Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 06:57

General

  • Target

    d288b9ea78cbd2825e7167ca82edcaf1769e973b34408a07e6483cb00d3dfa55.exe

  • Size

    5.1MB

  • MD5

    c69c54506b82de3ee36dfcc3c0ad2fa1

  • SHA1

    81174ccd235069b97ab1477c2dadaeb5dd26bf2b

  • SHA256

    d288b9ea78cbd2825e7167ca82edcaf1769e973b34408a07e6483cb00d3dfa55

  • SHA512

    eb747bc978624d1ec849f7135a1546f33cd2f2471368a38b11b4c81c367174b0d9a9d8223e7b9ca7c7c0f4651455bc081457aea9d47813840745225994199be2

  • SSDEEP

    49152:doesvZ2Py2w12b8+cOnAHcO0bSd6ofiAi7W19gOMUZmSTPVvqIPuvn49DBZO/cmu:q4kDBZO/cOhfDm/PHjJr07CKBV2C4f

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d288b9ea78cbd2825e7167ca82edcaf1769e973b34408a07e6483cb00d3dfa55.exe
    "C:\Users\Admin\AppData\Local\Temp\d288b9ea78cbd2825e7167ca82edcaf1769e973b34408a07e6483cb00d3dfa55.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\Flying Peluquerias.exe
      "C:\Users\Admin\AppData\Local\Temp\Flying Peluquerias.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Flying Peluquerias.exe

          Filesize

          5.3MB

          MD5

          3b5de9449318ef6e5a461e2e7fdbc93f

          SHA1

          7e39c424eb8a3aaa17962ea4c7434c46a7aeee81

          SHA256

          50c6cc59b927d063c8c7b939201bbea6444073455118f6c4f61062a80cea135d

          SHA512

          8b24c0851d57c56cd1e6c6751f83ed5d54f82727167e0b9c57d7b1fc854e67c026f47296bd3957de0738683ef498166243e191be42ecf87795e7fce5c558ff5a

        • C:\Users\Admin\AppData\Local\Temp\Tar2A21.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\Desktop\Flying Peluquerias.lnk

          Filesize

          2KB

          MD5

          7bdeed59dbe50df5df7a28b78f416bb7

          SHA1

          901998f60563d1fe43a8a61ee7ace5ee3e6d3f55

          SHA256

          f62130d1e2aed92d158635b170f3eaa43ba8195cf87a49f3e50e816bbd6cedf0

          SHA512

          5d08dd29f1ccce1560446827c05eb4a587f335607e79166c9b90aa42f26859c1b9377d294adea97552d466b6ae08b5cf195fa05d0262aa491f8cffa2c1b6130e

        • memory/2532-52-0x0000000001030000-0x0000000001580000-memory.dmp

          Filesize

          5.3MB

        • memory/2532-53-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2532-55-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2532-58-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-5-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-4-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-3-0x0000000000410000-0x000000000041E000-memory.dmp

          Filesize

          56KB

        • memory/2884-2-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-0-0x000007FEF5F13000-0x000007FEF5F14000-memory.dmp

          Filesize

          4KB

        • memory/2884-54-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-1-0x0000000000A00000-0x0000000000F24000-memory.dmp

          Filesize

          5.1MB