Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 08:41

General

  • Target

    a9b5f922042406e16958e8e4cc7fd2ba6e379e8d9ac7820e0cd05f6c01cb8d46.exe

  • Size

    6.3MB

  • MD5

    8f0aacbabb588a50b46b7d29ea9e51be

  • SHA1

    bf3d6459400c150126c194f677928c222184e4ac

  • SHA256

    a9b5f922042406e16958e8e4cc7fd2ba6e379e8d9ac7820e0cd05f6c01cb8d46

  • SHA512

    7138818db291b61da6f9a4ac9fce154f89cb0057783541c60a92015f1e532657302ea1ec38873edea3accba060f099749846e643a0c6e898c077f47bcc48e37b

  • SSDEEP

    98304:tQz23M+mf7sMby8K5tmLcvJqiZLhUTRm1r+nretjUTvs0eZyndr+ZmrImp+tQ2:4/by8etNR5hUTQ1ynytjUVdr+wi1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9b5f922042406e16958e8e4cc7fd2ba6e379e8d9ac7820e0cd05f6c01cb8d46.exe
    "C:\Users\Admin\AppData\Local\Temp\a9b5f922042406e16958e8e4cc7fd2ba6e379e8d9ac7820e0cd05f6c01cb8d46.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIIgnition.exe
      "C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIIgnition.exe" -install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIGuardianSvc.exe
        "C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIGuardianSvc.exe" /escort 2840
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ign25FA.tmp.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:1388
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ign2677.tmp.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:2072
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp.cmd" "
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 2 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2

    Filesize

    727B

    MD5

    1d57fe888a08faf5d90175cbf4bda3c9

    SHA1

    68390ace526959ba141de514daa9d6e1ab6145c0

    SHA256

    822a5e1f10da72c021b0249ec3297cd364ebe7442dd275f759819c755097da8d

    SHA512

    0049f6cad99f04968d2ceb1f87018f42340f7d9444d8a86c7ed502f25a28cc9f8b314c13b2908bd34b0e3d9cc2588187c9ed2cf60ca552210e787393add3f296

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    456a3fbc38e97b61f6b2c929e1ab6d83

    SHA1

    1cb87def8ea24a89a52f58d33e7a7f32114c0c58

    SHA256

    97c953d75a583eea1312d945bc6484dbecb0f485aa678d1fc6f7de19d3312839

    SHA512

    11f5e6b5cc7b599011e628f5bad9b5f328362040b4ca3d0ecd66ce484e06b2d71f08260624fcfe31dd27786b8a701b7b5048bef96a6429958110af7124d40d85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA

    Filesize

    727B

    MD5

    8482af08290e060fa761b6e981457e37

    SHA1

    6f1f818f5085ccfe169badb2ebe5b9d31e933e92

    SHA256

    d0b56ff3574c8f4d46c8a464fbb795be456e9e83d6f5df206eedd31bec3d0d68

    SHA512

    9aa4d8c823163eb318808215804327cbb75752f96e51a4d4c020df113329945d6e579ee91ce18585afd8f776917b1619ff9ec6da9483bac454de86e80526daf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    72c6192089f9b15261522e27464582b9

    SHA1

    d0885da01362606a6e1684a6f9b0b6150cd6b3b4

    SHA256

    5684e9426aca2cc088a9e34d489880b3f9d6d415c320e8c2f9e814c418265f9f

    SHA512

    6a429542e05fb67c4f49c51da80971fdf473202566a4a5c31ac8d7989be2ce0131e3c1c5d608f3e743f4194f6c5d330228fa62c16ac7aa0ff5197ec819f4558c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB

    Filesize

    727B

    MD5

    decfed35d8581d96b88ef3f545093133

    SHA1

    5d4c65cfa67ab73ffe5c54386d6d1463b5cbdc83

    SHA256

    687d8e42f59f282120b688efbc486140dfb925d8cb6f98a897826fb0786e2199

    SHA512

    8a56c68252be8c04e0345874c3714f6db87e3c4f764f8b60738884cb100eefa3aba050677e4c508366200974a4bb4dbdd18c5e928a3024ec97fdd2056e5d1553

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2

    Filesize

    404B

    MD5

    28303109a40e7b9e297b71352ff0f390

    SHA1

    bd1c3bf824725fbfa209f0effafd32f5a14e957e

    SHA256

    575abf0ee0c82d530baab5d66ffff5367496f71411b124374728fba09cc061a2

    SHA512

    f02ad25e0d70c6d9e0d44a8ae2821e2ca055a0f3f70336933bfd4ae783d36c8daae49f8544095c15ea78dd542934355d94ab4fe7520c9ce64eee8bddd7ab24d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    a1db82dfa77097f9af432e0011ee0033

    SHA1

    bd5ec935fec0e4cc8ae3fee8bd190fcc22d7ccca

    SHA256

    26988fb10f5e43108efb50e886a17341d6565c686846aca15f64d72bee07b9d3

    SHA512

    a95bca1332aea1746ae0754fa10740dba632da534b1390cb5675803a8cd2b806197f8a467459f745967e4a831cefbe09c63f416d4ea15201c15f76ec3df3369a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA

    Filesize

    408B

    MD5

    24305de57e07a96f0b14553f1edb0a2d

    SHA1

    3c1202b0b7d7d62db79d767384943fd7ddce62fa

    SHA256

    5742d96ba73b0ad962233bc0ca62194791774c442389de33dc906bf3c386ddf1

    SHA512

    456b0d39aa5316538fa7d7fab9be7ee726de41122815018f1928b288f10586c6b670b58c296c16b101d2442048fbb287e9055517e5048660cbf0f742c95cc6c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5155d3aeb2251b79ec32333bca24501

    SHA1

    f86f19373b0b9c27ba12788cb89fb6e31139a22e

    SHA256

    fa5b0d83d21fe11761381ba47d60b292652fbfd63fd26b68f2b38ed1139f3c95

    SHA512

    7951941efa0d0c351838468dae0120fc3a4510c71a124ebb29cc01037788cdfc9adcb744a251814936969c8819b2ab5af360572e75b1cbb067964383153e04e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    c188040a3ddbfa85a6608c8b265219ef

    SHA1

    eb04b2fdd8cc30a71f61e84f365899437d19f19c

    SHA256

    b7ec7dc2ed06c06dc23e1b23a0401d6c951042ad62f9e893eca27271cc4729ba

    SHA512

    4fba72037d85de28baebf702d4d8a7050954cd9fe64d523af6be835afe561ffe4deb990c7f048145497ae19135f9c35416f28e7f10399b02083a9ba69a4dff32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB

    Filesize

    412B

    MD5

    f0aff6c86339bafd041bb08d5c10fc27

    SHA1

    b66811911b37038dc9e5fdba6d491b14abb45f97

    SHA256

    434d1481937fb5e7bf5090ee61f2eaddd6e6920124cdfcdf090e25a5e5dac299

    SHA512

    8e0c92b1c4a8d99d2d9a47f6e28d6b68cc198aaf47558e56564f412ece468f98b8a0cea25b3ceff04bd8e106ff589b4c051d6887c5c80c1750150f9b9b8d73d0

  • C:\Users\Admin\AppData\Local\LogMeInIgnition\LogMeInIgnition.log

    Filesize

    2KB

    MD5

    a53622b5d1e9857178df7eae28d3ab38

    SHA1

    ca41c2f5829c72c8d82dbfc79560cce8a1c21d9b

    SHA256

    9c962bdcd5f091b3d25c51ff7ba8f5d2863902a352da111cdcfec63a0faa0da7

    SHA512

    663a7f1af989dc301912b7099a852332b5670ac998c510b1854b91349ec37b7aaa3be501d517f89ca7fd7165951f87063e791c3bcf43e228b4b62f6caaefb04e

  • C:\Users\Admin\AppData\Local\LogMeInIgnition\LogMeInIgnition.log

    Filesize

    3KB

    MD5

    7d86b18dccbfecce1fd9bea517b1cf6d

    SHA1

    f40b766a235c5b88d244b15b4829f27c66962c65

    SHA256

    ea9bad814e7b46c81265b7e7797a6255a8a72e13013ff9d6a44ec4e2d9047ec3

    SHA512

    85a8946b42eb3be26c558aa00edef6fbdd3e61e20e0ce3d3fdd5f3b856a6f1c98b837359fc541ce4190ebaaf6cb860ff65ef49baf1bbaf47c642011c8ddf4d95

  • C:\Users\Admin\AppData\Local\Temp\Cab18FF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp.cmd

    Filesize

    333B

    MD5

    f16fa5d627e8235b2f0849665180ee65

    SHA1

    c19dfa0a8cecbf45edaa084ef8c66f9b4eaeba47

    SHA256

    2a81e62b0b041cb3763a1f4424727d29b566b30a5fea4925521207f50b25e5c9

    SHA512

    65f044c7ab0acaea2ea055f4ddbd45014f85d513d01014cc5f8844bfd2e80eee417c716e1e40940138a8a8430e98dabb2b3ee0c7a358dc6315ce6427e1865c73

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIGuardianDll.dll

    Filesize

    1.8MB

    MD5

    3927bb634871eef922dc98d60a8e8449

    SHA1

    be9e767d862a4a51cff89bf09e63bd17172885f3

    SHA256

    a746050d2f5fffe6c0bed3384e18c53b7001fe390e92fe1586c8bd81bad35ba6

    SHA512

    c8d32a283b1d01d700ac6c55b5589a4e15764bb176682b26dfeeda80ee2f3c5f7fa6709d472a72d475ed117bd90efcb2fedb772193fc8a585369b8bfb800156b

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIGuardianEvt.dll

    Filesize

    309KB

    MD5

    67679291e54fc11d5175e16485bec006

    SHA1

    ce72f3950c1c7417e8f8556818614acb19822ea8

    SHA256

    3143a048c2c2caa1d6871856d1f1bc73a315dc4c22ed163328e7d500b89bdde5

    SHA512

    abf5dbd3405ae868c1619eddd7cbd666d171a61b9cb0a530a55bf364bf0f1a6de658b84297e81e023ce069a9711fdcbb72f8ad5a342081cc5f562be4b57fa078

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIGuardianSvc.exe

    Filesize

    419KB

    MD5

    fde1c6ce73d9aa9656ab49981b51c201

    SHA1

    8ae4829ca1ef3b26268bb62479025617b02cf2b3

    SHA256

    80e747e83329333cf6ba7358b1626724eb9b3886652b79229c9cf4a7435feb21

    SHA512

    df34b8fccb67f3cba8d4c4e0e554f4a71e49d54b4f6ae56e5eef826a64a7da6b9bdf1a37e914269d9b2e50ae149176388ae9c73f802a6d9f0baa6416e4bfd59b

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIProxyHelper.exe

    Filesize

    74KB

    MD5

    709ba5e80c9cfed72a838f3b2b76b93d

    SHA1

    abef7aa6aa77e404df29f8682c28f9e97f80a6c1

    SHA256

    64f223385570a51f63a534137d6823ed06ff45eb26a962337a9a7115fb522258

    SHA512

    cfba0cc656f2a8eadafbcb95c255c6ef6aca38cd3b037a43ae508f1f7cba3828c105f692e82936a13ad28f32b43ba0f1f919070e08963651cc3a0c938c521b03

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\RACtrl.dll

    Filesize

    7.6MB

    MD5

    285860a070f3b25286a7b13604117ec4

    SHA1

    4a42f236686a57324b0c218914114b89a876309a

    SHA256

    3d2de215b93c70f8a020d5dfcdcc066b7db672c7a0f72d0b64054de079ffe6ec

    SHA512

    ee0eacf86f40a0a2f10c7cecaa8da9938462c3d36427cc651737ffd8a52a2e25702847073ecc81958e770f5f4f0ff56e589a9fba90cc63e792c58af626a123eb

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\WebView2Loader.dll

    Filesize

    109KB

    MD5

    3c8a0d5c1e67675feefe87b6c42835ce

    SHA1

    69fa501939636e98620444fb3eb35605ff175379

    SHA256

    5586f7ecbbee2567de5e4ed10080e9f1b307afc0fb6278801f7e9da3075b5339

    SHA512

    788aebb7a920d13dfb128116676f5a948e9c7a46ab79e4aa8e734605c5ec29c50db7b7bbba3ccf9c63d70d01bf66d6e242ba2ba3d04a63370a156663221d1e72

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\deployinfo.txt

    Filesize

    130B

    MD5

    8da7de96a70f4e9f277e8657420d2f7f

    SHA1

    78b19a394fd0aed0f3a7aad777a2d9176721b3dc

    SHA256

    3cc939a7a0fa2011a6aac85407787636e874f883cdb35d96fbbf93401c8b73f9

    SHA512

    f41799658783532db7606b40db561116a672722ae8a402016aaf377bc82209a50d096b68905d0a99b268fde93dc4d6dca059939af4dde1f7a8b5e83c62ba81ab

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\ractrlkeyhook.dll

    Filesize

    13KB

    MD5

    e80263e744f96af8bb4ce237e9c07763

    SHA1

    77fdd7fdbf11929ee465e6e3c822ab3b948dc998

    SHA256

    43b049ea9a3f1e01a01aa2bab140c0ecb5c69635bf8c20551ac31dc01b2248ef

    SHA512

    d8b96c34f5c7cfd1361b0816e4dd16351bb55f254832b60c7710b3e755c4ad0cd9053ae2e3c81d9f28697ec4dc9fed484347fb587abc88de2d588649c5e43241

  • C:\Users\Admin\AppData\Local\Temp\Ign15F1.tmp\webview.dll

    Filesize

    396KB

    MD5

    f7c1c50906af8edc249a40865cd38c65

    SHA1

    bce0696e9ee9b66a2af4b059fdbde7a3795d09ce

    SHA256

    5632dad07e020c9a6a3eb4eeea986406e455c6be7dfd5da55347499740b50d7d

    SHA512

    f8614e1ffcd00092fcb161a02cc1050763bc4abe31d47500eda7b1c3cc66a528f93e6dd320c0c37a84e317f1f03d6c682c232f813f5ce51f91571578593ac007

  • C:\Users\Admin\AppData\Local\Temp\Ign25FA.tmp.cmd

    Filesize

    957B

    MD5

    2b4c309e5b480c532c1a34c62c24e7d4

    SHA1

    fd825f3a63e919bb70204fcea1bd793bfd10ea36

    SHA256

    5a997c0bdfe2e17c1384a7ae137cfa103233d98a84c7b81f5ba0254b637577cb

    SHA512

    78df7cc533b6e4378bfc2784954ebe1328531f260d1cb97f57394d21d2c5787ab48b097ef9086f55fed26f80e8f940503800c2fe7820ef9b691fe07b2931edd7

  • C:\Users\Admin\AppData\Local\Temp\Ign2677.tmp.cmd

    Filesize

    957B

    MD5

    a7becf283ae6db376cf9de4a374c44d8

    SHA1

    b5701f99f5d0cb845b3e6367953c1e1f7bab7a1b

    SHA256

    1dc5dfa275b9b17e39dfd80bde75930df165f218e483f81d0bb2899d73b1d97a

    SHA512

    e6250cd3335d59576978fd071f5377cbfa86e802512fc5792530b49c898c85fa666fc3f3039625202f5259660a82e9980f5a8278eabe2a912959afad63827359

  • C:\Users\Admin\AppData\Local\Temp\Tar1A59.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\Ign15F1.tmp\LMIIgnition.exe

    Filesize

    7.0MB

    MD5

    81ec0a0308bdf96741d4c9212b9162e0

    SHA1

    cdc6758218a3b32f03e54a8c196a3ef12d759481

    SHA256

    b39614acbf0781908065233808691d62bc062262b843b15ee4d0ce3a2edc89a4

    SHA512

    6748b4746a1eef44f708b9884b01b51b3ef558e886f2b76d88d7fe5526c059331d108ea09001956d34e9139c7a1dd639499164bc6a2277f092a05d03b8ad529a