Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 14:14

General

  • Target

    74e6908518cfedd86721fd05a6addaf3.exe

  • Size

    10KB

  • MD5

    74e6908518cfedd86721fd05a6addaf3

  • SHA1

    278ea4589bf7669e01006a551a47c9456127f5be

  • SHA256

    ef413af021f027b66075cec8b0a75b045b8e909f7728c90fd87076ee4310ff01

  • SHA512

    420ddf82810dbb068a41047f8de6187f4bb4116056fa320a1d01dab927509c022bc15319fdc5537b379e813e563348aacaa7233f37e3d809230d51bac28a0084

  • SSDEEP

    96:zb+u4l46fPl6C8w/Z3cy4cfnp35veaiUg55i7YSJPoJbNJFdsWedvEmMYYpG:WHO6V6CXZSYp0aiZni7PJPydYvVN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e6908518cfedd86721fd05a6addaf3.exe
    "C:\Users\Admin\AppData\Local\Temp\74e6908518cfedd86721fd05a6addaf3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\ffengh.exe
      "C:\Users\Admin\AppData\Local\Temp\ffengh.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d945debd87d77e375f4e7bdd666ec28b

    SHA1

    0061af2647819fd65c976a7eea69a00e4b69b903

    SHA256

    63b43f71f846cde360ee8057c704663474914994a91dd517f2cddaefb4832dbb

    SHA512

    ce91ccc094d07859e0eacdda602d3f70a8e0897fabe7fb4937935f44335b4f69665c477d0c086a800ff7d211778c08984fdfc378a67d494f7aceb1d0a3ba2eb0

  • C:\Users\Admin\AppData\Local\Temp\Cab7A7F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7B7C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\ffengh.exe

    Filesize

    10KB

    MD5

    805740f109998b59d561db2c147cb362

    SHA1

    f4482b54a452df225461f5e2226ffc78e8f4c773

    SHA256

    251b51fa159f551af73790c8df0311aeca1317e0bb8649018b2f5ce320499c69

    SHA512

    c81850ccf249744190bb58211d26042588ee2212336884937d7eaa3ae43ea65cfad281bf748c0cf9ada6835004b2543fecc793ec194bc2e1ee9c9a97ea3b7e17

  • memory/2360-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB