Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-04-2024 10:11

General

  • Target

    71bcb10a37571ca7a49e688609c6c24b.exe

  • Size

    4.7MB

  • MD5

    71bcb10a37571ca7a49e688609c6c24b

  • SHA1

    019ac2fdeae050df4dbf0a381e83a30ae2ed5ac1

  • SHA256

    a4224fceb2207443ceca6084ae5d1494d1e5dbf4c83e88e456024026e709a20d

  • SHA512

    68f21b90604d94bba96091a2bd689f5a35ce7a31805f508e156346a9cbd757701c3e25c3b64370665756e67a8a1f4433272cb506b3a7f17ab1772970b7bf6649

  • SSDEEP

    49152:0EO2zT6t0eZ1xIWKlN997hVTtCHAzbWO5r8aZgiztBZN3bHZNBu2TgwUcYPtMr/y:0Bo00wxwlNbzlSk8FiptH7fgSD9UP3

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71bcb10a37571ca7a49e688609c6c24b.exe
    "C:\Users\Admin\AppData\Local\Temp\71bcb10a37571ca7a49e688609c6c24b.exe"
    1⤵
    • Modifies firewall policy service
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a73974a20e70fe146d946ffced120ae

    SHA1

    a8adfe1365b0045e63898aa0ac4c95a5cb352e9b

    SHA256

    21d6ef16c37cebaa637dd0282f4f88dfe28f1dee43d97e4554f3d9792b61a85e

    SHA512

    fbd2bfe6c0ae80c2146eb8acc9996c1289da0c27ec270a856d782294c4bba9e87ce775ec5f9f5b7be8a20b37b7c52542429e7d4a3e207a910b89101e8cd7d343

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b4e444b249d98d1a618464d4a65fb1fd

    SHA1

    e2747ec667c4bed3ed4cc6644933cab1766555cb

    SHA256

    d11220113f7f34d0bd09221db00d8efcbb37f39e837b26e5ed3495256f5ae208

    SHA512

    05acff3fed439ceba28c7cdce2281750c9bf6faf7f7d0ef041383a15534635b0526556c1bff447ae3c4ebe2db72d7466ddf892dfd398788307d6ca8d969c47ac

  • C:\Users\Admin\AppData\Local\Temp\Tar1605.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2316-3-0x0000000077940000-0x0000000077942000-memory.dmp

    Filesize

    8KB

  • memory/2316-5-0x000000013F120000-0x000000013FB04000-memory.dmp

    Filesize

    9.9MB

  • memory/2316-7-0x0000000077940000-0x0000000077942000-memory.dmp

    Filesize

    8KB

  • memory/2316-9-0x0000000077790000-0x0000000077939000-memory.dmp

    Filesize

    1.7MB

  • memory/2316-2-0x000000013F120000-0x000000013FB04000-memory.dmp

    Filesize

    9.9MB

  • memory/2316-0-0x0000000077940000-0x0000000077942000-memory.dmp

    Filesize

    8KB

  • memory/2316-119-0x000000013F120000-0x000000013FB04000-memory.dmp

    Filesize

    9.9MB

  • memory/2316-120-0x0000000077790000-0x0000000077939000-memory.dmp

    Filesize

    1.7MB