Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 01:49

General

  • Target

    ed10cc5dec4c3b4a1a038667aa9ae479f67cf3b9b4d8706ad6673f0a0b51cd55.exe

  • Size

    31.2MB

  • MD5

    e4b1d4b879300aa78072382f9ba435d8

  • SHA1

    4cb6a0f8f7b736b755492b76bf02de0d4dac7f61

  • SHA256

    ed10cc5dec4c3b4a1a038667aa9ae479f67cf3b9b4d8706ad6673f0a0b51cd55

  • SHA512

    e8fe696b35ae0935c8f8ff27f704d27b2cd7c119f41e3557bb87ed7175beec42c3205d42a80948e9685d279e5fe8b438f86f1fd9875a28633f05cbbd92afb77e

  • SSDEEP

    786432:OPg0uCEav1f3sFAqux2TH2DZdkwqMQMGpjtE3/acDg2lb:OPwavR1JTNiVMl0jtE3ycD1lb

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed10cc5dec4c3b4a1a038667aa9ae479f67cf3b9b4d8706ad6673f0a0b51cd55.exe
    "C:\Users\Admin\AppData\Local\Temp\ed10cc5dec4c3b4a1a038667aa9ae479f67cf3b9b4d8706ad6673f0a0b51cd55.exe"
    1⤵
    • Enumerates connected drives
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2740
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F3520F22DEAD3117B6FC24F8A42EA1C9 C
      2⤵
      • Loads dropped DLL
      PID:1984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          bba008190296404d6af12e0a0049b95f

          SHA1

          30980b6d83883c17f8fbb1d3e149e566ab078327

          SHA256

          84738d2ff74336083fcf8158d398b4a23a8230ef9da60cd8e321f4c98bc770de

          SHA512

          d0c8f433811a5acd9acb1cae92b344f9bc8e266d1b6a7ec83a929a63ae83f5a61b03827534803833dd7eb2ffac162ddb2219485331fe41bc57cc102bdce17301

        • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_2740\background.jpg

          Filesize

          36KB

          MD5

          0c14c8699392570459d74ecd6507f626

          SHA1

          eeb71c9ff163286eae909acb4bba1b2b3ba2fd8f

          SHA256

          0e0dbf8d2421c731c4090bad3491a4cd172656692f5689f53aeb7a9eb810fc49

          SHA512

          f775c3e7b2ca62a9f2875fdcbe4a47539bf842c6b9cd44e75e94040c2470190f978c780a84f14ad95763df0a4b707602daa69cc448ac52723e30688723086ae5

        • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_2740\collecting.jpg

          Filesize

          17KB

          MD5

          19244252d0d00807a8541a130f0b81ce

          SHA1

          e94e23f72f8b5bee03a9b601210a52074d770055

          SHA256

          88395e25f6a70825dd0f9a4a3c797c312f4f255b2263e55408ac3aeda5a9a898

          SHA512

          a133de2cc7dfe14d485bff54d0459554f2406e7868c9e564657b547195658847d3dec67826ff9345fe620c1a06ea72bee03be84f533eca01ffa197adcd805e7b

        • C:\Users\Admin\AppData\Local\Temp\MSI134F.tmp

          Filesize

          191KB

          MD5

          75ce66c3dbafa4d9c28dfbe8444b531b

          SHA1

          41f02f9cd2d0e6e057f098eed9ea58d1688959fb

          SHA256

          5de9315cf75f41dc5c68cccd6dceff82c40c2df40603d971ae6160ba27fb6ff4

          SHA512

          503254263a11cfde3d359378ab9d081c040bb74b1354cc03ca525649e842a7b2fd9b26d4a5b3e154874725fd7da6645d9be050ebff4516140f328b141e255642

        • C:\Users\Admin\AppData\Local\Temp\MSI146D.tmp

          Filesize

          311KB

          MD5

          9d1fd3d83a4bb941ec09b783d2567870

          SHA1

          1c4200535f6155c200c86f64aca3e4797777d3a6

          SHA256

          e39af9ce11bebcebd341b02a5643e95291043cb953549b24eda81651dbff9352

          SHA512

          15b54b25e4cd5e7d8e00309eb93a657a96d6f6660492be05b88952b4d4b712762becac37d692377b83c0b55b2f8fd8e988858ce8bfe6bef3353a4fba24e4e37f

        • C:\Users\Admin\AppData\Local\Temp\MSI148D.tmp

          Filesize

          372KB

          MD5

          87ffb90a62fe7deaffca142768a138e0

          SHA1

          82a7c5f3104c506324e14a9f0d949aa59291efd0

          SHA256

          7b7fa29cbf7dcd39e02e3351a712fbc8d0e816b3ade6ace900358516448df2b5

          SHA512

          29c0c188ce5f493479095adffd69648420f5c8f40746df68bbe26d8de36f4688edb71aaee4a703e845e014a9116ebaa37401b9fd5695770e2964f626ce060310

        • C:\Users\Admin\AppData\Local\Temp\Tar10F8.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Roaming\Maxxtuning AB\MaxxECU MTune 1.104\install\7D57636\MTune-installer-1.104.msi

          Filesize

          1.4MB

          MD5

          9cfdcba0713056c61a5eba26064beb67

          SHA1

          4b0a25ecec89f8d381f543be1c30049641b41921

          SHA256

          422008b564ff89495b914f8f609884eec36b1c1b2cd04205648300bfd5cc0c54

          SHA512

          d69ab37c8708bd265b3914ec45896f2d86462e620c63e59ada38b593b405ddbd95f4703d3231fecd425ce7727de2bcf1d82f7e7fb50c3ab460ecf69bbe27ce5e

        • \Users\Admin\AppData\Roaming\Maxxtuning AB\MaxxECU MTune 1.104\install\decoder.dll

          Filesize

          145KB

          MD5

          e15ced48833a7feb9057965debc63daa

          SHA1

          73518b13e8687f4aa786d9de0c56aeb7e3c47276

          SHA256

          32ae7bcbb67925e1ea6ced1f052405e2542ab36ca8c10a854ae2fa0b14f0db96

          SHA512

          f2a73c51908de4b1e1345a7b8be693275bc654326ab206afc0f3e093f691bcb3889c6d0aa27a679a89c3c93f94c816255fd690a82b5c2a98eea477d283621f28

        • memory/2740-0-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB

        • memory/2740-246-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB