Analysis
-
max time kernel
46s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
MinGit.7z
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
MinGit.7z
Resource
win10v2004-20240226-en
General
-
Target
MinGit.7z
-
Size
16.9MB
-
MD5
31714e7d7ae0399a08588e49e262e2a9
-
SHA1
35b82704d99fc2683f4fb570953e7f83992f8417
-
SHA256
1a35a7bc9af2cb68958f23280541bb054dfb898b0cb129344147fba9dd34bd42
-
SHA512
59b5c9a832103f52604f0c175f08dee6a5283c17a71b92b8601bdd9640e1e937193dbbf09a311fe5318694ca2450c7a9d1ac73bc35b9adf31a6cd1590e945c04
-
SSDEEP
393216:VWf+T8GLQMst+8PZeZxDh1wXT70WsN2s1BvhO5IyEFBWf1TIn:VTg/t+8RSFheX48ia5Iy4Bm1Ts
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2560 git.exe 1876 scalar.exe -
Loads dropped DLL 4 IoCs
pid Process 2588 7zFM.exe 2292 Process not Found 2588 7zFM.exe 2888 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2588 7zFM.exe 2588 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2588 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2588 7zFM.exe Token: 35 2588 7zFM.exe Token: SeSecurityPrivilege 2588 7zFM.exe Token: SeSecurityPrivilege 2588 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2588 7zFM.exe 2588 7zFM.exe 2588 7zFM.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2588 2204 cmd.exe 29 PID 2204 wrote to memory of 2588 2204 cmd.exe 29 PID 2204 wrote to memory of 2588 2204 cmd.exe 29 PID 2588 wrote to memory of 2560 2588 7zFM.exe 30 PID 2588 wrote to memory of 2560 2588 7zFM.exe 30 PID 2588 wrote to memory of 2560 2588 7zFM.exe 30 PID 2588 wrote to memory of 1876 2588 7zFM.exe 32 PID 2588 wrote to memory of 1876 2588 7zFM.exe 32 PID 2588 wrote to memory of 1876 2588 7zFM.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MinGit.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\MinGit.7z"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\7zOC1A1FC96\git.exe"C:\Users\Admin\AppData\Local\Temp\7zOC1A1FC96\git.exe"3⤵
- Executes dropped EXE
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC1AD6DE6\scalar.exe"C:\Users\Admin\AppData\Local\Temp\7zOC1AD6DE6\scalar.exe"3⤵
- Executes dropped EXE
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5018138944515028bf1f627586c470d3e
SHA12a0fcf5df321ac993aa9d4236e9bee297a358a4e
SHA256055d45062709673dae69f5de1e46b8279aa77a5807c07171d70aa54f9c8cb0d3
SHA512ab268c399c5f61238e7be453195cb33605fab3a5d3003a651340f2a798d4d08352905a51e776f0fa492d665fa84380ec00ed2a7ed7a402572d9d2b3c0b2b37f5