Analysis

  • max time kernel
    46s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 01:34

General

  • Target

    MinGit.7z

  • Size

    16.9MB

  • MD5

    31714e7d7ae0399a08588e49e262e2a9

  • SHA1

    35b82704d99fc2683f4fb570953e7f83992f8417

  • SHA256

    1a35a7bc9af2cb68958f23280541bb054dfb898b0cb129344147fba9dd34bd42

  • SHA512

    59b5c9a832103f52604f0c175f08dee6a5283c17a71b92b8601bdd9640e1e937193dbbf09a311fe5318694ca2450c7a9d1ac73bc35b9adf31a6cd1590e945c04

  • SSDEEP

    393216:VWf+T8GLQMst+8PZeZxDh1wXT70WsN2s1BvhO5IyEFBWf1TIn:VTg/t+8RSFheX48ia5Iy4Bm1Ts

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MinGit.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\MinGit.7z"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Users\Admin\AppData\Local\Temp\7zOC1A1FC96\git.exe
        "C:\Users\Admin\AppData\Local\Temp\7zOC1A1FC96\git.exe"
        3⤵
        • Executes dropped EXE
        PID:2560
      • C:\Users\Admin\AppData\Local\Temp\7zOC1AD6DE6\scalar.exe
        "C:\Users\Admin\AppData\Local\Temp\7zOC1AD6DE6\scalar.exe"
        3⤵
        • Executes dropped EXE
        PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\7zOC1A1FC96\git.exe

    Filesize

    44KB

    MD5

    018138944515028bf1f627586c470d3e

    SHA1

    2a0fcf5df321ac993aa9d4236e9bee297a358a4e

    SHA256

    055d45062709673dae69f5de1e46b8279aa77a5807c07171d70aa54f9c8cb0d3

    SHA512

    ab268c399c5f61238e7be453195cb33605fab3a5d3003a651340f2a798d4d08352905a51e776f0fa492d665fa84380ec00ed2a7ed7a402572d9d2b3c0b2b37f5

  • memory/1876-43-0x000000013F140000-0x000000013F192000-memory.dmp

    Filesize

    328KB

  • memory/2560-33-0x000000013F3C0000-0x000000013F412000-memory.dmp

    Filesize

    328KB