Analysis

  • max time kernel
    121s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 05:32

General

  • Target

    4828939e13d224376921eaaca53dc07f.exe

  • Size

    385KB

  • MD5

    4828939e13d224376921eaaca53dc07f

  • SHA1

    7651039d2b8b8e31848cc23c977c7973a8f97e74

  • SHA256

    6638238a4c5c9c25ca4d4f52ebc3f7d8e8c36aa4cdafbf09777a665b16232c6a

  • SHA512

    a9ac5beb2bb13c0cf04f594c05b839542c4df530c3fc0fc92fefcecb5e199583389c6a733fcee76ddd9041248d55788f0b8dc05cb1eeca862f2944c31069b0e6

  • SSDEEP

    12288:BIVZatiw6xqHd+plk6DZ7eZDoC8KU3laB:6VZMiw6Q9+TLEZEnK5B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4828939e13d224376921eaaca53dc07f.exe
    "C:\Users\Admin\AppData\Local\Temp\4828939e13d224376921eaaca53dc07f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\4828939e13d224376921eaaca53dc07f.exe
      C:\Users\Admin\AppData\Local\Temp\4828939e13d224376921eaaca53dc07f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4828939e13d224376921eaaca53dc07f.exe

    Filesize

    167KB

    MD5

    a84414908fcea315807ed1bb0fa57ad0

    SHA1

    3891e296d72789cfc2114d3f3537a72ff9e0faf2

    SHA256

    c0a5f3ddd1911522a17c96c65e01d73e2570d7e673667926877f494e1a2ce6e4

    SHA512

    1aea744b8553c44ba250cca42e2b2c19b54709a5df8772a5e5fc337b846220203b03d2995f8083e50b534dc46381f78af456faf02aa99be040c27b6b39d52da7

  • C:\Users\Admin\AppData\Local\Temp\Cab9A2F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9A80.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\4828939e13d224376921eaaca53dc07f.exe

    Filesize

    256KB

    MD5

    7b95a2c385d5c947d9ce06dd87f47aa3

    SHA1

    85248b90c44753671cfc2804c775675c8f74769a

    SHA256

    e664d891a4878545eb32ad17aa45639908a8843004c9aee427758800234ab5c8

    SHA512

    018810fd309b5de23727da8989905d7698b3205d69c90fbfb215d3014c905fe3f928e2ef4f04894127029403f840ee80d6ac6dfa374510d8c165dc7ba66cdaaf

  • memory/2272-17-0x0000000000370000-0x00000000003D6000-memory.dmp

    Filesize

    408KB

  • memory/2272-28-0x0000000002D70000-0x0000000002DCF000-memory.dmp

    Filesize

    380KB

  • memory/2272-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2272-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2272-78-0x000000000A730000-0x000000000A76C000-memory.dmp

    Filesize

    240KB

  • memory/2272-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2340-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2340-12-0x0000000002DE0000-0x0000000002E46000-memory.dmp

    Filesize

    408KB

  • memory/2340-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2340-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2340-6-0x0000000000360000-0x00000000003C6000-memory.dmp

    Filesize

    408KB