Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 08:30

General

  • Target

    deb9d365df024bab40f3850890892119.exe

  • Size

    120KB

  • MD5

    deb9d365df024bab40f3850890892119

  • SHA1

    12f590818bb9205069c0400c221adaa0469cf67a

  • SHA256

    9b99a936613cf106bd74ea54f846b4f7354096ce4f7079efa176be80046b7a26

  • SHA512

    586fb143f80fdd506ba8cc8b3c84457ea9e0200695f0f12ccfa3492518a52a19af6800c48b3e15875f9c3a10f56e946a43a02eca4051c05cac19754062fca323

  • SSDEEP

    3072:nQIURTXJceqgKJ+BCxC9sztWPSTDhpHAZSR7E/E:nsugKYit8Id647E/E

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deb9d365df024bab40f3850890892119.exe
    "C:\Users\Admin\AppData\Local\Temp\deb9d365df024bab40f3850890892119.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\nso42EC.tmp\downloadmr.exe
      C:\Users\Admin\AppData\Local\Temp\nso42EC.tmp\downloadmr.exe /u4eb7a918-1108-4455-aeea-4ae85bc06f2f /e2093569
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\Tar4CFF.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\nso42EC.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nso42EC.tmp\downloadmr.exe

    Filesize

    126KB

    MD5

    5354bb3388933a203f143493226d7810

    SHA1

    88c73777fcd26256a58841d727e32f6e8daa0b17

    SHA256

    8f2ad33a7c97fe6f91681e26e07d9688fc9d7dde238f44ed2a72c0e3b2fd7e38

    SHA512

    6c46a318c8f9971f9e83fbf2808d51d0b60302bfaf763b386335ffadf1040f4a1a941ce7f33fe5b8e4be16f01c8c2754e06450cf6390e7d4279b54561b7a1a95

  • memory/1964-19-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-20-0x0000000000C00000-0x0000000000C40000-memory.dmp

    Filesize

    256KB

  • memory/1964-18-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-85-0x0000000000C00000-0x0000000000C40000-memory.dmp

    Filesize

    256KB

  • memory/1964-86-0x0000000000C00000-0x0000000000C40000-memory.dmp

    Filesize

    256KB

  • memory/1964-87-0x0000000000C00000-0x0000000000C40000-memory.dmp

    Filesize

    256KB

  • memory/1964-88-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1964-89-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-90-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB