Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 01:10

General

  • Target

    cd1e7592bd0239f27319691d400d29022d61a096f7da871369beeefc0e19712d.exe

  • Size

    37.0MB

  • MD5

    0774bcc9644b63c0671d822bde125dfb

  • SHA1

    ca12f671662d9d0d4706b57be7b3ec7ee24f1960

  • SHA256

    cd1e7592bd0239f27319691d400d29022d61a096f7da871369beeefc0e19712d

  • SHA512

    36ae678b414339da320de1e16aa32dd1c3d32dfcc96f2807a8bf086e0c067355edb8584e8e544f877e985f7a91214235b52774763dcb4eaab06f5d9ebfa095f5

  • SSDEEP

    786432:3/fOeOXqZ9hZ9uOOYZ9hZ9yOoe7Xu6toZR1nTDT7gCUU6nIarhFkWkX5rRwGdUEx:kRDGwZR1/TcCJGzrz85dwa1x

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd1e7592bd0239f27319691d400d29022d61a096f7da871369beeefc0e19712d.exe
    "C:\Users\Admin\AppData\Local\Temp\cd1e7592bd0239f27319691d400d29022d61a096f7da871369beeefc0e19712d.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1252
      2⤵
      • Program crash
      PID:2800
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 24A0DCDBF54200A8A708E40EA7F8515F C
      2⤵
      • Loads dropped DLL
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI1C76.tmp

    Filesize

    721KB

    MD5

    5a1f2196056c0a06b79a77ae981c7761

    SHA1

    a880ae54395658f129e24732800e207ecd0b5603

    SHA256

    52f41817669af7ac55b1516894ee705245c3148f2997fa0e6617e9cc6353e41e

    SHA512

    9afc180ebc10c0ee0d7306f4b7085608a4e69321044d474691587bf7e63f945888781a9fc5e69568d351ac690b0335214bd04bdf5c75fd8a3bd1ec4be5d3475a

  • C:\Users\Admin\AppData\Local\Temp\MSI1D13.tmp

    Filesize

    129KB

    MD5

    4d9449a39ee0f50249b02d3bcc979ac6

    SHA1

    2a16385a61d6342be729807b7f0adec0167e106c

    SHA256

    172f82f86b78a49742ded431a5eb025ed5add64955e532588958af3805fe917d

    SHA512

    aaea35e1653b3dc3890c18aaa8471f0fa7a666d6e33e81f91985c3efa6fe8d752ea7da6a0415ed870a7242749b9123f5f575f6600929705a9b1651a0dcc8935d

  • C:\Users\Admin\AppData\Roaming\PDF2PDFA-CL 1.4.3\install\PDF2PDFA-CL.x64.msi

    Filesize

    1.9MB

    MD5

    3e7ca40590b3ca251863b6fc4fcef43e

    SHA1

    6b3042f34ff53e43ab31f9aadddc00ab24cff119

    SHA256

    1b663dfcf52ed976b39371d341af8219bd758306ff2bef05e583c46818d437a2

    SHA512

    28dd97fc9ec8aee8bc7e72cbd46cd7ec5a2b690a90f5ada9650e17a040152a86cdd7acf55e0e89c76dbb93b75c0a47261527f45d7695be864dda96058ed9520d

  • \Users\Admin\AppData\Local\Temp\MSI1D13.tmp

    Filesize

    838KB

    MD5

    4a3f6a4023abd6bba56534de47d20017

    SHA1

    02dd888e467143e2e35465d73f39cf3e66afad10

    SHA256

    a8dfdc283ad8d4dc6f500ddfab564e79dadae075c0d54784b50e1ca548709b30

    SHA512

    580c7918ef90eb0020901bab645b72bcaf945ceb5bd56c2e7847f229b31a961bc4cd4ca9cb2583db480947ca8a0880b5ae4bd26717217abcacc9754352aaba28

  • memory/2028-0-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2028-49-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB