Analysis

  • max time kernel
    10s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 17:31

General

  • Target

    bypass pure mode/Loader.exe

  • Size

    678KB

  • MD5

    955a20bf9bbfc6a650f027d98de5dcde

  • SHA1

    4e688a55950cb668f8e644230ef53f1854cfa960

  • SHA256

    aec5fd78e242dbc6f94b87e479982b11c2d07f50b7008df3d735a45e765d9baa

  • SHA512

    737e384f576080acf8c549c349301d3aef913235a02ca065d4a06425d21779da1a8f6a198d399e386977d4f7d92e7083a2ae46a16362782716541e460908a957

  • SSDEEP

    12288:RD7/3BHTnGdBbrxr5kwvhnN9Lto9ghiJGZ/O:RD7/BHjGdBPxlfnN9LquhiuO

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bypass pure mode\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\bypass pure mode\Loader.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Public\check.exe
      "C:\Users\Public\check.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\onefile_2536_133578487466096000\sgs.exe
        "C:\Users\Public\check.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2356
    • C:\Users\Public\check_pic.exe
      "C:\Users\Public\check_pic.exe"
      2⤵
      • Executes dropped EXE
      PID:2400
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\bypass pure mode\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\bypass pure mode\Loader.exe" MD5
        3⤵
          PID:2044
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:584
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:684

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar4E37.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\onefile_2536_133578487466096000\python311.dll

          Filesize

          5.5MB

          MD5

          1fe47c83669491bf38a949253d7d960f

          SHA1

          de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

          SHA256

          0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

          SHA512

          05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

        • C:\Users\Admin\AppData\Local\Temp\onefile_2536_133578487466096000\sgs.exe

          Filesize

          7.1MB

          MD5

          098872a13a78f8257d851afccd0c2844

          SHA1

          2053648323f7e9dd5cb902e46b5ec4bc4c2ad847

          SHA256

          63068a96967ef87be04e63f5b10934e807f92f51700cc04aded591cf60f8d78a

          SHA512

          aaca8d2dfe8e16a5a17728ff954f76e625d9b14c4f1bdacb2bc9c8af87129f407e775c15f86c49858beb1310fb865add336dc7e00276afbf4fe14e22e5bf4436

        • C:\Users\Public\check.exe

          Filesize

          14.0MB

          MD5

          3899a0b48d9e8ea5e03620341e7629dd

          SHA1

          1810ab9cc98fcf63bdc56bd563c42c90fdfee822

          SHA256

          98cca85b218b970a6210c5200fad72f748b0c85cc7aab8aee5776015891bd61a

          SHA512

          5445636d3e505eba0fc69c8f27792cc82ff27f9c595cd72ce31cf7c334a83429f373d167a2be383ed4c94aeec5ad2a8eb51567d2e3ae34955d8170a8787cbfd0

        • C:\Users\Public\check_pic.exe

          Filesize

          91KB

          MD5

          2a6bcd471e17bf7e517ed75b3f96dfd9

          SHA1

          2a1318834be42e05de6c1a466958ce475b1bbb58

          SHA256

          939fed83d6381ce90f7e69833204f77be7134c62b0fef6f2d8e82722b1a30e9c

          SHA512

          f10bc9f91b0c3b497bb1aea79022948d56979f04f86d3992066ade731a776246231c93c1045a57c70514ddd1f3e0d87d9ec88f166f180667adac8f7c2619099c

        • \Users\Admin\AppData\Local\Temp\onefile_2536_133578487466096000\sgs.exe

          Filesize

          7.1MB

          MD5

          51e89f6bbe86994a8a2c36ea45262d7a

          SHA1

          15e83826928920c43311c1dde21774ccb709cb5f

          SHA256

          9416c69bd75dbe9499f625104354bf7880583b89f73f0c265e19f8ef69798d67

          SHA512

          2d44edc67d478e6330741a07362178d284b6d7bb1e76654f46920357b1164f6a62ba08423c3c36ec9a3806d42d1555a7580a076546f425cf3365d117d899fbd2

        • memory/2400-130-0x0000000000880000-0x000000000089E000-memory.dmp

          Filesize

          120KB

        • memory/2400-131-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

          Filesize

          9.9MB