Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 11:41

General

  • Target

    58d53a0d2cfb30999c8f85df90b0f6a6.exe

  • Size

    789KB

  • MD5

    58d53a0d2cfb30999c8f85df90b0f6a6

  • SHA1

    c1fab9ab4d9a0df787d814419881be84573ec90d

  • SHA256

    9a3eccbaada8ec20bc5c83ae3604209cda18675831dc9fecea199e4ac21cd1ee

  • SHA512

    0f1a6bfd63d23293446021340c207f753f7b336e4e569492af0946724134ecff5401ca5a368eb6afad5d131bf242cddbc1afef9dfdf060d5450ee173aa45e3e0

  • SSDEEP

    12288:RtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu443m:Rt8RHjEgYAw1hZlZTWQu7igcyKPEuj2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe
    "C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe
      C:\Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/58d53a0d2cfb30999c8f85df90b0f6a6.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nst55A1.tmp/fallbackfiles/'
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\23298.bat" "C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1603059206-2004189698-4139800220-1000\$I2ZNTRW

          Filesize

          544B

          MD5

          338fffd9957823726d69b95ebb195f72

          SHA1

          be471f58ebae5868595724b37aab3e2620a791e8

          SHA256

          db2678a335d8c244a328ebb3747231ab7cf0688f78e9d5d0509dcec317ea2ac6

          SHA512

          03de1e00bd01b4d2ffde1298584081a5431af3f0ca1f12134cf89bfab356633de06c7aacef250244002489ff4b31563c11f58de5b7f1a7bd27844f7063a92ba5

        • C:\$Recycle.Bin\S-1-5-21-1603059206-2004189698-4139800220-1000\$IAFLNPE

          Filesize

          544B

          MD5

          f275fa4b6309bb99a9cbef6fee685cc9

          SHA1

          93c63b23d702b4ede9042d75988c1746e276cd22

          SHA256

          5e0fe1464f42d2ea26e37e7b72d06de5117938801c3a8e3f9cc64d6ed3a51eba

          SHA512

          e800d2c41feeb4592442411c7128a84dd83ecce901159ce12947691845d17ac306a94776d213514ce8c317d6c617e6ff560b29832c995dd5544fb62eea09037e

        • C:\$Recycle.Bin\S-1-5-21-1603059206-2004189698-4139800220-1000\$IN6CEML

          Filesize

          544B

          MD5

          ddf2dec123c8a86497ad1f47365aa308

          SHA1

          866bf2f175d3bd0739d010b0905bd84dddec6cf9

          SHA256

          91e98a16fbff32fed56ec1b22e2a03585e2fecedbe3ad1311ba2b672f1dbc7c4

          SHA512

          b7bdd7ab1d726a2f12b8a25294ffd01c0579140952b10ddc86aeee7b8536841a492509f99e3a574825159351a47a88a07f8d4e78f95d3dcc12bb18a9e87dcb43

        • C:\Users\Admin\AppData\Local\Temp\23298.bat

          Filesize

          212B

          MD5

          668767f1e0c7ff2b3960447e259e9f00

          SHA1

          32d8abf834cce72f5e845175a0af2513b00504d8

          SHA256

          cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

          SHA512

          c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

        • C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\A85D4C3113E14F3EA773B5529A105D19_LogFile.txt

          Filesize

          6KB

          MD5

          739fb35c9a758caa72fba1cce83ea337

          SHA1

          506bdd79c1ebb12e1923a351641aeeb92fcfa466

          SHA256

          8a7fc7353f27c0ac0540ef93358d6d2684677b18dd04ccbd5be67105c1240cc0

          SHA512

          7e0de257d465467d9e026fd420d917d04e7b7a439bc41c4d9456701f54263b1f4c4fdb8e280abf5190912f46a9e5ecb0a785fae4b083531629d41746f42275e4

        • C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\A85D4C3113E14F3EA773B5529A105D19_LogFile.txt

          Filesize

          7KB

          MD5

          fa79eb82b4445d6ac825643183b39fbd

          SHA1

          c6acabe7a2bc80db9e8f35a849a3b8765e968354

          SHA256

          9942e337e07ccb971d01a5da0541fc82daf107a97f9b1c0958aae4bdd4ed782a

          SHA512

          31cf6b6cd57089e5f57ae783615e72188c9c4e4839d37bcdc302a8404c21f13b1d7cca1e3dd709e1a2135b8f440d5c0fbe8c17b687260694921d11e1d639c81d

        • C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\A85D4C~1.TXT

          Filesize

          102KB

          MD5

          704e13b56b16d2ca2539eb73c0dcb15e

          SHA1

          45de27863e5612c84dc38c1451bb9c1455e3f9e7

          SHA256

          a3ff4f89d6abd9f9edf453e3b0fb5b01c040ee87e9f0e4f69d22a6785c78ad0f

          SHA512

          3c6c09cb933ed293075f83bd24b50de3f58bad152c566aa6a0b32ad4acd213d72e9791d83d278a944b9c8e160a82ebf49d1cd96ef6a496f1dd6c527d1da43081

        • C:\Users\Admin\AppData\Local\Temp\Cab6E01.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar6E52.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6_icon.ico

          Filesize

          17KB

          MD5

          055c2cb77fa2edc2802b7fd397b9c213

          SHA1

          e6bf5af3427539bf609cfb8904b35803a06104d3

          SHA256

          78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

          SHA512

          7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

        • C:\Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6_splash.png

          Filesize

          12KB

          MD5

          fe272d040e82704707b19bfbf29d65ca

          SHA1

          460de628ea63986a7e6390a1623d8ba32dc82aee

          SHA256

          1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

          SHA512

          8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

        • \Users\Admin\AppData\Local\Temp\nst55A1.tmp\StdUtils.dll

          Filesize

          14KB

          MD5

          21010df9bc37daffcc0b5ae190381d85

          SHA1

          a8ba022aafc1233894db29e40e569dfc8b280eb9

          SHA256

          0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

          SHA512

          95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

        • \Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe

          Filesize

          1.8MB

          MD5

          9ab5db4bb5971035b4d287d64f9676b5

          SHA1

          33d17f016339572dd05c124d6243fffefd0cd039

          SHA256

          f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

          SHA512

          d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

        • memory/2380-80-0x0000000000A90000-0x0000000000A91000-memory.dmp

          Filesize

          4KB

        • memory/2980-262-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2980-348-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB