Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:58

General

  • Target

    622b6a79d716e260085c2f4620c468f35a8f34c93afefef72ec9803ceb92f464.exe

  • Size

    22.1MB

  • MD5

    eec7acb2566e097fd6b4315c16a83e8e

  • SHA1

    c16df7bf24443f63b05bbe4cae7739eddb54bd1c

  • SHA256

    622b6a79d716e260085c2f4620c468f35a8f34c93afefef72ec9803ceb92f464

  • SHA512

    7f68df8015f650963b1498c635260e0a22e33af520c8d8abc02d047a085964c486c5ea21307bb53dbb87d0e8ccf7a97f933b15044348ca49114b4b4baef7afb2

  • SSDEEP

    196608:baXjzQFURtw0xOwM2g02RtwN7wq1W6HqULS8djZDTaNNeCKVP5ORsgQf4RtwST:IfQFeS0xPM2g5SN8qU6GOjQoxasPySST

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\622b6a79d716e260085c2f4620c468f35a8f34c93afefef72ec9803ceb92f464.exe
    "C:\Users\Admin\AppData\Local\Temp\622b6a79d716e260085c2f4620c468f35a8f34c93afefef72ec9803ceb92f464.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\85b75c4b-d98d-4de1-ae1d-78fa6833206d\Immersive_Updater_CP_1.exe
      "C:\Users\Admin\AppData\Local\Temp\85b75c4b-d98d-4de1-ae1d-78fa6833206d\Immersive_Updater_CP_1.exe" isready silent "chaseplane|null|C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Users\Admin\AppData\Local\Temp\85b75c4b-d98d-4de1-ae1d-78fa6833206d\Immersive_Updater_CP_1.exe
      "C:\Users\Admin\AppData\Local\Temp\85b75c4b-d98d-4de1-ae1d-78fa6833206d\Immersive_Updater_CP_1.exe" download silent "chaseplane|prod|C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcbe7c9a70e7969582bca7de633b4139

    SHA1

    71e33bef8134863478a88398e76315c1e8a9dd57

    SHA256

    bd65aaa3332b5b3f52358eac8ee0f0e07e93f58412a383b397952379072ce8b3

    SHA512

    dfbf0ffd2deff9e2fa878c70fd64ed3647d0dd2724faf45caa8d7d1d6eadc298e3794ddb891b7ca10596f86a2fb87618aaf6709a42a16f2a6d9ad6ffa0aaa7ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5fe87a949b3b2b5af0766ddf974a5cb

    SHA1

    36444e8a7ffc34eb4aa2fc8e70dcb566c4d53378

    SHA256

    368ddfac656ec97480b260b5aade7b39be64fcee38b8a9d2564c55d97dad2f3c

    SHA512

    b924a65313a5e241fd95e2aeefb7b76f5a80b9706f8053b92df6c26c52a4bae5f435a25f414bfce29f00a80b6665a3bfb2c4d164746a193fe71c7046b0a8c226

  • C:\Users\Admin\AppData\Local\Temp\85b75c4b-d98d-4de1-ae1d-78fa6833206d\Immersive_Updater_Log.txt

    Filesize

    330B

    MD5

    7d22df79cab29a8f49b8bdf48a7e606c

    SHA1

    84708f011b603612d58b85cb74d669867eed0028

    SHA256

    f02139a8a591130bebff6821732b988c1572a7d02388941dbad2ce914a1a492f

    SHA512

    84c37ca018c2c657cec0bfdbba814609dd8c66480e45310d7807896e91413ee2ca69b73bc656a72323e7641b70a6d74cc7300d3afda922ffc2444527b31f232b

  • C:\Users\Admin\AppData\Local\Temp\Cab341D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar351D.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\4e2f844d-613a-4e12-ae91-805483af6972\Microsoft.FlightSimulator.SimConnect.dll

    Filesize

    106KB

    MD5

    b9e0a00c2067cdf6b6e10a8f8225b3d0

    SHA1

    47f065036d771a560c4b3c52c4bb3cc04106f655

    SHA256

    68e153c1be4c24939dd0136052a22dde9c22e056ee6931bc2d5b408a508002c2

    SHA512

    854d07825549e0af96be8b70c1971460bbeacf9908e22bd642719359e5ac75f437ffeed47019f08704eb7b55283a1d5a93075b0e35276c6e31350b5a9ba22599

  • \Users\Admin\AppData\Local\Temp\4e2f844d-613a-4e12-ae91-805483af6972\SlimDX.dll

    Filesize

    3.2MB

    MD5

    955ddb844ce2bf3d83990d0cfde4cd6a

    SHA1

    35da81e1decb21cb1c698035d5804379a0ebed21

    SHA256

    f23ec20aeaec149ba963d1fb03af3ea1585ccdf1ac207f315361a80ceaadcc05

    SHA512

    7392aeda6ef46458d5ecf8e56026c87fb37d46c2016ff39e988873ef8089abd1ec8ee976f4e23c09c1f0d1c9138556b77e17cae683202705a9bc8441724e4bf5

  • \Users\Admin\AppData\Local\Temp\85b75c4b-d98d-4de1-ae1d-78fa6833206d\Immersive_Updater_CP_1.exe

    Filesize

    3.2MB

    MD5

    37bf61c79b3bab0aadc74238777dda1d

    SHA1

    cfdc947f98fbfb8915692fab0f3b08488b762e50

    SHA256

    e215cca07bd868b59eafe1a397b20ec65723e6ea979de6a8849c2d7fd0972a1b

    SHA512

    3e5d3e68c541f17f61892d4c242eece19eab9e584a2f46eab532907a27ab9f1dba0eccedfd3b36110061c9a852791a6e582115dc12d0a8bb0aebb9dcfc306a6f

  • memory/2068-102-0x00000000082C0000-0x00000000085FF000-memory.dmp

    Filesize

    3.2MB

  • memory/2068-113-0x0000000006860000-0x000000000687E000-memory.dmp

    Filesize

    120KB

  • memory/2068-150-0x0000000074BD0000-0x00000000752BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2068-149-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

    Filesize

    4KB

  • memory/2068-1-0x0000000000E10000-0x0000000002426000-memory.dmp

    Filesize

    22.1MB

  • memory/2068-121-0x0000000006AE0000-0x0000000006AFD000-memory.dmp

    Filesize

    116KB

  • memory/2068-2-0x0000000074BD0000-0x00000000752BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2068-116-0x0000000006860000-0x000000000687D000-memory.dmp

    Filesize

    116KB

  • memory/2068-114-0x0000000006740000-0x0000000006748000-memory.dmp

    Filesize

    32KB

  • memory/2068-115-0x0000000006810000-0x000000000681A000-memory.dmp

    Filesize

    40KB

  • memory/2068-0-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

    Filesize

    4KB

  • memory/2068-92-0x0000000007480000-0x000000000753E000-memory.dmp

    Filesize

    760KB

  • memory/2068-93-0x0000000000B10000-0x0000000000B22000-memory.dmp

    Filesize

    72KB

  • memory/2068-94-0x0000000000C60000-0x0000000000C68000-memory.dmp

    Filesize

    32KB

  • memory/2068-95-0x0000000007680000-0x000000000772A000-memory.dmp

    Filesize

    680KB

  • memory/2068-97-0x0000000007F80000-0x00000000082BF000-memory.dmp

    Filesize

    3.2MB

  • memory/2068-96-0x0000000003830000-0x0000000003840000-memory.dmp

    Filesize

    64KB

  • memory/2068-3-0x0000000074BD0000-0x00000000752BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2264-9-0x000007FEF57B3000-0x000007FEF57B4000-memory.dmp

    Filesize

    4KB

  • memory/2264-14-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/2264-10-0x0000000000EC0000-0x00000000011F8000-memory.dmp

    Filesize

    3.2MB

  • memory/2264-11-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

    Filesize

    9.9MB

  • memory/2264-12-0x000000001B630000-0x000000001B6E0000-memory.dmp

    Filesize

    704KB

  • memory/2264-13-0x000000001C530000-0x000000001C79E000-memory.dmp

    Filesize

    2.4MB

  • memory/2264-17-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

    Filesize

    9.9MB

  • memory/2264-15-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/2452-25-0x00000000026B0000-0x00000000026BA000-memory.dmp

    Filesize

    40KB

  • memory/2452-23-0x00000000009F0000-0x0000000000D28000-memory.dmp

    Filesize

    3.2MB