Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 01:55

General

  • Target

    ab9692d33f8a02495519df18c3a3a7de.exe

  • Size

    40KB

  • MD5

    ab9692d33f8a02495519df18c3a3a7de

  • SHA1

    6418217c9fda319926f12a4774b481438977b8cd

  • SHA256

    a92bb07a32545883dc65d5a6fdf46994bc15698ddea040d4a387944eaa036bcd

  • SHA512

    674824b909632383574972c6ec71b95f92b67e174a2ece1adb1ee26975e7cd98c8ff1b19e7b74e60cbbeb5a6b27ce7e41466fa15e0a80424c7ad57fbfaf23a54

  • SSDEEP

    768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtH/2J:aqk/Zdic/qjh8w19JDH/2J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9692d33f8a02495519df18c3a3a7de.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9692d33f8a02495519df18c3a3a7de.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3064

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    3c68d5a5d95fdaf4d2c3a9c98c23b270

    SHA1

    5eb68c5b05dc814369f24f228b994ff6a9347812

    SHA256

    da7ff77cb4e97ee8ecc4336b482a75ef6f4c12b7280edad59c53f3e7b646cbad

    SHA512

    880ec289363c5077db02f6e3e99748718e9b126a7e90040bdc5abcb30b1a8039525f2b43cb59295c732bf41ee1fe807de2f0f36a320decd998b7b80808710d6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    6100dd4984ef4f06225de4f20505f256

    SHA1

    e72b63e51a6487b8fe21519939f60cf54cd86df8

    SHA256

    b2c28c815bd12a8869fd6c71dc19570ce5ef59a52c1b77636f4f50132cd1ebea

    SHA512

    a4195cfd1747af9f1b867e895dd1b2dc05ec89d04cf307242af12ee0e87f44dfcdec19466a25f6d7218fcff39dac666b3fd04a4eddbdaccfe5dfc5db9d309edc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\Y9RP2EOW.htm
    Filesize

    185KB

    MD5

    cc03b462bc892c7fea4ca25290596b5b

    SHA1

    fe059057c1cf6324e9881ac090079709043ebf2b

    SHA256

    89ab2c0383f3ed3abf5db8f644b90d43119c984e1b066c1d1ced43b90a67dd6e

    SHA512

    cab6f64567c07bba0fccbd67973502aa0a653fb36997bc563e5db70c767c72f6973b0d3898cc9c09fccc0dc9fc05730a5cbf153e02058659596395859639f3b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\search[2].htm
    Filesize

    151KB

    MD5

    ebd54d183c66f8fa03402dbb73e0e62b

    SHA1

    0fb8abcd0a2f1cf2ee2706f9f60e1443b8b69beb

    SHA256

    e2d81be7b2887a0a3869bac55d3e8ed08ccd37648e45980b06fdc1cbebfc0f6e

    SHA512

    3a47d76b9783aef3da83baaa175222c9bf0fdae91cc7a0e3af0c241734eb472d70bcd814623f81d8c6b2fa243b42f0d6439a76b53feb2613f66b506684ac2d3d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\search[6].htm
    Filesize

    127KB

    MD5

    8d0f71827593f5ccd1ebebd449a33f25

    SHA1

    0b92f3836a654de9e23d81aed34778438a7da0f4

    SHA256

    4b00db6b2b7e44e77af3999d84551c93687d772f5b964c7f6a8a460384771611

    SHA512

    8c316278d95547136b5e62addca45d3d95bbd7f20b17aa6f3f6cadf185f5a45d739ef2fe7a571a9f137f9454d963b1f58e571e0f8c90598d90377a8960b21dc9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\results[2].htm
    Filesize

    1KB

    MD5

    35a826c9d92a048812533924ecc2d036

    SHA1

    cc2d0c7849ea5f36532958d31a823e95de787d93

    SHA256

    0731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea

    SHA512

    fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\CWYKUKFD.htm
    Filesize

    185KB

    MD5

    093f2ed532e5cb75fe4326ff44c396c8

    SHA1

    ee0502d54fd0fef213232ce49f3195f8f84eb006

    SHA256

    f3ba600134f28d3327c63f02aa0d347ff3d335bdf8f0d1bf52765a589b4db204

    SHA512

    25e2a77d227f33340364dfa27410279ce30474d6b48e1b119a7a738d8d77c3c953b505832cf4c74b232dd12eda604a12e92c7814e8bf48e233a293281ca151b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\results[1].htm
    Filesize

    1KB

    MD5

    ee4aed56584bf64c08683064e422b722

    SHA1

    45e5ba33f57c6848e84b66e7e856a6b60af6c4a8

    SHA256

    a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61

    SHA512

    058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\search[3].htm
    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\search[7].htm
    Filesize

    172KB

    MD5

    4a90133f042420ea7bc5d107884a126b

    SHA1

    bd5a5761384faaf5781046b994f3f53ea654d27c

    SHA256

    954d52cf9940d554cd91606e2051d08546a6e3f33e52eda7d80ef3ba60f5a462

    SHA512

    89ce1fe0b1d557cad525870d404c4a850cd1270cf41c67c3b9db45fd0c242cefbb549e20c859d26b772d02ae414154c88789e3366b44dac6154b49953eb226dc

  • C:\Users\Admin\AppData\Local\Temp\Cab314A.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab3216.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar324A.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp36CB.tmp
    Filesize

    40KB

    MD5

    9cd6617d7843e8785188822279fc0fb3

    SHA1

    1b6f9e3898f423e7710b74f1dac3c9d0bfbad0dc

    SHA256

    da2932f73021a28e160d3769cf1882307b66f60385f5cd2f2bff9d277fff876f

    SHA512

    a24506a2910096768cd81bdba82adaba7b8349c1633f857004b848d7f8b9f633e13a618f7d20d984f232f5bc6afde22d4ab34be1d63b95f91035cde03dac31d7

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    462907e472c404410d7440162801a7e0

    SHA1

    82d7d0edeee7133314f67bbb96ca43b692be5b0c

    SHA256

    c28d566eb188a1bb45de1f0fcf7866afebf0c5d13b11f6e3b48d43f05fa90a32

    SHA512

    735bf6fc7c14d18194de30fa69543f0692e4c1f591c59587b5925e6ed9329200317367077eb2dd4c3cfc718f9a61b61738e16c535d16f23fff87672aa2b4e469

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    81673964df9a3906c379467f6b53a92f

    SHA1

    ec61a21e9bb7681ac23944c206172e61c5ce0883

    SHA256

    c30da24f4a18f36616bacabea8d9b904a354c7f9957b64bad472d741e1ba6154

    SHA512

    75b0572b878a82a3801f3c64fac08a37a483449c719ab4191097b4f0cae25b07dd77596d2febbe8f433c60fab24b4d91e7840d3dd6f0755a6efd778597e7bb91

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    1KB

    MD5

    0396e255d37bdee4d441ba9359aa7e5c

    SHA1

    ae4cc61afd1664578636286ef19b2d64c5957982

    SHA256

    df429a3b06ef677d2b25dc62ba7bbee166266e6bde9606028c6eb8df5fd68ee3

    SHA512

    a9b394f0947ff44ab3dff0997847318e696395c5900c83b928ec07b87e1644f146d31c6ec491f6baceb623beff1af8be43d87be43e66d1d9854d475b806998ae

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2168-0-0x0000000000500000-0x000000000050D000-memory.dmp
    Filesize

    52KB

  • memory/2168-22-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/2168-10-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/2168-4-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/3064-26-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-70-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-69-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-65-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-61-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-60-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-56-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-36-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-35-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-31-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-305-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-27-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-21-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-17-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3064-11-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB