Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 18:06

General

  • Target

    Maniak.py.exe

  • Size

    10.4MB

  • MD5

    0ed0314a857a79d27ed91e19a2dd3eef

  • SHA1

    c56c027650935a9dfaf641c4bd8d5d24f5f595d0

  • SHA256

    af8b0f19175d35a1571dab62ac511e252d78e010fc0dd6584f22dfbf0348bef1

  • SHA512

    b5070e2be3791a730a1af94c1616fad77a3f7d619032355bc2f78c2bd769caa2febd26c3bab8877fe46a71631c647593f7b6d47e55da75a6202b0d96a0c20c07

  • SSDEEP

    196608:rCQHiAmPeg2f6fHiAmPeg2f618u8ltVhBl1CoYhb5zBXVnTn2JFXKYODIJ8vgW5F:jsPtE6fsPtE6q/1l1CTHbr2avIJwgCF

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Maniak.py.exe
    "C:\Users\Admin\AppData\Local\Temp\Maniak.py.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 1464
      2⤵
      • Program crash
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ef027ec5b2fe53b16cd8297c069d912

    SHA1

    16a03133efd7d5e4ba06d06c329d7f900662c8bf

    SHA256

    928514ad3aeb62fe5a1514c9d2f04bc4d4b057dfc3ae62f9e811b8fa3b85444e

    SHA512

    75262baec69950220bccf53134fd127a0d9511c5cfe0f02263869a138cfceb61d0a7f6c862a5a66c3d5c63c34603acfbafa7ba132e07dab072a0bec862d42b51

  • C:\Users\Admin\AppData\Local\Temp\CabBA0E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBC90.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2388-0-0x00000000743BE000-0x00000000743BF000-memory.dmp

    Filesize

    4KB

  • memory/2388-1-0x0000000000AD0000-0x000000000153A000-memory.dmp

    Filesize

    10.4MB

  • memory/2388-2-0x0000000004CA0000-0x0000000004D32000-memory.dmp

    Filesize

    584KB

  • memory/2388-3-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2388-75-0x00000000743BE000-0x00000000743BF000-memory.dmp

    Filesize

    4KB

  • memory/2388-76-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB