Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 17:37

General

  • Target

    027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe

  • Size

    199KB

  • MD5

    310020d11dca5daa292c6d121ce044e0

  • SHA1

    974b85852d942d4bcf7fba23fc417d9083c1fb7d

  • SHA256

    027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20

  • SHA512

    39e7f13bb2a2e17f3a7e057a11567e1f70494181a08fe7d0847917677b8a4320c74105666b007bd25f697a739dc244fa12d2aac10e4ad0ce99597d01e3c729e7

  • SSDEEP

    6144:FsaocyLCxJy0823optx30uY4OifzyHFuNn:FtobQy089tx3DYfGzyluNn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe
    "C:\Users\Admin\AppData\Local\Temp\027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\inst.exe
      C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\inst.exe 4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe /dT131491501S /e4813309 /t /u4e9422ac-75a8-4a0f-9b5b-46785bc06f2f
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe" /dT131491501S /e4813309 /t /u4e9422ac-75a8-4a0f-9b5b-46785bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    1KB

    MD5

    3f4f56ba8e6d4467067ab67d38382af2

    SHA1

    507bdd129d7e01a8b3f6da087454d4638283b7e9

    SHA256

    24bcfb5601bfc7f9140013257df5767a2974e0f3182f7df060c026d3be21cc0f

    SHA512

    3e2a37b61cbc1d7d28d8c6ef772098b523af071e870348e7e233d01ceee52de72ece9445cb622805b283dc19cacfe83ac6f8508711432e3dd473fed5d3b744f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    a8c8eb8bf71ea727e35148b09b26fec7

    SHA1

    f4ab4a15766b9d1e7253ecbb20973af8affbdb7c

    SHA256

    21c9949032173647ca9cd7fd03822577e2eaeefa0954974f9dd8a9d7ed4c0e13

    SHA512

    dc04414bf8dd78dafef8d5582ced4c8ab9e466354c03ddaa3014c1400934692a4dbabbf6200616e5364b4a69ce4192f283852a126c1e938a1705cd005d0c6d55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    5B

    MD5

    4842e206e4cfff2954901467ad54169e

    SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

    SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

    SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    412B

    MD5

    99f6c429751585268df81728720b62c4

    SHA1

    401a23d667af4d7639b3e90a27b0514f5c0b1851

    SHA256

    f8e74e69e1a8f794b101ad6d661bf3d5637cd8a198a75473141e656e041d274b

    SHA512

    715a48db7516c773e8cc1e369db56c3cb196e2832aabfe97dab70ae50019fafc4d082480e7b649345eb5191928568192c7d36238b25bc461ceb41c4b557cdd89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    1d615e28530155789b6635f3173508a3

    SHA1

    14031a93aafd44bff164f80873a0da715c302756

    SHA256

    c7d365e696a821da7bea19e144fc77893d028b48a9e85873e438d46b7b8a1ebb

    SHA512

    3388b12c4cef66da2743ca0dedc80fa194625145b1017872c0e7c5ace7d555da0c597f5ba51207606fd55bef82f627beee579d59cfe08b0e9217618524f9260f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3d6880c30cdce7709405cee527e61f1

    SHA1

    e8981e8454ad61208cb160e9c5a1d7f0836bd6e1

    SHA256

    96243becb8f3a0c58460f49e1b1a056ceb2d89a2ab4ce0b7511e03583158436c

    SHA512

    3559805b0043c425488e045e9ec05771068a3f18aaad67d0d9a7d4c7b1b20feacc496ffbcd9ab27e1bb6f1324cb5a8d2ff66bf230b394eace75dca3fd149a37a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    9b482c8bc973c169e2ce63ac13faaef0

    SHA1

    e21f412241adf227fd13387bb3c30d5b9153febe

    SHA256

    f7438af04bc86da07569ca72d299464cf5057866c9a919048aa6cbf3c9d5aaa3

    SHA512

    89efb7bf1adf800cd28c8b250dd7b0bebc67bbfb005f05faa3ca0758bca64ee16ae29007f0c62118a84b706a085e1316d20d0c381f3eddce8a83688aacc608e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    482B

    MD5

    7167e67056a889da7ecc2f58a30a9110

    SHA1

    d558a13afef8976eedbce2f667c7dd33c30efa70

    SHA256

    b9d82186c3d44b92c426662c2df715f942231a18acf7f73f2e76e74063dc94ad

    SHA512

    07f91beaa579e1bb912116186ee97622dab01efd8553701d10ff0c099153a947fc84c71ff8aa93e55aecbcdee2f7a4907695d12aa030607850008e6cab8af3cc

  • C:\Users\Admin\AppData\Local\Temp\Tar2C45.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe

    Filesize

    163KB

    MD5

    c79eb4f84596b7e43f7800b158c034c4

    SHA1

    23c3184f55dc9dce991662f5fd38d95054930f56

    SHA256

    a153b4705136b923cfc8fcf3fc7cee6539039f410abc99719ff5edb8ef3c23ec

    SHA512

    5f5eeeb35ecfc95fdf306c2e984ffc0c610c295b3e35fdd9f87d6f03362210e66155910aa16c31ef35162a39a536ee9e0c57463f3d5081e2185e905e9cd759a9

  • \Users\Admin\AppData\Local\Temp\nsy259C.tmp\inst.exe

    Filesize

    143KB

    MD5

    0f9c02df96da8a059c83ddfcfc0f8c6a

    SHA1

    2a3fa9056603c843a4c086136557c4ad9cd190c3

    SHA256

    56099fbbb997f4fdee7bcb8fabe62f3d49273028bcee7f12018e6c18b54af455

    SHA512

    1481ca881e19074da73a46009d35d12e4221ec6f8c9aefe007a0a9d12d52eef4db6c5a38dfda18922d0fffd519c15032997df1df7c79f93361650f91476bbe7b

  • \Users\Admin\AppData\Local\Temp\nsy259C.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/1312-105-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2052-73-0x000000001AC90000-0x000000001ACB0000-memory.dmp

    Filesize

    128KB

  • memory/2052-81-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2052-74-0x0000000001FE0000-0x0000000002060000-memory.dmp

    Filesize

    512KB

  • memory/2052-21-0x0000000001FE0000-0x0000000002060000-memory.dmp

    Filesize

    512KB

  • memory/2052-20-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

    Filesize

    9.6MB

  • memory/2508-84-0x0000000073F70000-0x000000007451B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-83-0x0000000000C70000-0x0000000000CB0000-memory.dmp

    Filesize

    256KB

  • memory/2508-82-0x0000000073F70000-0x000000007451B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-106-0x0000000000C70000-0x0000000000CB0000-memory.dmp

    Filesize

    256KB

  • memory/2508-107-0x0000000000C70000-0x0000000000CB0000-memory.dmp

    Filesize

    256KB

  • memory/2508-108-0x0000000000C70000-0x0000000000CB0000-memory.dmp

    Filesize

    256KB

  • memory/2508-109-0x0000000006510000-0x0000000006610000-memory.dmp

    Filesize

    1024KB

  • memory/2508-110-0x0000000073F70000-0x000000007451B000-memory.dmp

    Filesize

    5.7MB