Analysis

  • max time kernel
    147s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2024 05:25

General

  • Target

    Connectify.exe

  • Size

    1.5MB

  • MD5

    fbbb0bb982e825891744e4c89e8266a9

  • SHA1

    29e83aed8e98f5c3997cef00943c80ce00aa646d

  • SHA256

    d07b54449ccca041621362f1ea26db28c606cd6414cabf7260effbffed15ba87

  • SHA512

    21f9c1e67d086387f0398dc4d4df3361bd69b552fa311e2f9a15a61c607496497d8ab93cc516c26bf1a659cc6ec6aa5c15d788d0553712513e71532eadd8ef33

  • SSDEEP

    12288:DNlp/dQpKaUfKaUDpNwYxzlK0gsgoG3ugykGfsggZKaUe:DNz/CpjEjWpuY59gsgtgk6wjr

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Connectify.exe
    "C:\Users\Admin\AppData\Local\Temp\Connectify.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vnw5-3pz.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2869.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2858.tmp"
        3⤵
          PID:2816
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pikmvi8d.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES29FE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC29FD.tmp"
          3⤵
            PID:2684
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pds3nrxj.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2DE5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2DD4.tmp"
            3⤵
              PID:720

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          7786a52d4453bb0d0fc303e7e23a82a9

          SHA1

          abeda07dcdf10ed4387f9cba299ea61d54b982a5

          SHA256

          31e51a559e4dd228ae76ddb279eb54ace8b411174854cf6602af8419af9ea6a8

          SHA512

          96661457535d896cb77ab396fffba7688f3788489347d3c39ef93e5d9cbee9e00599c9a72af3d83949571c88958ecdf6007459216ad1eefc3f80e1362e43f4ed

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          79fe9d44784d908502ceeac7a98fd226

          SHA1

          b13705958716c1c4f5b80194421d34f0130e7b2a

          SHA256

          7da705ce15df91dbedea39f9a3570cb5ef547b949e046fd0cdd2f3c56fed8fe6

          SHA512

          85098eca59cf0920fdf37b217249c2f6521d248d859e4de48c6629c813e6acb395c96b13281f92b8fb5f49d4b292f7d67d33b570f387ea456a0ebcb59276247e

        • C:\Users\Admin\AppData\Local\Temp\RES2869.tmp
          Filesize

          1KB

          MD5

          775ee33d9080dede8194df60a0161f35

          SHA1

          c719df7be2653d8330db04e6d194cf809edec71d

          SHA256

          e77b9c43353bfd478788b9e4914968856e271df642d14629d92e0e7c228298e5

          SHA512

          4442b0cb72ec0caa4f1d4ef5440cc3133ba0b1d0f70fe7bdf3d65345fd982035aa577c4caf4e36e9f6310d55827e0a0f170f9c7d43170121e0d614a1b3847650

        • C:\Users\Admin\AppData\Local\Temp\RES29FE.tmp
          Filesize

          1KB

          MD5

          2072366e814cff240ec2698a6052b328

          SHA1

          b10fe2e7cc5f926a3ba54b7319d3a29f55889b76

          SHA256

          b5d3c2f9639e5891fcd3081e3554acdc7710d174d143f0baf8b5c9cd9185eac0

          SHA512

          5226718a5fb11b97d942d60f6c641cc75052db57fda17c4d13031a5d2af2e5a2b5cb82d22c8ae4a83c6b0204034135511bcb44b0f39843f0892f1cf431c053be

        • C:\Users\Admin\AppData\Local\Temp\RES2DE5.tmp
          Filesize

          1KB

          MD5

          59320b4b8ead7d5112353dd457cdb5da

          SHA1

          717d29c26d3868b9a0086be18374116da7524102

          SHA256

          e2e2ca14083b553acefbaeeb3d39d08e1fa55bbf8a3f0b60e0bc13ad1b9d37b0

          SHA512

          21951570222c5747d985e455472339029a51d2350b83c73276f4c2869ce496e8de291a518327b5049f940dcd2ecb78cce8e8b47ccf1b19c2a3b6d8b309e15f0d

        • C:\Users\Admin\AppData\Local\Temp\Tar24F5.tmp
          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\pds3nrxj.dll
          Filesize

          9KB

          MD5

          747e0ab516dbf7aea2b4aca521c0af2d

          SHA1

          b5388edd318137e184833592403ce6714803a026

          SHA256

          1c674d380c5fec675110a723d446cf4f9488d4604ca44003f58000937dccae52

          SHA512

          b0b2fb4ac0d51b6e8843107be0f8069ad6db40830c8521be00e082296a917c8d987b591679daa0b2f2d6ccedfe9adf5043f3ea0a7f2d1dc81a2c1792e27ca382

        • C:\Users\Admin\AppData\Local\Temp\pikmvi8d.dll
          Filesize

          8KB

          MD5

          e082101d75d15c037cadef376f201555

          SHA1

          edf35e23884f1e4472dc138adced0ea2b7b70cac

          SHA256

          773b117858c2bda0e7987ad7a47b3c12bcf5d6e040bcaf5852d6327a5e22ecad

          SHA512

          3fcafb539290f4d1a8f9d7e578ed189a7a6103f37b1c7c51da9534dcd38e5c3d56f2db0f10455f68230db3095e8e0bbfdeda161790e45ca28c8134dbec013515

        • C:\Users\Admin\AppData\Local\Temp\vnw5-3pz.dll
          Filesize

          10KB

          MD5

          dceb84ca3a6570a979f59d3e70197188

          SHA1

          8e68bb3af701f3efbac3b8092d53de1ecaf24cee

          SHA256

          1821844c43134a9aabbe9c3b32f81adb19fe98fa61ef2786e51628a994edc9d0

          SHA512

          97254c4573c7c83d3a091c90ba5ab342ec4ef717a8420c01b955bdae10aa36d7e850fff7bbe6b79643f3cc4697ba0186df248e2232591959839ef6edcf191cdc

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC2858.tmp
          Filesize

          652B

          MD5

          322ceb438e60d164e78effaf0ceb9b01

          SHA1

          f9785fae2cebc60819b3dad635fe6d290d18beaf

          SHA256

          927b7aa45a6a7784c45e3e41d0e1a85c72b3f4a3aa323d947e6a6ce0b4115bec

          SHA512

          4f0c202e8b3f6df3f80231b5bbe71fae8c08b8eca10da3cf7c9f431e78a65fcf294363c177537ecf949a7b1b4f5e41e8898cc9deecf9cf5d7a8bc1ff2d5fed55

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC29FD.tmp
          Filesize

          700B

          MD5

          13951da1d06c93680e58cd49cd6dbf90

          SHA1

          18b6faa87bb3f1efd6e396d0fe112c5f65f8cb87

          SHA256

          c4b08dacb318ed0f9908a522e77e226b0a674552231d5f8b08c3cc77e64ad6e9

          SHA512

          c6dbf2ff4ed2dfee5895feb3d98f5019c574ebe6e7f9e7b0e9053134dd583d999ae020a14b5fb633a4cb9511e4af1035c3ebffab83e528de938bb3367aa3d00d

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC2DD4.tmp
          Filesize

          652B

          MD5

          1428236e09e7980c8907be6378bbd4fd

          SHA1

          37b0e2da7fc41c614e727f7ca9c0fdf1f178d4da

          SHA256

          4e517ba07f2e0d9cb2834b5ac31d85a86878edf221579b2b80524a450418d710

          SHA512

          185b27625776234f0172ae92ec78f22f11c365f9382af2fe25414e59d522f9863b14203909ebb1ca399a564541a48dfa71b9e82c94cc09c28fe05bcc43201282

        • \??\c:\Users\Admin\AppData\Local\Temp\pds3nrxj.0.cs
          Filesize

          18KB

          MD5

          f12186e017dc013105f7af4cf539645f

          SHA1

          50bb0ab7ad4733bb48930bc5f1c44feda65623ea

          SHA256

          75693617a945fd4ccfc4157999f2c52ddf68547cf5322e18ecfb70dc17c922d7

          SHA512

          81c50a12fc0f07bd01bf8f5f74651969ab9bad0ade3c7704c8a1bdb1c8e16d4c5a77a68eace60e5a3dd75930df6e9d30b375be078f7a4959b85adca9cbcbfb68

        • \??\c:\Users\Admin\AppData\Local\Temp\pds3nrxj.cmdline
          Filesize

          401B

          MD5

          86aa9f6dce073e312cd06d0d0df69cdb

          SHA1

          a04ef4da5103f145d0ee6bd606bc79f00747d5fe

          SHA256

          0d3e607a0bf31289948c1cbe177d59b4d81723da5c3200eb84ac61b1d8c68ae8

          SHA512

          39deffec7930deaa5d4fb0fc386853d93bbe4f71c2f95e0ff557eb6d68a7befdf077e8f8f5068aff5799ed9d240d06317578acc54162f73612892bcc41944ba7

        • \??\c:\Users\Admin\AppData\Local\Temp\pikmvi8d.0.cs
          Filesize

          11KB

          MD5

          7b835a71956070a4cae36cb9aadfb50f

          SHA1

          55dfcec894c1ee834e54d6aaab69e9b97216bf06

          SHA256

          607eafe7bcff5b38f1c5d6879f6970c1007e289a7589726e25cca620f7a9bcf7

          SHA512

          0a564bcb5dcae342f705ff656326d3154adbeb9c90414c3a236c63db460b6dcc1a555e579d926fff74b7960a23d51fc7188bd89ebebaebeca33a5f83ebd733b3

        • \??\c:\Users\Admin\AppData\Local\Temp\pikmvi8d.cmdline
          Filesize

          401B

          MD5

          06bae6112363cb6f1f3a5f4a74811329

          SHA1

          46e3d7d92f72665229143ad4ed15394721b13001

          SHA256

          8eec8748d35ea2a374b6078415e3d390104a08df60e44d91dcd0695e1011227e

          SHA512

          66c986a44b7d562e651a5c48d867a1fcf7c3910e6535b86d5371fa187ab19b606f3b77dcaf879abaa2dc5f4553df34f0bd3d264927b381f1918c1df6234e36d1

        • \??\c:\Users\Admin\AppData\Local\Temp\vnw5-3pz.0.cs
          Filesize

          16KB

          MD5

          2acd8c6a61b4e380150e9279d971f493

          SHA1

          40960648651593045fda00cfbe3de316e0a43e42

          SHA256

          e4a02f3367b91e9d001f2b69faf923ea4cacd68232b675df782a1221af7d0395

          SHA512

          cd600e638fa0f2f6d90ea0562f8fb89da8517c50eccfc1fa0c75d93ea1dc61f8eeea3f9bad952e6894beb0fc0cd903b56ff9b52150ff1a181bacbf5e23ee957e

        • \??\c:\Users\Admin\AppData\Local\Temp\vnw5-3pz.cmdline
          Filesize

          401B

          MD5

          18f2be092d924a697d6368d2cedc5fc7

          SHA1

          ad2836b5edfe34ef3c244db7519704009a3e27b0

          SHA256

          5b15ac1141733cbf4e7ae6a487347a4ede6e775dc6d1f2825a4fa0887015f5d2

          SHA512

          90551968a801b96db49ee7f50e2387306510f40440dfed8f23cacf84d58cbd7192099b971dd4a0bb9f4cf3b7009054d343a9f82b52ad807639b855ebe285cec2

        • memory/1248-109-0x0000000074960000-0x0000000074F0B000-memory.dmp
          Filesize

          5.7MB

        • memory/1248-102-0x0000000074960000-0x0000000074F0B000-memory.dmp
          Filesize

          5.7MB

        • memory/1628-0-0x0000000074961000-0x0000000074962000-memory.dmp
          Filesize

          4KB

        • memory/1628-2-0x0000000074960000-0x0000000074F0B000-memory.dmp
          Filesize

          5.7MB

        • memory/1628-1-0x0000000074960000-0x0000000074F0B000-memory.dmp
          Filesize

          5.7MB

        • memory/1628-270-0x0000000074960000-0x0000000074F0B000-memory.dmp
          Filesize

          5.7MB