Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-06-2024 05:25

General

  • Target

    Connectify.exe

  • Size

    1.5MB

  • MD5

    fbbb0bb982e825891744e4c89e8266a9

  • SHA1

    29e83aed8e98f5c3997cef00943c80ce00aa646d

  • SHA256

    d07b54449ccca041621362f1ea26db28c606cd6414cabf7260effbffed15ba87

  • SHA512

    21f9c1e67d086387f0398dc4d4df3361bd69b552fa311e2f9a15a61c607496497d8ab93cc516c26bf1a659cc6ec6aa5c15d788d0553712513e71532eadd8ef33

  • SSDEEP

    12288:DNlp/dQpKaUfKaUDpNwYxzlK0gsgoG3ugykGfsggZKaUe:DNz/CpjEjWpuY59gsgtgk6wjr

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Connectify.exe
    "C:\Users\Admin\AppData\Local\Temp\Connectify.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tm4rdjqv.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8AFB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8AFA.tmp"
        3⤵
          PID:4288
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ufpbe8ws.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CB0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8CAF.tmp"
          3⤵
            PID:1660
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\buxkftvd.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4060
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES958A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9589.tmp"
            3⤵
              PID:3016

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Subvert Trust Controls

        1
        T1553

        Install Root Certificate

        1
        T1553.004

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES8AFB.tmp
          Filesize

          1KB

          MD5

          662811dcf8e0f52290ade846bb3a276f

          SHA1

          66848777b101f24e4b42fdf9c9f666d53c3a340d

          SHA256

          728d797e25d5721cd44c4ce40c3c199b45feb3f736501e6aac39af8791bccdc4

          SHA512

          e76a123f05f017fde02a0a3952c0f2b873b5d5c8c9a2bc997fa093d51576ec10e5fa6a18b1e7b4600ca04f5ecbeebebb4a0bd717d65cc61a50f36e1d9a8cd9d7

        • C:\Users\Admin\AppData\Local\Temp\RES8CB0.tmp
          Filesize

          1KB

          MD5

          e897970a0eedf656aa4f9f0a31400ac9

          SHA1

          db5218847d973bc976b16e5422d6350ad7e7ff1d

          SHA256

          d04cb099ed5bd815d0cafe7073b539fc715600850016d057b3b049aab2d91569

          SHA512

          e4b7d4ec946fc0ba05630599ec571962a0d840c0d4be3ffdea8999e7cbdcab00cbd4f258fe858da5d7307e89f5eb531f1e71abb4db33ac5c750a2ef88d1f00bf

        • C:\Users\Admin\AppData\Local\Temp\RES958A.tmp
          Filesize

          1KB

          MD5

          3ce702fdfb38cd96643e53f3b56711e0

          SHA1

          22acb30bfac40807870212c873cd07f595e6515d

          SHA256

          494f36ff18ae45b1967864614e97f14b97c76fb58727897de764f105890f52fe

          SHA512

          7e574fd3476ec8d616d889b8229a1dcf7616d866c1e2ddf0584a59bb5dce15b3f5bb63ee9fb483cd92b502fd5603c5fc466c124531b0a83ae424edea04cfe7da

        • C:\Users\Admin\AppData\Local\Temp\buxkftvd.dll
          Filesize

          9KB

          MD5

          845cb419e01d4f1932ba672a6a08bf87

          SHA1

          cfa1180883e33a720d8ecb077a3db1856984e6fd

          SHA256

          a0e92eefad1b4a4bec72996da3584d49901d96ed6668c2622fa347ffe1f3f3c4

          SHA512

          d9171b2f98733c09e447c6ac5080e41f1ec25fcd49fb5edbac741ba2471841db1795da4f5fe6e13d13ab701e7e76fbd345eddadf2c7b517bd35e06a09f338fb7

        • C:\Users\Admin\AppData\Local\Temp\tm4rdjqv.dll
          Filesize

          10KB

          MD5

          a2c3aef2572b4feec57c4fa87d7ad952

          SHA1

          435e926a787456340c66b30d9d27eb23b1737fce

          SHA256

          1171a405e097b3ed08dff3e236610b5a4a4178514c6a54779d3172979c0a882c

          SHA512

          39be9868c970aa13abbea3ec0fc8405925561d359f178335bd5fabcfb20e9fae10251d98e8f3178479ae3d6565431bad0b6fe4051748a65ec63ba90a12f5069e

        • C:\Users\Admin\AppData\Local\Temp\ufpbe8ws.dll
          Filesize

          8KB

          MD5

          51296afbb1c8080ed907465d7495b63b

          SHA1

          5f7b63603f9a071cfb3f4f5bd153a5f6d7525473

          SHA256

          68c3b1b30cac380fa8193b76db11e502f0803ed94bf25fff5c281f23101e6eeb

          SHA512

          e6fcf88e261facd12bde81792006585b7f5716cfc059fe548adae7c845185af1248f26d25ff79f46980449f69300bf43cf061ff2a1f301fc5d36c6d93ebdd26f

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC8AFA.tmp
          Filesize

          652B

          MD5

          892c30003c162b0f6d78e1a6b4fc9a73

          SHA1

          b1309247476d85398e3c6111ea921858ea8b32f0

          SHA256

          520da08983acfe28a310ec259f1ef971c38bee116f92f8f4b539e06bb5767ab2

          SHA512

          c051fed74145cf2493fb9892eb1ca4995c4a47f16c4a2a45e66fba061d9b2cff7312da1e0350a70014e6423a526ad8bb3c832610e1057f7e3cf87768f216c924

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC8CAF.tmp
          Filesize

          700B

          MD5

          f8ed5e3521354fee462da050b8f11d9b

          SHA1

          c091f001c78d0cc94889e27c57a53e60562293f4

          SHA256

          c2e0d1b737e0d23747be597e292b3b27cb946d32889480abcd7a3bea2aaae7d7

          SHA512

          41a6ddcffc330ab84d9f30f34e4dbabe31b689aebc0a2f6c369f905d704375009711e14bd087e7e1bb3841968427c02922f5ef717321bca141eba5ee77b64a6b

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC9589.tmp
          Filesize

          652B

          MD5

          7213df6f3b4030044f77643f51ab4ded

          SHA1

          2d75a8bcebc519d994015ee86c538c9d78bb226c

          SHA256

          ee955d89e241c19ec5485a8f35e0fb1e3ce9d788e2fc28221a8bf78b5c0832fd

          SHA512

          850c03fe3e921550349bd40b78424256cf0120482833b0fd976d9bd5c2278615761a09ac98d22b0485a4813e2479f2cedaf45f256db53e48555eb5aebf2e1f17

        • \??\c:\Users\Admin\AppData\Local\Temp\buxkftvd.0.cs
          Filesize

          18KB

          MD5

          f12186e017dc013105f7af4cf539645f

          SHA1

          50bb0ab7ad4733bb48930bc5f1c44feda65623ea

          SHA256

          75693617a945fd4ccfc4157999f2c52ddf68547cf5322e18ecfb70dc17c922d7

          SHA512

          81c50a12fc0f07bd01bf8f5f74651969ab9bad0ade3c7704c8a1bdb1c8e16d4c5a77a68eace60e5a3dd75930df6e9d30b375be078f7a4959b85adca9cbcbfb68

        • \??\c:\Users\Admin\AppData\Local\Temp\buxkftvd.cmdline
          Filesize

          401B

          MD5

          890c02f458b4af608716394b50a4aa65

          SHA1

          b5061eff329799e7a8c273665d105d2542d01092

          SHA256

          29fa8b420b6d7a821de21c6427764c47847080e4d644678cbf609556055a18cc

          SHA512

          12ae15dc7cd9d3d8a8e4b39109cf03ec1b5b47a19dc9d16bc69fb3af8387165d6bffbcc62c7a019e4f07e7a69440f635b09a6837684e36c5a3a8909433e5eb00

        • \??\c:\Users\Admin\AppData\Local\Temp\tm4rdjqv.0.cs
          Filesize

          16KB

          MD5

          2acd8c6a61b4e380150e9279d971f493

          SHA1

          40960648651593045fda00cfbe3de316e0a43e42

          SHA256

          e4a02f3367b91e9d001f2b69faf923ea4cacd68232b675df782a1221af7d0395

          SHA512

          cd600e638fa0f2f6d90ea0562f8fb89da8517c50eccfc1fa0c75d93ea1dc61f8eeea3f9bad952e6894beb0fc0cd903b56ff9b52150ff1a181bacbf5e23ee957e

        • \??\c:\Users\Admin\AppData\Local\Temp\tm4rdjqv.cmdline
          Filesize

          401B

          MD5

          21b0664bcb5db4551e015aca682c26a1

          SHA1

          e9419819d52294ed264e761f0b70f8edad975314

          SHA256

          c4ee1f5d4d0b9693b092e4f148082b4c6e20ce041a467849f8f0458c33fa389f

          SHA512

          f68032b8a273a3c5cc38f5eb6c5e83743199129b83c30651fe947e9171017ff1c9c06f6df0d822bab12e669ae3a32dfe7b86a372300aac1245c6bdeefeea50cb

        • \??\c:\Users\Admin\AppData\Local\Temp\ufpbe8ws.0.cs
          Filesize

          11KB

          MD5

          7b835a71956070a4cae36cb9aadfb50f

          SHA1

          55dfcec894c1ee834e54d6aaab69e9b97216bf06

          SHA256

          607eafe7bcff5b38f1c5d6879f6970c1007e289a7589726e25cca620f7a9bcf7

          SHA512

          0a564bcb5dcae342f705ff656326d3154adbeb9c90414c3a236c63db460b6dcc1a555e579d926fff74b7960a23d51fc7188bd89ebebaebeca33a5f83ebd733b3

        • \??\c:\Users\Admin\AppData\Local\Temp\ufpbe8ws.cmdline
          Filesize

          401B

          MD5

          14f768d30480c4294ccb7c83a3d68555

          SHA1

          de16ed791d21a42f9d5af401ad34cd91cdf98cb3

          SHA256

          022abe65426a1ba3c503e2e428d08a5e5bd5e1c3c5fd97aea30e4d6c1414559d

          SHA512

          e4da9e3debf63ac5136ab0dde9ea03883a3010691f44d771bf858bfda6a4691e7d744be9170b0b92d84bb55f66e70b3e233dcd1802cd6198cb4552defd6de216

        • memory/1280-27-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/1280-32-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/1984-17-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/1984-10-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-38-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-39-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-40-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-37-0x0000000074C82000-0x0000000074C83000-memory.dmp
          Filesize

          4KB

        • memory/4528-36-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-0-0x0000000074C82000-0x0000000074C83000-memory.dmp
          Filesize

          4KB

        • memory/4528-2-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-1-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-54-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-55-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-56-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-57-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB

        • memory/4528-58-0x0000000074C80000-0x0000000075231000-memory.dmp
          Filesize

          5.7MB