Analysis

  • max time kernel
    42s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 16:00

General

  • Target

    $PLUGINSDIR/conduitinstaller.exe

  • Size

    206KB

  • MD5

    710626f0c8b94c9cf89458409e3ee12e

  • SHA1

    b58d5aa8a12ddb74dde97c9541b2242941ba4e3b

  • SHA256

    dfca214b6a538844097b6b1b25001d1e89e6d54050c0931f1a98c8ac99dd70e1

  • SHA512

    f170889b8c982885e68991a2551b7ed18843c94ba35f2eccc849153b4b9fcc482a0bc5e2329bfda38d0db52ee01debf76cbb46399c4396bd37b096a13f0d8e1c

  • SSDEEP

    6144:fFJ0sB/84ZdazTH6N0tkl3KKJDvQQ9+AAD6aOU:5eOdafO0Md2eaOU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\conduitinstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\conduitinstaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nse1797.tmp\ConduitInetc.dll

    Filesize

    471KB

    MD5

    70e3b20d184751b642b06c5a7855c455

    SHA1

    89b00dc942e9c4965765acdb08b3e4a392f2af66

    SHA256

    92e693d3d8be731a66a314e5f15cfad1f4e656f3fee3d32e9e9a736b80be46c1

    SHA512

    48318557e3eb67379b8a8732457ef07864d4dd7a711f22834f883aaa66dbdab01b490a8928c831690e9aadc1514dfb559731142d7c10afd3e75550ab303a0dd3

  • \Users\Admin\AppData\Local\Temp\nse1797.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • memory/3044-10-0x00000000020E0000-0x000000000215C000-memory.dmp

    Filesize

    496KB