Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 17:24

General

  • Target

    0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe

  • Size

    6.6MB

  • MD5

    b8d493afa1e5ed5d0cd65d1ddd53ecb5

  • SHA1

    90d8397d8c2c194d5a20407606a8945f5982e10b

  • SHA256

    0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c

  • SHA512

    e7fc98d75331fbe393001b19bece92319c0d7151f8b737dac434676f33c8091726c19a44bd46eff6d2b5437a4367424f65e37fb2c69b023747be99fe9018f540

  • SSDEEP

    98304:Lv+9DaKkSQQMFDW7X6ZZwQQMFAhsWsQQMFDW7X6ZZwQQMFC1gA:Lv+ZaKkSpiWT6ZypqpiWT6ZypJ1gA

Score
9/10

Malware Config

Signatures

  • Detects executables (downlaoders) containing URLs to raw contents of a paste 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe
    "C:\Users\Admin\AppData\Local\Temp\0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe
      C:\Users\Admin\AppData\Local\Temp\0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe

    Filesize

    6.0MB

    MD5

    f36196522e6c5c3ba77f08bec584b5f8

    SHA1

    f851e33c46e362d91bf19c1b769194dc63e050e2

    SHA256

    ca4c350aff7d1eb4df6ada8991b716f112be2604a8ce2de7a67742e5f7efb689

    SHA512

    4121ba5fc829042efadf602dfa7eeea5aa4af89d87562d527a54e4cc0c3f3637acc53ed610c31e7c762c40c29d92e0b2ea212089464988418ac9cd3b9b99a618

  • C:\Users\Admin\AppData\Local\Temp\Tar286F.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\0a0548348bc0fa9cfb2d14fb957ca47358a4a5ab9c2aa2237629d63699b5ba5c.exe

    Filesize

    5.8MB

    MD5

    7c838ea05a8efadf47436d3d0a4ecb99

    SHA1

    4802161f91c6da11d40e281f99090a8453c6a1b8

    SHA256

    e26994891bcd7fb204c269cbb8a57417511dc0c8cffdce117d92c899ed612c30

    SHA512

    8c602e2c685d0b9080fdfc524718a52944d021489c9a059142f95ab283050a563700727c5d6eaee611a313deb1b38639bc281eb6f21bf338812bbd55111b3656

  • memory/1676-0-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/1676-8-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/1676-6-0x0000000003B60000-0x0000000003C4E000-memory.dmp

    Filesize

    952KB

  • memory/1732-10-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/1732-14-0x0000000002E30000-0x0000000002F1E000-memory.dmp

    Filesize

    952KB

  • memory/1732-11-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1732-69-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1732-74-0x000000000D710000-0x000000000D7B3000-memory.dmp

    Filesize

    652KB