Resubmissions

13/06/2024, 20:46

240613-zkd4nazcpd 6

13/06/2024, 20:42

240613-zgzwystdpn 6

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 20:42

General

  • Target

    f_0051d6.exe

  • Size

    3.2MB

  • MD5

    13ca60d73776b420ada5cc15848f8dfb

  • SHA1

    22bece82795e9c60d76c19f22f777f3b19af10d8

  • SHA256

    fbb5302b06f7e6824ecdaf59162f3a08557cac0efe6b40b4502eab60ecd04d82

  • SHA512

    7074d3fb777563a94dde036cab647cfc72c115e140343ec25f6921a5689b4d381b60012dfa0fb2b1ea17621ff90ca4c225cd3f2e71c1a6bab935c33610f4dafc

  • SSDEEP

    98304:VSiRz+JwCh4p8zdpHzEugKdTHvjgJLTiH7BUB:3zI48v1r1EsY

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f_0051d6.exe
    "C:\Users\Admin\AppData\Local\Temp\f_0051d6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\is-FCDE2.tmp\f_0051d6.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FCDE2.tmp\f_0051d6.tmp" /SL5="$400EE,2484196,893952,C:\Users\Admin\AppData\Local\Temp\f_0051d6.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f24b208df3b3f981e1c09a5c5e91a1b3

    SHA1

    ee32520280cab4f8f52aa88a6d37257d7bd9b896

    SHA256

    febc7ebf7a7092141a1c93ca9efacc43e040345784e2d1fd1be518b8f4ada4e6

    SHA512

    1025087e2287e6be69ff8302437a2c9a4f2ad760c01a7d27951bab079dfd01980c2b3d8852dcaeb70875c0790ab8b2f5cec152f0348192d7478f7d828e1d2cda

  • C:\Users\Admin\AppData\Local\Temp\Cab10D4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar11B6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\is-FCDE2.tmp\f_0051d6.tmp

    Filesize

    3.0MB

    MD5

    5c6dc4f810bf08224a748763e915d294

    SHA1

    57e9256e9aeaafd45e4bdc8461f5fcb73f65302e

    SHA256

    44f80edcbb47c543b362916340af40e5e0f5fa38c1c17713af1ab463d1389e9d

    SHA512

    8a834ad640ea17ff74d4956d968fe4f5dc657f8fe152eaab778363b2d301733eca2ae01227e20ed9ed88b9eaabe2914a1e388ecea214effdce6725dd28164a15

  • \Users\Admin\AppData\Local\Temp\is-PD46S.tmp\Win32Library.dll

    Filesize

    46KB

    MD5

    564f2dfb6bef1f47798dfb5d182232f0

    SHA1

    290a5ad705a85e7fb26efcdc5374cd39738ad242

    SHA256

    671fb4649ddd8428c7f6fd1e14b30fd4735efbbb8c142e2662e157d87f96c9c0

    SHA512

    492091b1ecb0e36f3d01a7b6d516d836224966dc6e8ec9bcdc2254d252f9530c9b9b45ac10d5216761d557cda2454e3d53060b42e55f6a95631baca29199926b

  • memory/1648-12-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1648-86-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/2192-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2192-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2192-88-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB