Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
58d53a0d2cfb30999c8f85df90b0f6a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58d53a0d2cfb30999c8f85df90b0f6a6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20231215-en
General
-
Target
58d53a0d2cfb30999c8f85df90b0f6a6.exe
-
Size
789KB
-
MD5
58d53a0d2cfb30999c8f85df90b0f6a6
-
SHA1
c1fab9ab4d9a0df787d814419881be84573ec90d
-
SHA256
9a3eccbaada8ec20bc5c83ae3604209cda18675831dc9fecea199e4ac21cd1ee
-
SHA512
0f1a6bfd63d23293446021340c207f753f7b336e4e569492af0946724134ecff5401ca5a368eb6afad5d131bf242cddbc1afef9dfdf060d5450ee173aa45e3e0
-
SSDEEP
12288:RtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu443m:Rt8RHjEgYAw1hZlZTWQu7igcyKPEuj2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 848 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2980 wrote to memory of 2380 2980 58d53a0d2cfb30999c8f85df90b0f6a6.exe 28 PID 2380 wrote to memory of 2664 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 30 PID 2380 wrote to memory of 2664 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 30 PID 2380 wrote to memory of 2664 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 30 PID 2380 wrote to memory of 2664 2380 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 30 PID 2664 wrote to memory of 848 2664 cmd.exe 32 PID 2664 wrote to memory of 848 2664 cmd.exe 32 PID 2664 wrote to memory of 848 2664 cmd.exe 32 PID 2664 wrote to memory of 848 2664 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe"C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exeC:\Users\Admin\AppData\Local\Temp\nst55A1.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/58d53a0d2cfb30999c8f85df90b0f6a6.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nst55A1.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\23298.bat" "C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\""3⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD5338fffd9957823726d69b95ebb195f72
SHA1be471f58ebae5868595724b37aab3e2620a791e8
SHA256db2678a335d8c244a328ebb3747231ab7cf0688f78e9d5d0509dcec317ea2ac6
SHA51203de1e00bd01b4d2ffde1298584081a5431af3f0ca1f12134cf89bfab356633de06c7aacef250244002489ff4b31563c11f58de5b7f1a7bd27844f7063a92ba5
-
Filesize
544B
MD5f275fa4b6309bb99a9cbef6fee685cc9
SHA193c63b23d702b4ede9042d75988c1746e276cd22
SHA2565e0fe1464f42d2ea26e37e7b72d06de5117938801c3a8e3f9cc64d6ed3a51eba
SHA512e800d2c41feeb4592442411c7128a84dd83ecce901159ce12947691845d17ac306a94776d213514ce8c317d6c617e6ff560b29832c995dd5544fb62eea09037e
-
Filesize
544B
MD5ddf2dec123c8a86497ad1f47365aa308
SHA1866bf2f175d3bd0739d010b0905bd84dddec6cf9
SHA25691e98a16fbff32fed56ec1b22e2a03585e2fecedbe3ad1311ba2b672f1dbc7c4
SHA512b7bdd7ab1d726a2f12b8a25294ffd01c0579140952b10ddc86aeee7b8536841a492509f99e3a574825159351a47a88a07f8d4e78f95d3dcc12bb18a9e87dcb43
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\A85D4C3113E14F3EA773B5529A105D19_LogFile.txt
Filesize6KB
MD5739fb35c9a758caa72fba1cce83ea337
SHA1506bdd79c1ebb12e1923a351641aeeb92fcfa466
SHA2568a7fc7353f27c0ac0540ef93358d6d2684677b18dd04ccbd5be67105c1240cc0
SHA5127e0de257d465467d9e026fd420d917d04e7b7a439bc41c4d9456701f54263b1f4c4fdb8e280abf5190912f46a9e5ecb0a785fae4b083531629d41746f42275e4
-
C:\Users\Admin\AppData\Local\Temp\A85D4C3113E14F3EA773B5529A105D19\A85D4C3113E14F3EA773B5529A105D19_LogFile.txt
Filesize7KB
MD5fa79eb82b4445d6ac825643183b39fbd
SHA1c6acabe7a2bc80db9e8f35a849a3b8765e968354
SHA2569942e337e07ccb971d01a5da0541fc82daf107a97f9b1c0958aae4bdd4ed782a
SHA51231cf6b6cd57089e5f57ae783615e72188c9c4e4839d37bcdc302a8404c21f13b1d7cca1e3dd709e1a2135b8f440d5c0fbe8c17b687260694921d11e1d639c81d
-
Filesize
102KB
MD5704e13b56b16d2ca2539eb73c0dcb15e
SHA145de27863e5612c84dc38c1451bb9c1455e3f9e7
SHA256a3ff4f89d6abd9f9edf453e3b0fb5b01c040ee87e9f0e4f69d22a6785c78ad0f
SHA5123c6c09cb933ed293075f83bd24b50de3f58bad152c566aa6a0b32ad4acd213d72e9791d83d278a944b9c8e160a82ebf49d1cd96ef6a496f1dd6c527d1da43081
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
Filesize
12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
Filesize
1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066