Resubmissions

17-03-2024 17:57

240317-wj2a1sce3z 10

17-03-2024 17:45

240317-wbpx1scc3s 10

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-03-2024 17:57

General

  • Target

    loader.exe

  • Size

    182KB

  • MD5

    d5c0f4aaeda7fe68e2ecbf1f11760934

  • SHA1

    78848153f67e18cecf70dbf514162851949ae13e

  • SHA256

    cd914eaa47f3d00baa5f5cdee725baab2f7203403e12b2b624d5b4459254f7d4

  • SHA512

    d37e2f23ddbe5b5af04d08a375fcae1677a00a07a3ceb88fb6f85b419da769908d75e8796b994b7bc2e6aa6354135c4678a2c28b6a4060840acd4dd7df9b829e

  • SSDEEP

    3072:Rjc+GeTJtZD2j39iF+pEh61cI0UicdjLp/XoXUW6zveOWSNgEP:RTpA39iAl1d09cdpXoXh0eOzgE

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b9b94b7777d1358b283dd747174818b

    SHA1

    88d85f5b2b52e31f4fbe331c19483b3971541652

    SHA256

    e2c122a378e43c26a0409a99aa508d461ec8a4969c598cbd79829b960e466283

    SHA512

    13b3670c12ba4335e4b54c3d9d8b68a443181c827742d6c37f040ca932b4c9be597b4e1b6221c0a68fe17d15f9432b7aeb407080e558015104b62439e71c2b9e

  • C:\Users\Admin\AppData\Local\Temp\TarBF9E.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/1912-0-0x0000000000050000-0x0000000000084000-memory.dmp

    Filesize

    208KB

  • memory/1912-1-0x0000000073FB0000-0x000000007469E000-memory.dmp

    Filesize

    6.9MB

  • memory/1912-2-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB

  • memory/1912-3-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB

  • memory/1912-41-0x0000000073FB0000-0x000000007469E000-memory.dmp

    Filesize

    6.9MB

  • memory/1912-111-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB

  • memory/1912-112-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB

  • memory/1912-113-0x0000000073FB0000-0x000000007469E000-memory.dmp

    Filesize

    6.9MB