Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 02:44

General

  • Target

    57c657d65e6f838951a7765587d0b0e6.exe

  • Size

    1.6MB

  • MD5

    57c657d65e6f838951a7765587d0b0e6

  • SHA1

    b5f4f3081036f1769a80b7dd885b6bffd1a8911a

  • SHA256

    d6dda35121b08926af752fa94a6c7ed813ad6173d770dab74512c7e1bd519adc

  • SHA512

    c8c96844076adebd798c6df13b4791ebfd81871505ae2a919dfe8a300d55f58b44877173bdfe951b510d46ba0269ec877cc3b6b6bd5325b9ad92e1685879bb63

  • SSDEEP

    49152:fZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9Q:fGIjR1Oh0Tk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57c657d65e6f838951a7765587d0b0e6.exe
    "C:\Users\Admin\AppData\Local\Temp\57c657d65e6f838951a7765587d0b0e6.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\9258.bat" "C:\Users\Admin\AppData\Local\Temp\4374B08AD36E438BAC629C31AA0BC1B2\""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:2988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          3e58424086f0de7a56641cf0543ff76f

          SHA1

          2c5f72013f3be0c74777bffd2ae0dde9dad69693

          SHA256

          0f3150cc0d7407f1ea7a9979134b2e1be828ec703b00f44450a5c503df166211

          SHA512

          565fbe1eeb00219d4ea932f499471b3f4afd1ff7dbe8cd09f8f2293919634158eeb75e0d84bb7acf1e4f82ce97e2147e6d0e3acc72179bc95be7d5501582d9e5

        • C:\Users\Admin\AppData\Local\Temp\4374B08AD36E438BAC629C31AA0BC1B2\4374B08AD36E438BAC629C31AA0BC1B2_LogFile.txt

          Filesize

          6KB

          MD5

          77f2ba98d33c9e9fc1f8a0b698f002c6

          SHA1

          5b5273a1bf246dcb0c6b790479d29067e38070b3

          SHA256

          6ed3649b1dfc6a454aa1d15bffee0a5983db6c223964f6cf71749ca318c69931

          SHA512

          8cbe8ff9704c75121d7e5f918c5678918d7be2d4e8d7e555ef4373ccc45070e4f62f5a945f352c50225a608f7fdddb9693490c263f50148c4e937fcdfc58cb5d

        • C:\Users\Admin\AppData\Local\Temp\4374B08AD36E438BAC629C31AA0BC1B2\4374B08AD36E438BAC629C31AA0BC1B2_LogFile.txt

          Filesize

          2KB

          MD5

          46e69ab266cc0d472bced1636ce790d9

          SHA1

          ef5dff1127fa30bfd3eb4f1807894b3c1898ecae

          SHA256

          646c959688ad2ca0c8ff88915338415702e9d3b2b3d4d4d862c453f8230eec33

          SHA512

          7fe04dd29ec68ea055410a15d614a29a16e2487526bd26a3ceac5497870172146043ee039da38e1940c98ad6b77614f1533801088aa47b9b06b06c7a076c038e

        • C:\Users\Admin\AppData\Local\Temp\4374B08AD36E438BAC629C31AA0BC1B2\4374B0~1.TXT

          Filesize

          100KB

          MD5

          03859a1aa69a0cab0789db7579868cad

          SHA1

          cee8e2f4ca4f661c180918bc0facc343c30cdadd

          SHA256

          9415abedb43f963e01127fa86e2a9e931f398fbd8361988e785054e3342b4ee7

          SHA512

          cf27aba3116aba9497fa0b4dbdce8d6d98151561f10423bc406046bf04bd06142ed00cb6d6caf83ef848ef1f096717d78fcefe1a16c7527320e17c7206cc26f7

        • C:\Users\Admin\AppData\Local\Temp\9258.bat

          Filesize

          212B

          MD5

          668767f1e0c7ff2b3960447e259e9f00

          SHA1

          32d8abf834cce72f5e845175a0af2513b00504d8

          SHA256

          cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

          SHA512

          c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

        • C:\Users\Admin\AppData\Local\Temp\Tar120F.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • memory/2376-63-0x0000000001F40000-0x0000000001F41000-memory.dmp

          Filesize

          4KB