Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 17:43

General

  • Target

    a25c9e0db567e8860dd5b44bb1f78696.exe

  • Size

    1.6MB

  • MD5

    a25c9e0db567e8860dd5b44bb1f78696

  • SHA1

    2b074514d036c658e181c4ceb33726e83eadee85

  • SHA256

    85c68afc84f2ff1b282b12c64c10f559c8de22a3e46b8cd03d09f95fb82f3a18

  • SHA512

    739a17492a14d9a0573bb885e475290f04382011f0eb5d495bc682b9a7781d59bb1ae0256594974f5cd97652b2af82aeda75cc84d4d99a70500aca198ece3363

  • SSDEEP

    49152:/Zgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9E:/GIjR1Oh0To

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a25c9e0db567e8860dd5b44bb1f78696.exe
    "C:\Users\Admin\AppData\Local\Temp\a25c9e0db567e8860dd5b44bb1f78696.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7033.bat" "C:\Users\Admin\AppData\Local\Temp\CDE71F3719EB4A778769773F7A0CBB80\""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a731244dcc698d0d144269489925eeb

    SHA1

    e0ff86a605ca6b531208d17f0d938c31bff9dfcb

    SHA256

    c0ea5b5a3cb333044a734a86b2720452fe00e55c5c5c268dd6ab29a658bd2c9c

    SHA512

    f3987a521c4957a0617ba7331d9dab26d409a3fb1383249576ad399cbe72ded66d6cb92f998bd09d594f8546e050d2852b2ed038df5ce85fb8237af49c5193fd

  • C:\Users\Admin\AppData\Local\Temp\7033.bat

    Filesize

    212B

    MD5

    668767f1e0c7ff2b3960447e259e9f00

    SHA1

    32d8abf834cce72f5e845175a0af2513b00504d8

    SHA256

    cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

    SHA512

    c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

  • C:\Users\Admin\AppData\Local\Temp\CDE71F3719EB4A778769773F7A0CBB80\CDE71F3719EB4A778769773F7A0CBB80_LogFile.txt

    Filesize

    4KB

    MD5

    6e2b7ac666a3de38e070622b85adf51a

    SHA1

    8a55255e0fd2f61afa133cb81a455d80994b2eed

    SHA256

    21780153366f591a053fa3ed4f1feca73514f9a05e76e0c9e3d407301492807e

    SHA512

    375a45c1fc01e8351ecb6477a37230b576a1a78537308c0125c1750eda89f13cb077c3fdb40415918a34392a562bd3d58fe3fb7875c94d50706893f46e107707

  • C:\Users\Admin\AppData\Local\Temp\CDE71F3719EB4A778769773F7A0CBB80\CDE71F3719EB4A778769773F7A0CBB80_LogFile.txt

    Filesize

    2KB

    MD5

    4fb8fecdcf1f242178f9465dd096d180

    SHA1

    ac7db53f187ff3f97a6b3e7f67aaf53d42bdd5d3

    SHA256

    51471a1eef779296c27ba23160efe7b059918a8a43fc8021181be8547c999565

    SHA512

    5b077c43023c9618409319a1db38877633b18a1fda43c904b1cc955f86a2c0361056aeb34f961bf4a6f115247c95488d3eb64fb79ccfea35a1bb9699e66dedf6

  • C:\Users\Admin\AppData\Local\Temp\CDE71F3719EB4A778769773F7A0CBB80\CDE71F~1.TXT

    Filesize

    101KB

    MD5

    c85dcebc7407c0b0f74840b86520ec58

    SHA1

    c0a5da318ed1544f801047aec53d809a352bc9f3

    SHA256

    046942fb23be7927bc319ba7c8e78d3da8250a857abb751fb48176534d03b439

    SHA512

    09d407812ca0dc31aba0a0afd668a09dd3ffccded153beb663f859598fc22b41cbf7b124ed4dcd56de514ddda635e5c060f0089da8f8c91bd0b24604b3647a5d

  • C:\Users\Admin\AppData\Local\Temp\CabEB2.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF03.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2372-63-0x0000000001E50000-0x0000000001E51000-memory.dmp

    Filesize

    4KB