Analysis

  • max time kernel
    120s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 18:07

General

  • Target

    ETConnectServer.exe

  • Size

    99KB

  • MD5

    4986a56019bc459b3ab0c76d4cc12261

  • SHA1

    48f308ec91d6d07e71a859d72c344ffaf232be92

  • SHA256

    7417554d18b5a59936d83e96c7f83d3d030fa1ed0f70faa36099ba1bc309588a

  • SHA512

    6aebf45b020b68c10d802cfebc8088a7194af4733c5f8c98c90eb16cfe3ca47764e50b0a565bf41033f3893b048dc339148c309057cc2698f3ced71a26d35804

  • SSDEEP

    1536:Np5Og9Kvy7XTOES3l0Zf1GqeIyl+ZaEy6+ThWqPN2aU5Og9Kvy7XTohf:LD2Eol0x1GqeIyl+ZaEy6+TVN2aUD+

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ETConnectServer.exe
    "C:\Users\Admin\AppData\Local\Temp\ETConnectServer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ffaf91aa526175f89d780226379d904

    SHA1

    b1a16dcffcbc5bc9dfc17310895ad3ab644eb03f

    SHA256

    8a68be34023fc01470059d0cbedc432d29619a03edb9dfab354dc58ebd2fbce5

    SHA512

    7b6625fdedfb6e5e5b2916a84b69e8a35faf1f0aea43b95c40fc00c5640b175c7eeb4e5a4ec02ce45f86e0c0e3f2c4bfd3a53bfefbd011b27123f2cafa3cf5b4

  • C:\Users\Admin\AppData\Local\Temp\CabD2CB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD2FD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1668-0-0x000007FEF615E000-0x000007FEF615F000-memory.dmp

    Filesize

    4KB

  • memory/1668-8-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/1668-137-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/1668-138-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/1668-139-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/1668-140-0x000007FEF615E000-0x000007FEF615F000-memory.dmp

    Filesize

    4KB

  • memory/1668-141-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/1668-142-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB

  • memory/1668-143-0x000007FEF5EA0000-0x000007FEF683D000-memory.dmp

    Filesize

    9.6MB