Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 19:28

General

  • Target

    1e7a10a68786573c5460267391a8619712b2893b582cf688fb5004b1a6211018.exe

  • Size

    34KB

  • MD5

    7e2e99bfc8cc222b9290431eec856a86

  • SHA1

    729d4b1f330a6c67e9282083b1bbff799b1198da

  • SHA256

    1e7a10a68786573c5460267391a8619712b2893b582cf688fb5004b1a6211018

  • SHA512

    fb36a7267a1e6fccc2306b7509befb94290acd2d882109fb952c398eb554d6103576ad4aa77b55eeabda99c10882e5c6dcde144f61058f79b8b8f0e79260571b

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5eB:bxNrC7kYo1Fxf2rYi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e7a10a68786573c5460267391a8619712b2893b582cf688fb5004b1a6211018.exe
    "C:\Users\Admin\AppData\Local\Temp\1e7a10a68786573c5460267391a8619712b2893b582cf688fb5004b1a6211018.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1532

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe
    Filesize

    35KB

    MD5

    2f61b55e9bdc5ad4d2054e238923f6d0

    SHA1

    48cd392c84a602a7447ae6b80f028a7ae53b958d

    SHA256

    6d58d702e2a63bcd25cbeed918bdcc2105ca7fa48adb6b391ca99e9a80fbe928

    SHA512

    cff15bad71a68d3f9084e3a4dda460da0f9b160009f135ca93669eada4959919c708cc753461f8d78172d7991f6059794a1141eb6a3a725bdca922c0e15c9ee6

  • memory/1532-22-0x00000000002F0000-0x00000000002F6000-memory.dmp
    Filesize

    24KB

  • memory/1532-15-0x0000000000350000-0x0000000000356000-memory.dmp
    Filesize

    24KB

  • memory/2284-0-0x0000000000490000-0x0000000000496000-memory.dmp
    Filesize

    24KB

  • memory/2284-1-0x00000000004B0000-0x00000000004B6000-memory.dmp
    Filesize

    24KB

  • memory/2284-8-0x0000000000490000-0x0000000000496000-memory.dmp
    Filesize

    24KB