Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 01:07

General

  • Target

    2e122a4539d8e4115a64599ffea1494ad80a70c24e655decf11b9ca83f53205c.exe

  • Size

    22.4MB

  • MD5

    7bd66ac8a1a6264231edfcb673321b30

  • SHA1

    2a139df742f3e5ae95750fc2a156402098ca0a36

  • SHA256

    2e122a4539d8e4115a64599ffea1494ad80a70c24e655decf11b9ca83f53205c

  • SHA512

    5278674cacb33d9cad6bbf436eda8b082a1ac29fb624b5b7b530c641659b35112719c407110928bd313dfbf124a5091285e40b74b71b3ccaf917dfffcdfab775

  • SSDEEP

    393216:B3ydPshztuIF0wtefW9iRHFT45KK71S7LeNhO1U77acQUAHXtx6JzqEek3WTfwaN:B3YwtuIywtmX4hBS2NhOa77acno9x6Ub

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e122a4539d8e4115a64599ffea1494ad80a70c24e655decf11b9ca83f53205c.exe
    "C:\Users\Admin\AppData\Local\Temp\2e122a4539d8e4115a64599ffea1494ad80a70c24e655decf11b9ca83f53205c.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\2e122a4539d8e4115a64599ffea1494ad80a70c24e655decf11b9ca83f53205c.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\2e122a4539d8e4115a64599ffea1494ad80a70c24e655decf11b9ca83f53205c.exe" MD5
        3⤵
          PID:2256
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:2248
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:2468

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2416-4-0x0000000077850000-0x0000000077852000-memory.dmp

          Filesize

          8KB

        • memory/2416-2-0x0000000077850000-0x0000000077852000-memory.dmp

          Filesize

          8KB

        • memory/2416-0-0x0000000077850000-0x0000000077852000-memory.dmp

          Filesize

          8KB

        • memory/2416-6-0x000000013F060000-0x00000001417F5000-memory.dmp

          Filesize

          39.6MB

        • memory/2416-9-0x000000013F15A000-0x0000000140191000-memory.dmp

          Filesize

          16.2MB

        • memory/2416-10-0x000000013F060000-0x00000001417F5000-memory.dmp

          Filesize

          39.6MB

        • memory/2416-11-0x000000013F060000-0x00000001417F5000-memory.dmp

          Filesize

          39.6MB

        • memory/2416-12-0x000000013F060000-0x00000001417F5000-memory.dmp

          Filesize

          39.6MB

        • memory/2416-14-0x000000013F060000-0x00000001417F5000-memory.dmp

          Filesize

          39.6MB

        • memory/2416-15-0x000000013F15A000-0x0000000140191000-memory.dmp

          Filesize

          16.2MB