Analysis

  • max time kernel
    121s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2024 18:00

General

  • Target

    5433e3c0b4b0fb3ce661c56513ff521c.exe

  • Size

    907KB

  • MD5

    5433e3c0b4b0fb3ce661c56513ff521c

  • SHA1

    3872f38b7ee5a7e01335aecfdbfa4ba7e6b5c3f7

  • SHA256

    1e5df583b7426b3e8129eba744cdd538c5d478faa4f87d36897d32a25bd16937

  • SHA512

    62e526de31d3030406e3c4cd924234fd6aa5b828d7e6cddb5a16685fc76f08676d9d3b9feea9af4e46ddd971752e3180a26dd9af4e03fd64654b0a1a8e734edf

  • SSDEEP

    12288:cYlE7dKj4gGl+hEtr/yBte5lnGOQa8HOCMf99/yzbxenQGvVnuhfvF9TH1OOL+vt:ciE7I/4trPGOQa8i99a0JxuBVua/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5433e3c0b4b0fb3ce661c56513ff521c.exe
    "C:\Users\Admin\AppData\Local\Temp\5433e3c0b4b0fb3ce661c56513ff521c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\5433e3c0b4b0fb3ce661c56513ff521c.exe
      C:\Users\Admin\AppData\Local\Temp\5433e3c0b4b0fb3ce661c56513ff521c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5433e3c0b4b0fb3ce661c56513ff521c.exe

    Filesize

    907KB

    MD5

    3233cbaa8e77b4e6847cf82a69df5c8e

    SHA1

    40518b18b00bde95435dc44ad724ffb7f0a0f9ca

    SHA256

    0966ea3e1d4257c332b8abdfa7fea0487ebed5c9bcdfe3829ced90a811967937

    SHA512

    1c5bebfcfa6aeef566b6bfd9eb95e113a5f0d96e19153bb1175dfbbcbcde85d7edb39522db1c2fa5cd228901984d559a09c0b2106a6f5d0e2899e71ced54429a

  • C:\Users\Admin\AppData\Local\Temp\Cab234.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar285.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\5433e3c0b4b0fb3ce661c56513ff521c.exe

    Filesize

    834KB

    MD5

    075fbcca7b243adb11bdc9c20aae2bca

    SHA1

    81ca30c504873d9ec7f0e9400efe9e7a48201fb5

    SHA256

    0965547a63a254884e9289e77c9f15490e4de1fdfb24d4ad4b83ff9eba18a4a2

    SHA512

    2ce48a86c4fae3113cda84f1412d8a8bf539b20472b85af61f193e0eb12451c9622930a95c5a321f9ff469704f60b48c74b562f1ef72cdb6732c6fbb55d7ac38

  • memory/2156-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2156-2-0x00000000014F0000-0x00000000015D8000-memory.dmp

    Filesize

    928KB

  • memory/2156-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2156-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2824-17-0x00000000015B0000-0x0000000001698000-memory.dmp

    Filesize

    928KB

  • memory/2824-24-0x0000000003040000-0x00000000030FB000-memory.dmp

    Filesize

    748KB

  • memory/2824-22-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2824-15-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2824-76-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2824-82-0x000000000DA60000-0x000000000DAF8000-memory.dmp

    Filesize

    608KB