Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 19:49

General

  • Target

    4f0f7abfe049cae5886f01c4f1b8a193.exe

  • Size

    1.5MB

  • MD5

    4f0f7abfe049cae5886f01c4f1b8a193

  • SHA1

    b40dd7e48f6c9ad1ab6e77a27e6551713b171cbf

  • SHA256

    7768e69970fd566ddbf4f28ca26ef3f988afd629e75ada0034f332446380c270

  • SHA512

    c4b7ad80aed56f3f1d2fca852d09c7e5b0b43692631031d77d1f2ac7d7d7f539c53ee27ed096a30afa080a02b58f181ab7530be53ba1b4bd4851be2d37d8338c

  • SSDEEP

    24576:FOfrQBh6b10hJaothZ2/T6FBBjNPI5lqkfZSkHR82b10hJaothZ2/T6FBBT:UDac/ofqg4/ofp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f0f7abfe049cae5886f01c4f1b8a193.exe
    "C:\Users\Admin\AppData\Local\Temp\4f0f7abfe049cae5886f01c4f1b8a193.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\4f0f7abfe049cae5886f01c4f1b8a193.exe
      C:\Users\Admin\AppData\Local\Temp\4f0f7abfe049cae5886f01c4f1b8a193.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\4f0f7abfe049cae5886f01c4f1b8a193.exe

    Filesize

    382KB

    MD5

    a7a7bd3956feb950bfccb13cb86011cb

    SHA1

    3a2211b2c4409621d58dc0b32cdda1152753834f

    SHA256

    7b16d18c7a59dfaf86769f9d2985d839ec4cb97f0dff3cca41f1d90c223e261c

    SHA512

    3d95318d72374d93c446ec7c3643a9e68c71c2f40bc405fbf1cb461c367fa7555e0a3bb60e2c6e9588891102ca2362b2d72b252fba0b9d576b44d79ba84161ed

  • C:\Users\Admin\AppData\Local\Temp\Tar1B53.tmp

    Filesize

    98KB

    MD5

    371aef904c2a44b47aeefa7c5bb3312d

    SHA1

    b1058296c351474166e45ea27423122bb191efc3

    SHA256

    0836be0716e46b765bc8c79b573e98af6e058dcd5ef6a6f38e29f30b7ad77ad4

    SHA512

    8a40153454ad5319c7e5c6c5e6d818a483bdb3bd4a7d250359e8d393ff87378a384ff007a80ee9ed76243f83a7db1662f3b0d5c7debfe704fff8e724f7886812

  • \Users\Admin\AppData\Local\Temp\4f0f7abfe049cae5886f01c4f1b8a193.exe

    Filesize

    1.4MB

    MD5

    407d6e82835dcbabf04a7f7003777724

    SHA1

    cb8274a0f0ad659e22505bdd56c83271b6e4265c

    SHA256

    e49c5e7ad12013d0e5f694df0930d846dd645db38bd3dfc7dcc44f0bfbb25041

    SHA512

    e7b40782d255c9c8b8db446f07e25ce12a6388bf4a559dc83ca7ab8a5e31f0accb224e94e7fc1f21747a66324b69e1d172a3ea5a3270f75f545f544966f31411

  • memory/2956-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2956-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2956-12-0x0000000003140000-0x00000000031A6000-memory.dmp

    Filesize

    408KB

  • memory/2956-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2956-1-0x0000000000340000-0x00000000003A6000-memory.dmp

    Filesize

    408KB

  • memory/3036-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3036-19-0x0000000000230000-0x0000000000296000-memory.dmp

    Filesize

    408KB

  • memory/3036-29-0x0000000001470000-0x00000000014CF000-memory.dmp

    Filesize

    380KB

  • memory/3036-17-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3036-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3036-88-0x000000000D6E0000-0x000000000D71C000-memory.dmp

    Filesize

    240KB

  • memory/3036-87-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3036-89-0x000000000D6E0000-0x000000000D71C000-memory.dmp

    Filesize

    240KB