Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 15:35

General

  • Target

    a5bc37cf5d0bafdf8e156f6a5ac46d14c92afe8aa202e36599a8703b5fb6d581.exe

  • Size

    274KB

  • MD5

    fd13dcd6428a6705db752e761ee80092

  • SHA1

    4008d25c9171c4ccc5b5579cb8142852ca6fe603

  • SHA256

    a5bc37cf5d0bafdf8e156f6a5ac46d14c92afe8aa202e36599a8703b5fb6d581

  • SHA512

    4f68fe020a6f825185a5ae21c7f9f364a3273491dfc88ca118576339b6e7171c57e464c22a11e324d31b8ee1141461ade797b953c7b04876062139b4a389f28c

  • SSDEEP

    6144:fbTirrfykiiUjh6QH/cEOkCybEaQRXr9HNdvOa:fPcrfR6ZnOkx2LIa

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 7 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\a5bc37cf5d0bafdf8e156f6a5ac46d14c92afe8aa202e36599a8703b5fb6d581.exe
      "C:\Users\Admin\AppData\Local\Temp\a5bc37cf5d0bafdf8e156f6a5ac46d14c92afe8aa202e36599a8703b5fb6d581.exe"
      2⤵
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2668
    • C:\Windows\Help\powercfg.exe
      "C:\Windows\Help\powercfg.exe"
      2⤵
        PID:1732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f8a65ea422b224f5e71edbf4a1819dbd

      SHA1

      3574bf23db5928874a2808b2031052480208bf0a

      SHA256

      0f38d2899e133464a45f6259ce1264b0d5fa07b895cde8fab680935683dbbed0

      SHA512

      e14976ad56cce8a1a6f5d0623bfb803d3a106761749648a3954d032e91c08ebbfc75937c9943f8e2494cfca88d28fc686b0e2437d5daa57d5839ed485446d511

    • C:\Users\Admin\AppData\Local\Temp\Cab845E.tmp

      Filesize

      45KB

      MD5

      dc38d629e51926a750b443772d7c8c65

      SHA1

      2868765523e76b2e6706f18ecb665f4631a00d00

      SHA256

      21a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883

      SHA512

      beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4

    • C:\Users\Admin\AppData\Local\Temp\Tar9AFD.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\Help\powercfg.exe

      Filesize

      69KB

      MD5

      f779ee89cd1f679c91ab8848c978f086

      SHA1

      a2fdcc215c1ab0cb2be8a1d9db5362a6d1b756e9

      SHA256

      12279d4d2d7f80562f79d4dbcb7b63428e924c30a5e95f45cb0d08001a9cbddc

      SHA512

      5af862211a8841bd6a205ed6c9a06ab52f393d08a41c94a814f399dda28d20641ee3abbeefecaaba6bf0d0edd83d6ccf72675ca0e40e7d56966a035c3f4bb822

    • memory/1208-520-0x00000000025B0000-0x00000000025B3000-memory.dmp

      Filesize

      12KB

    • memory/1208-531-0x0000000008A60000-0x0000000008D0B000-memory.dmp

      Filesize

      2.7MB

    • memory/1208-530-0x00000000025B0000-0x00000000025B3000-memory.dmp

      Filesize

      12KB

    • memory/1208-525-0x0000000008A60000-0x0000000008D0B000-memory.dmp

      Filesize

      2.7MB

    • memory/1208-522-0x00000000025B0000-0x00000000025B3000-memory.dmp

      Filesize

      12KB

    • memory/1208-523-0x0000000008A60000-0x0000000008D0B000-memory.dmp

      Filesize

      2.7MB

    • memory/1732-545-0x0000000001FA0000-0x000000000222A000-memory.dmp

      Filesize

      2.5MB

    • memory/1732-551-0x0000000001FA0000-0x000000000222A000-memory.dmp

      Filesize

      2.5MB

    • memory/1732-535-0x00000000000E0000-0x00000000001E0000-memory.dmp

      Filesize

      1024KB

    • memory/1732-537-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/1732-554-0x0000000001FA0000-0x000000000222A000-memory.dmp

      Filesize

      2.5MB

    • memory/1732-553-0x000007FEBF440000-0x000007FEBF450000-memory.dmp

      Filesize

      64KB

    • memory/1732-540-0x0000000000210000-0x0000000000213000-memory.dmp

      Filesize

      12KB

    • memory/1732-543-0x0000000001FA0000-0x000000000222A000-memory.dmp

      Filesize

      2.5MB

    • memory/2668-0-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB

    • memory/2668-65-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB

    • memory/2668-222-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB

    • memory/2668-66-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB

    • memory/2668-108-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB

    • memory/2668-145-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB

    • memory/2668-194-0x0000000000220000-0x00000000002AC000-memory.dmp

      Filesize

      560KB