Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 01:07

General

  • Target

    d17e7791ca9bc54c5e418c659499a4763fa02a671f97d7fbf25c971de7e8086d.exe

  • Size

    224KB

  • MD5

    170a39a01945d1aa1f344b70ab58a5b4

  • SHA1

    4c755a82374cb29c7366da26e58108a0af79dbfc

  • SHA256

    d17e7791ca9bc54c5e418c659499a4763fa02a671f97d7fbf25c971de7e8086d

  • SHA512

    854a3b07c2aac740710069128de06b0b957bbdd1bb3cae313cd087a791eae620a0a3d681f53bd03b3af82977699bc4e3153f8bb8160d01dbbbeb3f5ae39dddc3

  • SSDEEP

    3072:PApVL9kHirW+eIpVzg8P2wNLamMcpGctxtGznpRTnu/uSmNxM0n/MTc:PApVpRrWBITzgApWmtom83TnyQJUc

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d17e7791ca9bc54c5e418c659499a4763fa02a671f97d7fbf25c971de7e8086d.exe
    "C:\Users\Admin\AppData\Local\Temp\d17e7791ca9bc54c5e418c659499a4763fa02a671f97d7fbf25c971de7e8086d.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /Create /SC MINUTE /MO 10 /TN "Ranger" /TR "C:\Users\Admin\AppData\Roaming\Ranger\d17e7791ca9bc54c5e418c659499a4763fa02a671f97d7fbf25c971de7e8086d.exe" /F
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:1652
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:2816
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
            PID:2944
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            2⤵
              PID:948
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              2⤵
                PID:2256

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              315e45729a0bab5a97a81eb1b9433d8c

              SHA1

              a93dea77f80c4489352338f6792f627ebf05c93a

              SHA256

              0494801fa735b9bf56f11e46ea1120f93c5db387bd61420e7109918178630b49

              SHA512

              1a1b16b8e772a34e6975c07fa78aa4fd27ca216d676d2a13f108db5e68d60d85705fe2723a27bdf2629b0536c4694848508adfec4eb8491e0e449d603880bfea

            • C:\Users\Admin\AppData\Local\Temp\Cab3027.tmp

              Filesize

              70KB

              MD5

              49aebf8cbd62d92ac215b2923fb1b9f5

              SHA1

              1723be06719828dda65ad804298d0431f6aff976

              SHA256

              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

              SHA512

              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

            • C:\Users\Admin\AppData\Local\Temp\Tar30B6.tmp

              Filesize

              181KB

              MD5

              4ea6026cf93ec6338144661bf1202cd1

              SHA1

              a1dec9044f750ad887935a01430bf49322fbdcb7

              SHA256

              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

              SHA512

              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

            • memory/3032-0-0x000007FEF6193000-0x000007FEF6194000-memory.dmp

              Filesize

              4KB

            • memory/3032-1-0x0000000000380000-0x00000000003BC000-memory.dmp

              Filesize

              240KB

            • memory/3032-2-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

              Filesize

              9.9MB

            • memory/3032-64-0x00000000004F0000-0x00000000004FA000-memory.dmp

              Filesize

              40KB

            • memory/3032-66-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

              Filesize

              9.9MB