Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 14:37

General

  • Target

    c39d86fa0e621796f6ebfead6a94929c.exe

  • Size

    292KB

  • MD5

    c39d86fa0e621796f6ebfead6a94929c

  • SHA1

    f8ee4dcd578dd9bf768874bc8d83232142753d5d

  • SHA256

    23ac1cc5389359ca2db660813760237473fc523f0b68caa183117e724b7ba2ad

  • SHA512

    56531664916b4547392b330ed3c836ca0bfe4a9b86750c5a59633898ccb7290138b4742b409e3186e6f4c186f68e6d8f517c26a756b13ea7ad1a13aefb7abce9

  • SSDEEP

    6144:sZ7b+VMOpce2nu8Cb9JAUworceODRhjXd4nY3PqgKw:0O/WCb9JLsMaqg5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c39d86fa0e621796f6ebfead6a94929c.exe
    "C:\Users\Admin\AppData\Local\Temp\c39d86fa0e621796f6ebfead6a94929c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\CMD.exe
      "CMD"
      2⤵
        PID:2464
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:2516
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 228
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:2952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\Local\Temp\Tar1193.tmp

        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • \Users\Admin\AppData\Local\Temp\c39d86fa0e621796f6ebfead6a94929c.exe

        Filesize

        292KB

        MD5

        c39d86fa0e621796f6ebfead6a94929c

        SHA1

        f8ee4dcd578dd9bf768874bc8d83232142753d5d

        SHA256

        23ac1cc5389359ca2db660813760237473fc523f0b68caa183117e724b7ba2ad

        SHA512

        56531664916b4547392b330ed3c836ca0bfe4a9b86750c5a59633898ccb7290138b4742b409e3186e6f4c186f68e6d8f517c26a756b13ea7ad1a13aefb7abce9

      • memory/1748-1-0x0000000074FB0000-0x000000007555B000-memory.dmp

        Filesize

        5.7MB

      • memory/1748-0-0x0000000074FB0000-0x000000007555B000-memory.dmp

        Filesize

        5.7MB

      • memory/1748-64-0x0000000000350000-0x0000000000450000-memory.dmp

        Filesize

        1024KB

      • memory/1748-66-0x0000000000350000-0x0000000000450000-memory.dmp

        Filesize

        1024KB

      • memory/1748-92-0x0000000074FB0000-0x000000007555B000-memory.dmp

        Filesize

        5.7MB

      • memory/1748-91-0x0000000000350000-0x0000000000450000-memory.dmp

        Filesize

        1024KB

      • memory/1748-90-0x0000000000470000-0x00000000004B0000-memory.dmp

        Filesize

        256KB

      • memory/1748-2-0x0000000000470000-0x00000000004B0000-memory.dmp

        Filesize

        256KB

      • memory/1748-89-0x0000000074FB0000-0x000000007555B000-memory.dmp

        Filesize

        5.7MB

      • memory/2992-73-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2992-78-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2992-79-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2992-81-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2992-77-0x00000000001E0000-0x00000000001E1000-memory.dmp

        Filesize

        4KB

      • memory/2992-75-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2992-71-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2992-69-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2992-67-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB