde7dcf86c51584969ca6b7801caea2dfd3dd3f3f4d8820b57f88f61e3127750d018a18bf11d31b743123769ebd6a2dda600ac66d90bf32f73156094b0ad08f

  • memory/860-2-0x0000000000360000-0x00000000003C6000-memory.dmp

    Filesize

    408KB

  • memory/860-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/860-12-0x0000000003090000-0x00000000030F6000-memory.dmp

    Filesize

    408KB

  • memory/860-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/860-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2292-17-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2292-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2292-23-0x00000000003A0000-0x00000000003FF000-memory.dmp

    Filesize

    380KB

  • memory/2292-82-0x0000000008890000-0x00000000088CC000-memory.dmp

    Filesize

    240KB

  • memory/2292-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2292-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2292-83-0x0000000008890000-0x00000000088CC000-memory.dmp

    Filesize

    240KB