Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 12:50

General

  • Target

    lnjector.exe

  • Size

    343KB

  • MD5

    6a28e5842aaca1c5753c1cb1cc5e92e1

  • SHA1

    8f1172554a664380ade11d42c46d064de69659f9

  • SHA256

    a2f306363494e264feb5af0420a352a368a5ce62425272aad92417a49d09c383

  • SHA512

    18be44ea2c83ce82542cfd8e6aa6fd7931b6fb5003e0273baa757e34c2725dae02726d55fcb8227260cb87fc5877238e7f6a5e2a42592de7d7219bc498d30d8a

  • SSDEEP

    3072:aT8Yu0lqBiqoCbpIaIumKbo8PT/mUdm+H+u1h3JOcXsAWmsoBJ3voV54fhFBlgpO:wqXbmaHaASUdm+H+u19JMAWlqoQZFKO

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lnjector.exe
    "C:\Users\Admin\AppData\Local\Temp\lnjector.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\file1.exe
      "C:\Users\Admin\AppData\Local\file1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\winhlp32.exe
        "C:\Windows\winhlp32.exe"
        3⤵
          PID:2264
      • C:\Users\Admin\AppData\Local\file1.exe
        "C:\Users\Admin\AppData\Local\file1.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\winhlp32.exe
          "C:\Windows\winhlp32.exe"
          3⤵
            PID:1824
        • C:\Users\Admin\AppData\Local\file1.exe
          "C:\Users\Admin\AppData\Local\file1.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\winhlp32.exe
            "C:\Windows\winhlp32.exe"
            3⤵
              PID:2776
          • C:\Users\Admin\AppData\Local\file1.exe
            "C:\Users\Admin\AppData\Local\file1.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:988
            • C:\Windows\winhlp32.exe
              "C:\Windows\winhlp32.exe"
              3⤵
                PID:3052

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            471B

            MD5

            3a0138bae64e9d60c25031699bdf3538

            SHA1

            064b6da66e705629e7a96d3446b6b75d340abd3c

            SHA256

            9e79c64d8ec3fa6f1851203b8e12803ba6149966b697c15eff73b1ff95c573fa

            SHA512

            b63091a1869cf7816e8c77fd71b4d98e2d06c5a167483d2a1ecaf0dd0a0bb086ed6ca8daa9dac3783f4d19c5cee65dd7681f8a7bf0bc8d157433f84f959cc2e7

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            431c47c2294b66fbee94bb5f4b05c7e9

            SHA1

            343322eedbb8c288292dc559a46bddd6d67dc877

            SHA256

            7755a741f5b5358d6f90c4614a45e318a98ac0241339a7c25b831ad910c51559

            SHA512

            3f90b941a6bf1ea5af20fbef8f5ba46b9c2a22163757604b7a41ab0193f38058cd05a9c5954e6bc9ef9612ad5a4271637f71f2c50d26d55135ecd194391aa077

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            7f4362c2a95d713f3046f7a43511c28d

            SHA1

            ea2d874b5299d933fa5646f695ee8d07807ddc39

            SHA256

            944003d9d7d011847f8d63e11c464a69eb8f2cf8793f9bb93f985dad798a50a5

            SHA512

            95547b00c57337a7513cbdfc06fa14c69cc3fb061bbca4b56b353fffef1e4baf12fa8e32524b8f15f7ac3fb985a533b161ed642a537e27a1dd613f9c6a761129

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            143ad35f992bcab106573ddb69b6b96d

            SHA1

            3b273c94ac71761941ea8caf1d470875f45c4ac7

            SHA256

            e67ac8bdc959697d36cf2b6c9aad3fced2d9aabaa78f9384253b8bccb2b370d0

            SHA512

            b6f26d2cdd9c8c46e313b407a121ecb7ede80f92ce53dd18b81b874cac5aad0a45bef8412665704ee7fa585b54a9345aff075303c65397522aab7009cce29e20

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            400B

            MD5

            4ed9cf4d16933c2fddf6ab8c78d66d03

            SHA1

            f6e078ccf287189e213788d32f32497ccf0a053a

            SHA256

            747a3124d40d6a24c9e36ccfadaed4b45767d6c46e1637cbbc36a45b9da91a40

            SHA512

            946a6ab8b6a9aaa690fdfde642625ec44af2c70f831cd5024b4a9f298571ad96f12081397c2cd6929be336795c7ea9e90a29d0eaa0c6a483a2e7156ffbfb356e

          • C:\Users\Admin\AppData\Local\Temp\CabF2BA.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarF2CD.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\file1.exe

            Filesize

            260KB

            MD5

            3a6216790c466ae5a522869bd56899f7

            SHA1

            a32dd8aaae9c34258b2261c712d4ef623c9d5412

            SHA256

            b037359b3e7539fb9510f703c8d697339750701262665ad1610d23ecb8095685

            SHA512

            aaf6632bc4c463758ac76882d63ec73bb3d4dbb2220a7d09697120aef615995189059caaeebea09f0c42dff2b07d897eb3b267f4deba8018992de50fbdeb4dc1

          • memory/1824-265-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2264-201-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2264-203-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-200-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-198-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-197-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-195-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-206-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-205-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2264-193-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2776-278-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/3052-291-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB