Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 10:17

General

  • Target

    17d8875f4c84a0abbaa72097ee460a777beda20a8b27b924fd42d6e2d2e6ddd0.exe

  • Size

    2.6MB

  • MD5

    391074686ae2b33b85792431c7c6d694

  • SHA1

    129c0c32284c26cace8890a251fb8aa68740f5a1

  • SHA256

    17d8875f4c84a0abbaa72097ee460a777beda20a8b27b924fd42d6e2d2e6ddd0

  • SHA512

    5bfb33e7ad0af3631f81533a187a7180995e2772c34134a34dbd65d46fef8e00335f9186188d514c8858ca83c3eeb058ec2aba7a42292aa518591781354d5176

  • SSDEEP

    24576:9A8vyrepIND/0bfSPdaYsi5YYR+h+8fEvdDrGnrdEROGHOhXBo7FC/hRJHOh:9A81IJPLmEvdDqnroHO9HO

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d8875f4c84a0abbaa72097ee460a777beda20a8b27b924fd42d6e2d2e6ddd0.exe
    "C:\Users\Admin\AppData\Local\Temp\17d8875f4c84a0abbaa72097ee460a777beda20a8b27b924fd42d6e2d2e6ddd0.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\17d8875f4c84a0abbaa72097ee460a777beda20a8b27b924fd42d6e2d2e6ddd0.exe
      "C:\Users\Admin\AppData\Local\Temp\17d8875f4c84a0abbaa72097ee460a777beda20a8b27b924fd42d6e2d2e6ddd0.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2556

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aca427931d97478f44bb0353a64fe44c

    SHA1

    ea76e933bef5dee2f389f53fff14987bfae9f260

    SHA256

    08e6e49016518b0812db7279f3d364664a40e028f3b2f3f598540aaa33e246bb

    SHA512

    6860d3842113ec6d9864fb7b6f4279157e87bb867e5b25fa6d964fac8a4a686fbbc00631ae9e403c82aeedca668dc9f3333e7da5f48685cfe03ae5966a0b848e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    638c5cbcc5b6b379decbb2e324df5f4e

    SHA1

    8a71094b98761f244ba1386c568b5da95f02529d

    SHA256

    1e97b934c15b41afbb86a8c833abc6d84f5d585ec7a2a11aabd233feac818ac9

    SHA512

    82ad110d8b8aa261cdd3f8975be8ddc3f32570c158866364306f2c47cc87e42fa8380f4b6e3bc010c08424511967ee0c030225255093e8bb0194bc0869c8556f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    99d65c28586bee6442ae08bde94192dd

    SHA1

    f45a1ae90bdc4d4fc922fc2decc85852dbcac1c3

    SHA256

    a851e6a43569d3655a9f948f93de9831c8dfafe5e5af30d7ad018ccde3d10bf1

    SHA512

    cc4acd4804d6289203f896000ba685ba4652cca080f72477dbe57853fc3bcdf6e89850339d53ee0e13814328eef79200c025c5032c50ec6ff9b63bfa9733d509

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6a04955a200edb773242b40e343b78dc

    SHA1

    7d1cd1472548c7f6fed08fc2bf10990ed4fe96ee

    SHA256

    9dbfdf71a96c7b864cfea7426960007452c35897c5d76faefeba31fc68f6a105

    SHA512

    025c18089d7690f4240cfe00693b19694f579d7db21f0a30174d96df38a0fefc2534c87afca409568f277200b85f4c7732d5e52ca741a45e6aed4c1ab1404aab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    471755f22d7afc9c16f2b3c43d3cfaa2

    SHA1

    37c45eb190237e0fd082a3ad98ee9a180f4b9f2e

    SHA256

    251ce19eb8df1ec0ed2cd6ff607a2892eda1cb100d05a54ac8597eafb55eea02

    SHA512

    198d3b14b1fccbd421d45d400a83ee226a196d3e32699dfd336e0ff0567e92f2a1264911b5b052ba32519317b7f97383c100bdc72dc0d765bc7fb4249158bf8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f54ab9b689b6f1fc6bfe6617cfdd5279

    SHA1

    a0f032488a35cfe2fd23bf1e7540e132dbb9f3d0

    SHA256

    22dad4d8848837f2acac738e26a63977349159f4ab640cd58a29d05399ee3be5

    SHA512

    c4db2c2a5032a5a8f62dee79201479459caafa4ea4e221a4b0128aee4114554713571300a5e3f9bd88ab70d5bca3d9088f2cd3d5ce83c4fd30be561b03b15843

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4b0ca08df29ab3ee29541375e59383c4

    SHA1

    0d8df3c2dacd157c28a83ba65581914463106663

    SHA256

    64c22c62a2dcf196ab97d7ee1f7d382580e521298209a189995a0699dd1dffb5

    SHA512

    560431f4d018197bc9ba462f166892413a0659ec5c28126c01146656a0fddb1289a5900c6693b8e63aae18c4e46d5925a3a665eeb1548b074f978315d81eb85b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e993d889215df68acd1c2fea5dc36f2c

    SHA1

    33552967b2ccc43b6c2b9689ac81a2740474da76

    SHA256

    957f72c2ca4433bb31d38e4efd9ad0a1d8ed5cb1740173612cb2930960aaa9c4

    SHA512

    033e50c4522f2e810ad67186162b0544f682c9e95270548fc86b881c9bb9e4e1768346b750804fdaae7eaa44e6d6b85a4d521f72b4ff8276a0f83e5848a08c45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6253fe68cb43ad2532688012cdb2a8fc

    SHA1

    b044dd40cd82e85d8ef3720b040d49d91967ddc2

    SHA256

    f9b9215ea78644c0fa6b028426cfbcc5ba0ed98911bb2bd42d9620ccaed7a19c

    SHA512

    62cc93c3ac4984a6300b656fb4f45e2fb03c300554d569359a2584c541e9042260c63a0ca3583599c4d27a226c4460707c9d9338e6bc27bde5fd92998ce4c215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    394e3acf6ae64623cde7c382b9b05f14

    SHA1

    cecdb37ebce40c1e1105a5df44c5acdc6c5aeeae

    SHA256

    42e72c8929f18418da4d8ca5cb72bbafbfcefc181effe2d79dcd8ab4fe4e4d33

    SHA512

    7c0e9b16b4a9ac42e061e52b9039d3e96cdd892323928e2f2e95559670ca40a3eae887cae7d7c0660ba2be46301a91b2fc0d585acbf1624008ec64280e03cb1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    957f9ec2430cfb189a42977d9c547565

    SHA1

    f8a075dc6614a47c6a77afbfa05d0aeaa7238e55

    SHA256

    76e75ad3d44c1d91c13d822c06023e7ae0c96355d0d98e9dacd995fe627dcbd6

    SHA512

    8404ca365b470d6b0152d7435331206922857ae576a0e170a4f7f1a1597b06a0f0172863348ee67f3aa59703d5abbcd283d486a1c02fe7bee693fc8b31dd21ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    dd124ba1db24707739c28f41e5a432e2

    SHA1

    9962248a155863b551112d862da32e56685d1183

    SHA256

    730b598585b699759eba6fd1c00477530b5a8422fb189b2b5c889f10d8681b85

    SHA512

    c4fff290ac9699ffbf694760253f1da4d8813b77884ba513aee9e65f6c01255cb3851ec8a8fea8e206fe9bb9b7cacff68a543ef02b6a906920c3c4ba886b9a44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    469f06ac44cbc19ec8487f950833a835

    SHA1

    10898210190b6eb56defae13451e9e45f2ff0367

    SHA256

    9c2dd6d67667323e713b2daeb9e2112c760ccc0b673a858d18355974595e7be6

    SHA512

    d3b49b2735dac1cf48acf0a3f93d4ae719f2d88cb533fef1a33fc6e190aa778e790cb2c054331b44e5b699e3fbbe45216ed66a958ec3dcd9fccb21ddd247f134

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    546706d4037f15c353db488fb0def970

    SHA1

    267ed47e9351d1c34507bb8319ce3a1cf94127ad

    SHA256

    bc72d2c181a712ec9533b87a94d678b0c932a0263d12934fb8e557af71c5ab3e

    SHA512

    b4400fcb9d604867d6470742d003e189d8834a2d9b344629d5b074b729ad41bbe5867c7b9a3be12ef0451048010d6cebefeb6f092ec4f8d7e64c7f67dde8b418

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d34da32d2a5e90e1567657c871ffb2cd

    SHA1

    131d2daa6e594ebd05c9481d5f6786b208dfc9a6

    SHA256

    392a79b239c6de583c55bfbc05d884359847807ca2456424884b65a28c2d576f

    SHA512

    a392ac6c4a5aea6055c44705a7ea516066c01410e1cfff1a85658f114cee4d65079e260a763fc1911056ae332329e92a3fdfc9313a73cf1b2550754b814f3126

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    adfda4cf316daf30139fbe15cb54332b

    SHA1

    f391b53aac28bfd3495a73cb94b92ef2c5e320df

    SHA256

    0799e531251b3e112de618ee7287fdeab4f2fe29bd2202d5d75bf0e14ecbee02

    SHA512

    8d6e657986449e99487639350a38138e1695c68401dcb10070abe62517e1b7700f8042ae7f5e8fb3204fafa9401411e30957bf7992e6d447ca5338c304507863

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1b766c09670d6648217a28b97e785571

    SHA1

    7d42acaadb7b009f46ed01a2904ba2c271caf58c

    SHA256

    edaa6550990c9e1aa04d014c452363209dc44f69371ff7ac64e36a4b943ebdbd

    SHA512

    b261a36450b1bb2bc41598c9eb7cdba81c3fcea42eea09b26f9ccd9c1163aab96f4eda2a431ed391caa2f9c861d07a35a0f96cbd14307fb5d7afa001639f17d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b4043ada022a603a01e9788f0ad83342

    SHA1

    1cd7493227bcabdeb028b373d4488ffc7ccab81d

    SHA256

    7987cbd55e18475566231d456ebc70345fbf9fd18069b46b28b2cb9266d8249a

    SHA512

    88a195cd74f26c67c371ad631a6f3c81454b191e489a9f0b19f9e7e466c23cd9346846ffea37b47c66f35b7998f9cdce90fee6ddecc9ba585ca8f4f3c613f787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    241808f7e2c4ebddb3800a1480a159d6

    SHA1

    3a377dbb9649ee423c19b871ed8d9e6a0c6daf50

    SHA256

    81b882daf0fd2db2822913e528d6858c6fdb7d8aa72887c9978898aa6d1b9ea4

    SHA512

    ea25ba6340460bca634fbe6d4b0e0dd687a21b481520d11eb043f1a14ea17a24bacb2b4d36d6a9998fa60c1be84997a066248ede14cfdc49ff54fe5afc634be6

  • C:\Users\Admin\AppData\Local\Temp\Cab6B8.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab775.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar78A.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2852-8-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2852-2-0x00000000001B0000-0x00000000001B1000-memory.dmp
    Filesize

    4KB

  • memory/2852-5-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2920-0-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2920-1-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB