Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2024 15:04

General

  • Target

    6fbc13ce46257b3c10123fd06c2a1766.exe

  • Size

    929KB

  • MD5

    6fbc13ce46257b3c10123fd06c2a1766

  • SHA1

    0c6b67422f0cb8bcf0a5a7b0d463f8b6c012d4fb

  • SHA256

    83ed08f7701b6e397d46fa3ea9e381625625b7e3933f2c0f5e454bb9c309e24f

  • SHA512

    ba9f6692fc1af0d39748f08f0b51daba0099803e24543af0e5e91c65507afa0ee8258795766ce11f8a6fa031d2b8a24be2ed8619a0195aa78afdd4f0c247ea66

  • SSDEEP

    24576:1tjOMEWc7JCrA1H0qxA2+a9KEKGWrEWJCi3uXDMSqDr:1QMEWc7+3Ra9KFPHuXq/

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fbc13ce46257b3c10123fd06c2a1766.exe
    "C:\Users\Admin\AppData\Local\Temp\6fbc13ce46257b3c10123fd06c2a1766.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exe
      C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/6fbc13ce46257b3c10123fd06c2a1766.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsd1853.tmp/fallbackfiles/'
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\23585.bat" "C:\Users\Admin\AppData\Local\Temp\2A30D14308E24C81AD173D7CB9903AAF\""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\$I8VS5LT

    Filesize

    544B

    MD5

    d89e055155d037389c54e0d9e67c47e4

    SHA1

    171fd819612f8e60dbab13aaea380c49c053eba2

    SHA256

    2b5be091ffcd3124d1955c882d1fed74dd6ead2983f86dffc1191020d087702d

    SHA512

    c0be67cfa4066f3442fdb67c5a265b9eca66c5d74b58368176f6c47d2cfca324c44c6caa46f60be40b5687b8456e63a38e464923cacef8c1f17a558896e3728a

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\$I9XWB2Y

    Filesize

    544B

    MD5

    71768169bd010fed7e428d87b91fb0c2

    SHA1

    9084c7aae79d634209ab84bae911fce5828df81d

    SHA256

    9ca82e1afb1b594d5ecb35ac4195db1533a83c7e001a1c32cb9d9ebf7b69b7b2

    SHA512

    c30b404ad56fca3154d82d31ec44260d396a8aa99dcf2b47c2f05317f92319d582464859d8accca49b3ae98fae4dab158e436d9a5ad3c161ba0c1a5bd2f11cd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    49KB

    MD5

    8fa90675e7165acb563add157fbef61d

    SHA1

    9ac3eac65f3b856b3ee243bf97a8cb8ec50efa9d

    SHA256

    d43091292193766b8ae3245375ca9b493374efb23fba0d441c5c29a21fd87073

    SHA512

    54a127b62c5cfbd2460184d39f6701599263e35605d63b48508d9f2fa847ebe69884bce66a37e1b63cebdf7e8a9bbbbb04d4fbe3d855975d7af7d964a16673ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96aa75a6cb8aedafd5e6649a51326ead

    SHA1

    933b6dc41b9f8fde7ba9b8d207ebfcf1d1a38a18

    SHA256

    5b892aa91e460ac27407bbb598c0b8921059d729dc21464a78e563bb713acf8c

    SHA512

    bf6240d470216edc7dfaa3251493224154ed86764c6e94cc1a93100702c479bc3dd200a795e9c1b9ee55562574857b931731a6d3e6deee0b68e3098a882c505e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0829f79ee5b2d6c3d90e5dd515a1a17

    SHA1

    82c21d99532c70ebe540f01c01dcc46e083c878e

    SHA256

    6528dd95748f8d77d70ea33bea4e29141e5f849f5e2738671ba8061d532bf994

    SHA512

    1dbe631f1ada7672089164ecd4a6428ff047f88303e526f814a9f9547c7e76839ba3bdb09c10d9c30698690801d6a025882bf6fa3987c472d0678b5c9999faff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    123e87066b99e61edbf1819b08f8a138

    SHA1

    0f6c55637d4c55d915a01c64f094ba1318a2d774

    SHA256

    7492d2445830109dcd43fb17078bd6f26dc6e09335839efc27d38de384ff12b5

    SHA512

    b81c50180262deb9201219e72ccb2a9835cd17a35396c79f91661a364b31d5108b55326ad686c3ab28c97d65058621b22d6f47770c66ce3041d3b6e3504b0136

  • C:\Users\Admin\AppData\Local\Temp\23585.bat

    Filesize

    212B

    MD5

    668767f1e0c7ff2b3960447e259e9f00

    SHA1

    32d8abf834cce72f5e845175a0af2513b00504d8

    SHA256

    cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

    SHA512

    c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

  • C:\Users\Admin\AppData\Local\Temp\2A30D14308E24C81AD173D7CB9903AAF\2A30D14308E24C81AD173D7CB9903AAF_LogFile.txt

    Filesize

    4KB

    MD5

    b12572f29e5899d159e13b5e4493bd38

    SHA1

    fb57b3e55b4e37519273365ba7e3ec869d2a97f4

    SHA256

    45481e5d1a6f1b23a980e5d11984bc503dc6f906bdcad2117c81ce4b36bf67d9

    SHA512

    1261407fa7738e09f9e1d566a08757724469610931ad31e5900f4b214cb9a28d1b11e841466c527e5fe2c232804aa73a399e265a06c812d93adfcc67c21c3bb3

  • C:\Users\Admin\AppData\Local\Temp\2A30D14308E24C81AD173D7CB9903AAF\2A30D1~1.TXT

    Filesize

    78KB

    MD5

    80be7c3a54a695ab2b9b7b410e80becc

    SHA1

    18b2a54f4eaccfc637544e8594a88356536db7a3

    SHA256

    57d768942f138023cce90d191fbee5d6bbb21422cab5100c386da2b96bc5914d

    SHA512

    bffcde04a629693c889f5d128787bc28fdb58351a6e225af9d8bd70d9752f49f0d5ce79e6540b9b38a8a1f20683cf01c2d68bba3b7ce660e8e32ee8b702c043b

  • C:\Users\Admin\AppData\Local\Temp\Tar1CC9.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exe

    Filesize

    425KB

    MD5

    b7c9baedd3a539be700f98fcda5da25d

    SHA1

    bb9f5ad960cc2ff2cd09666c2aaa381176bb4dc7

    SHA256

    b7725c7b459eb7da8b442b44ab2e3874a0613f988d87b7c0012498eb229e2d5a

    SHA512

    4cb58f1f6c5f90aa50ce8a7e8e8c70ccd714438d5abccdbbdaa446029fc1206b27cf7a407cd59651d8558454222ff91e6278b242f41ad2e842947e3016d4f0ee

  • C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exe

    Filesize

    244KB

    MD5

    74c3e9796cc36146b34b9e9dff7d3118

    SHA1

    bcdf44cb8d4335d38c96cbc837a24f2455217a5f

    SHA256

    faca5f9e66793b4ff9dbb8eb79aa1c6cd5ca6e41dbc081eaa5a49ebad1529424

    SHA512

    1be47d4378c8b976520dcac3a5811d5dcbf5863e40347bef12022f5f5590c2b162759f5dd6060bd8c94e32937708aff2a233560f9d4c08bb95561f8d93b9eb45

  • C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766_icon.ico

    Filesize

    31KB

    MD5

    eec554d70735944a1bf70cbb2c3994c1

    SHA1

    1163cd11203af2c1861ae865523326d3030703ce

    SHA256

    62b1f196c385d93a5740e0d9f929200fbe56ff3f98234f09a003196f6a78b851

    SHA512

    bb57052319337ca306ab2e7e43b1a9c326e9eff8726edf0a569bd17c894f6681f9a9e3c29c9a5a7e5ff038dbf6a82e435991f21f64f808cb17877817873038ae

  • C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766_splash.png

    Filesize

    133KB

    MD5

    53cd76edf8ffb4fbf9685f7897070019

    SHA1

    e840f9c64493216194209fbcef1ce102f16d7263

    SHA256

    5f3f4d0c1ecc3b9505ed63b55450e598391cbb432fc060bdb08185c463a5c1b9

    SHA512

    36980728c9dd2abd341df4e373fc5831641ba408127765523ea5df1cf432c2cdd2e38d5f7fa187697dd744dc72700fe04330ef77fe4339277b6e76f276ece8bc

  • \Users\Admin\AppData\Local\Temp\nsd1853.tmp\StdUtils.dll

    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • \Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exe

    Filesize

    345KB

    MD5

    c2467573c4c033b635b5c5688085b6cc

    SHA1

    4652c6ce1fcca5583fd59c292e31bac42098fc51

    SHA256

    0c11574400179610c55782ec33b1b408aceb6eb03a35df0cae37126d33122a5d

    SHA512

    7c5fe92acb9c849b1ea81661b12181bb645774e48b444da133a6b00484065bfca91a4111e7935bddda1414f4bfa0deaaf8e98c2b5607bee888489e5f74fb153a

  • memory/2844-82-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/2936-413-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB