Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2024 11:41

General

  • Target

    $_3_.exe

  • Size

    1.8MB

  • MD5

    9ab5db4bb5971035b4d287d64f9676b5

  • SHA1

    33d17f016339572dd05c124d6243fffefd0cd039

  • SHA256

    f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

  • SHA512

    d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

  • SSDEEP

    49152:G0BIrT/YNRoLlps7tZokvTopSdmX4Foni7iMmdc:GbTRps7Xj

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$_3_.exe
    "C:\Users\Admin\AppData\Local\Temp\$_3_.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\6317.bat" "C:\Users\Admin\AppData\Local\Temp\D6F02F90323C42DD86BF9C3737462709\""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3470981204-343661084-3367201002-1000\$I494GUM

    Filesize

    544B

    MD5

    134bb0cf7ea8b77c40f74ca9a26a0e45

    SHA1

    ed52dca7ff2aa545fd86d2be81bb1c60e5dde248

    SHA256

    493a6b5ade2c420289f1ddaa59d85c383ae68c28e936bcb50ee608f3ca98f5fc

    SHA512

    ddfedad79a1f8cf1b4823ea5cf6641a9b9a55af3e5fe7058f34651e445d57764b3ca49e02ebc1b7005079192b534b98a8fb0356a9e968e9458a3a51cf37dd4f4

  • C:\$Recycle.Bin\S-1-5-21-3470981204-343661084-3367201002-1000\$IT35GCK

    Filesize

    544B

    MD5

    6012b26120806e948dd94026f9808055

    SHA1

    21bb6897f0cb3c27dff2d6368db83636e6fb550c

    SHA256

    35474147f75e4ff2003bc67782ebaa065161d7c41de7e3b703b1821416a646b1

    SHA512

    9e128bbddd67e29072f242c602357475dadc883525aebf30cb331572875d1c527d54c84bf1a976b11fbcdbf36bdcbafeb703ffc4429d46e0768abf1441e20930

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\Local\Temp\6317.bat

    Filesize

    212B

    MD5

    668767f1e0c7ff2b3960447e259e9f00

    SHA1

    32d8abf834cce72f5e845175a0af2513b00504d8

    SHA256

    cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

    SHA512

    c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

  • C:\Users\Admin\AppData\Local\Temp\Cab1120.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\D6F02F90323C42DD86BF9C3737462709\D6F02F90323C42DD86BF9C3737462709_LogFile.txt

    Filesize

    9KB

    MD5

    b82bba4331161257f1dd71a0e1de8ad5

    SHA1

    65271302f0de0a6fe4b3275c41d6a711cc3833b3

    SHA256

    663cdeb5ac168652b4995e550352fbad56b4c7ada1f85644f67ff2c90d56d54b

    SHA512

    b6764d41bf65a7a1d26110221aaa22b49c6761b7bb54325a0513bade3232e81d84d5a3972b689d49dde56de77d9e626008b914ba07e3c20579bb53a25b688521

  • C:\Users\Admin\AppData\Local\Temp\D6F02F90323C42DD86BF9C3737462709\D6F02F~1.TXT

    Filesize

    109KB

    MD5

    276cda3cc344f705b665ea032188a84d

    SHA1

    d2924d8f77a7e06e73986b0133020a761e5f6257

    SHA256

    f9efb3a7c97c25015c629db34c2449198cc3f6f447b3f12ccdc8c2bc235ff2a9

    SHA512

    e966497a9dd9bb7338b3f983a6a0e00f2279680f85a51fb772fc615b9464177bbb50f5eae37165168d1c6c7dcdb81f5b4be5c81cfaf947220afe8ff0e11c8450

  • C:\Users\Admin\AppData\Local\Temp\Tar13A5.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2912-65-0x00000000025B0000-0x00000000025B1000-memory.dmp

    Filesize

    4KB