Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 00:52

General

  • Target

    e061691f0dbcc9fde5beaf64f210f70c.exe

  • Size

    385KB

  • MD5

    e061691f0dbcc9fde5beaf64f210f70c

  • SHA1

    8c6c087f3bcfa83ac7f0e6f770f6df4b1fafde16

  • SHA256

    3d2e30dde4841996188ea62b87434b53de52b737567c9fd3832e9781aab06553

  • SHA512

    24195e2b03b4c840edf0a54b3c9f13e038bf2cf6995f723dda92539130a9f1193533ead99bd485ef2705ad73d1c084e3185f62377895104c4f44994ebf7a5979

  • SSDEEP

    6144:LLTK+k2lqi39drRCvxlLZ3mrL93I/adApyBDDUKoN0D+lqkIbhI4R6eLXOxQmJ2x:L/k3H53mG/aupUDUKohUfRxXOx/QB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e061691f0dbcc9fde5beaf64f210f70c.exe
    "C:\Users\Admin\AppData\Local\Temp\e061691f0dbcc9fde5beaf64f210f70c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\e061691f0dbcc9fde5beaf64f210f70c.exe
      C:\Users\Admin\AppData\Local\Temp\e061691f0dbcc9fde5beaf64f210f70c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar81D4.tmp

          Filesize

          133KB

          MD5

          e237dac07cff6e177a56e8f2c75a8e32

          SHA1

          347026016b1d6c231c2c4a0cc7f9648d9a16b539

          SHA256

          b633b616215a903a4a76d0e8aa80ccd2b36fd01e44fad79b663964f09530f95e

          SHA512

          0c2830ff1428d036a02bbfbdbc6ec21ee44e023d9f2cd748d940d2fb1eac865be18b250bed1c7562bd2485a5fea3b2eab83cbe02563551cdc83086cf8b160518

        • C:\Users\Admin\AppData\Local\Temp\e061691f0dbcc9fde5beaf64f210f70c.exe

          Filesize

          83KB

          MD5

          8e574139ec65ef72f5bc119d052fcdda

          SHA1

          9b91282beeac13331e394ee3e75fc85de47ce4b8

          SHA256

          45311c5703aed2ac1188a652b57ca39fb610d87c8e0f8901b2f4e4599e12244e

          SHA512

          a7e4afd48ee3dc18ca1e28767eaa5a37a961515d05b73979206d8ecdc70dc9fd60cc650a90edd50f29d0ab5ca7b54eaa4d57bf32329d5731ad94f714326829e4

        • \Users\Admin\AppData\Local\Temp\e061691f0dbcc9fde5beaf64f210f70c.exe

          Filesize

          49KB

          MD5

          5633c162fc53689f6a8ad8a2a1e80a42

          SHA1

          7ad8d4f20b9538e02260de1bb2b82b1509182c18

          SHA256

          33e0d972956e46db398558cea9b5d76d89b4f51118e18660d2bad641737854c8

          SHA512

          3562a9ad4893fa18f247392701ed606590703d531f8a00a30bac7b25b4ec6bf54c1b4c8e8847d3371a9b2c818353f3717e4085082a3514fbaf9f92ac70f33615

        • memory/1940-16-0x0000000000240000-0x00000000002A6000-memory.dmp

          Filesize

          408KB

        • memory/1940-22-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1940-26-0x00000000002F0000-0x000000000034F000-memory.dmp

          Filesize

          380KB

        • memory/1940-80-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1940-83-0x000000000A5D0000-0x000000000A60C000-memory.dmp

          Filesize

          240KB

        • memory/1940-86-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2256-14-0x0000000001680000-0x00000000016E6000-memory.dmp

          Filesize

          408KB

        • memory/2256-13-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2256-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2256-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2256-2-0x0000000000250000-0x00000000002B6000-memory.dmp

          Filesize

          408KB