Analysis

  • max time kernel
    117s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 10:18

General

  • Target

    e4c4d97fd370408748cbfb6d8084b587fe772cfaa7cda6a612692a66d16df111.exe

  • Size

    2.6MB

  • MD5

    304075e778601a8bb7f0237870083657

  • SHA1

    66bd6da222e46073da5648e74121dddaf409c799

  • SHA256

    e4c4d97fd370408748cbfb6d8084b587fe772cfaa7cda6a612692a66d16df111

  • SHA512

    811ee62d9838777d7bf5491d191f849ba37917d3391df919cfa3538cfe8fb21df02e686f857abe59413bc7450a530a9b7cbe809b0ef0f6b42a32d9e95dee89f3

  • SSDEEP

    24576:9A8vyrepIND/0bfSPdaYsi5YYR+h+8fEvdDrGnrdEROGHOhXBo7FC/hRJHOh:9A81IJPLmEvdDqnroHO9HO

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4c4d97fd370408748cbfb6d8084b587fe772cfaa7cda6a612692a66d16df111.exe
    "C:\Users\Admin\AppData\Local\Temp\e4c4d97fd370408748cbfb6d8084b587fe772cfaa7cda6a612692a66d16df111.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\e4c4d97fd370408748cbfb6d8084b587fe772cfaa7cda6a612692a66d16df111.exe
      "C:\Users\Admin\AppData\Local\Temp\e4c4d97fd370408748cbfb6d8084b587fe772cfaa7cda6a612692a66d16df111.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2948

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    387563e4f30e07cd37d4b1ef2412b091

    SHA1

    73f5ded03302f0fa412edb2c9744e80bfbe26cb2

    SHA256

    ce9856c88843243f512ae1fde32c96e8b6fcd5ae2976f18ed308083099fafa37

    SHA512

    7b6d656ac2b948ef80dee46e7449d37c605e3b00d7bb76e00ad2fefb5c1e6a5ad89aba0bbc6d5559c3737225b6c983eb48adbea560336dfc4bb6eca5658febf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7e4c54b7ac8090f3f7db98f1b9efcb2c

    SHA1

    384e102d683cb7ba0ef7cb5560580287258f055d

    SHA256

    81919cd7b3858248527f8a16e110f18d816960ae797dcbc9fe4cd509808a3efb

    SHA512

    847d909d009fa64b19a0aca27bed51f0f4c8b84ad9133c2e17ff0b0a8441dbe5c6b770e9b3d576843a5262ccefcb3b7de93e6037e07435ddb3ace9ac85911d51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    dc948060d4c61d4aff1143c0bf614e35

    SHA1

    174405018d19d7d9f0faeb68dd5112764a947e27

    SHA256

    e3dec6a5a137789c5d1ccbb0c92bc7c65ea9c84c15531d4f417683ad3a9a83a7

    SHA512

    e5f336c0c42c329031ae53fb68dc318c9ab2930052300375916ce590d70c25fc1fa2510a8b68829a7760df1c48aa0db53ab9eb6ac42d883b4e80d1e78a939b3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    49b8f8121c2b5a2a6febaa076b77dcaf

    SHA1

    434cbc8f6103423120fcf9b49325bd3b718cb778

    SHA256

    bec522bda6cf277a662c6fdf7388e2b534b8065e3aeedf1cf6b023fd2cdee824

    SHA512

    b8fad83357c1bb261c18ce4cb66ce93e2b818ee16e43ba23d69b64ed303d49574927a406cd3a6e77e394ffcfaf754b3fa3f0e8948ff91de4a2107a4da1123985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1ca52bd53f1efdd8cad2a640c4a6d1fb

    SHA1

    fb851e7837b4196cc251eeb5b0317e7218742892

    SHA256

    d644d21331abaf17a674b0ddcecc4a7e08ec5e8f67da7b833f97289f0436949f

    SHA512

    e92fc054f7421c0879e83e508a65c0b5c3c218bce9577563d9625f7881a39972aa89cb69e855bffee1d3941ee35375ad5087e5a939711390afd94275d15a4784

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e4766ee4d9cf44a880e76c7b66d2e5f1

    SHA1

    cb7234ee14b3f6336036c1b699c204e6ee550923

    SHA256

    723657ddcb6ceaa247998ca203ec10e8aef4243b093a00220a69999705acc83d

    SHA512

    fb13fe8a517f1845c8a20c26eb7f82b8a88f8613688f1fefea4d1e82ff831c7a0214c7730e571f18970bba411b0fdebd35915daec1b8a791d37b0113b75d7863

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cd4aba049939e5b231165936f5a1fc8b

    SHA1

    882a05ccb951a041d31b80aea3568f1b5d78803e

    SHA256

    7128bb6af4cf17fbfd39116985d8e3f680a7e497ddcacb3b8c9a80b66cf93eab

    SHA512

    e7402f18b05fb33a4b997a981ee4c9809bd2ef4abcb826e8542f3f199ee63dd85c1dded4c681d164bb0f4248639c755a21288f742f24e583df824d3e97155a5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5fb7f7f81926b74e77c7bb2d0832c1af

    SHA1

    d7041dc734a56f1ddb0cadd6088d221cf6d43bd4

    SHA256

    89ea716aa5eb683560d088521015cc74d457f2efb29e95070358bda4990244a0

    SHA512

    08800218210d03c53b87af47880be0547a0b3da369e1618b44b80410e454f9c11aaf637775822aabb4b391a8bfddbec7cf8aaf1b90634b71311342fd8aa22bb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    04aabb594b9e563b5651ad8510ff793f

    SHA1

    7d3f7fa8821e5b2ac84fef188127febcb8d66d58

    SHA256

    c271c9b5b792aad69f2863c7b469cb593ed9dbb93d940cc7139419d4679f8d5e

    SHA512

    3d288fa5c1b321d32258ff733981eac88d880e35845c039cb4c874fc00b6bd71473b8f376e2cae2109b4e218af3f534523d23de343ba7c1080efa880fbc1321d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ee26612f3d932716cf322e82a233a3ff

    SHA1

    acaa9701982bb241382db98daf65fcb7273386a0

    SHA256

    80deccf8abc8cf9048a1e72464e4be6586f13a2dada6cf082417b02f993327d3

    SHA512

    5f1a1208227918b2f24846e0e66599251ec50c590c30a935d7c9e3aa74383436a3a788dd28053e5017c627d3ca181b90bf0b0f09dbee18e275df6f6333739d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fba3baf9a831e0e448f0b6b6b208d83f

    SHA1

    4e43e7998f616b65cdb76b3885ea3ff4732b7576

    SHA256

    f6071ff9beb64fa2a31aaaae185bc9b237c318243b273f46ac949de88c1be2dd

    SHA512

    b63e7b0a415dd34fe07841f6a05877e43b8fabc03e5681dd6624c516076bcfe919d6d4251a23a52d0da5774b349a447272ef0a56b79c8141b8d81b9dfc977215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    505ac5ffb4427de4c3d34aa4483f802b

    SHA1

    4956a94ace9cf1b9b9a0714cb4db1b3b75125637

    SHA256

    949a0820d71c3f4fcc94f2bedd1d8cc631c637f3ca240e33859facc5e21441a1

    SHA512

    05a78d4f3dd815d0ab2f42c4508fe99c158116ade3d2caff8f5a048cffb82224ed0b54b24f817710f4726fb7dd88629dbc16374d68daeb5a120903d98856bffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b5a7c66b2878022a2fc44d182480e329

    SHA1

    dd5f6c135d65746cb08fb19b4d12bb314fddfc5c

    SHA256

    1c283e5d40fe88c4dd82d61577615c2380fab9dec15cefeb570e50f9bc42aba9

    SHA512

    054ec7ff13e127775a9040cd9bc40645c5a7d5734cf15a17450f3b4a2b7695e4f83b3efb75814d7db346e57242ba8da9779f2f663c2d12ea7ef23fe6646d61f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2a90c2c7be4c176bcbb84f593d4e83a7

    SHA1

    d58563dcd7c02bb01838a7b6761bc0029f5cbfcc

    SHA256

    c1c2af4e7b83d59d98d45b4a8cdfd492c7b72d261d5aa8711e3a01cca62ec2e8

    SHA512

    d4b95219f52d6aed7ee583c3366139f23428f32b24ed487b0755104b750ce2593477f9ac02c2d3e552d9858ce3a6083b49fde8374f904635f8288d3f4b71eb5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c1ea9f9ebe2968c50b709f8924b2ef8c

    SHA1

    9c077aaf9ea4aa52c113f82629e226fe4c670d95

    SHA256

    027854d20c8897f594f05639339e191a54d1ea39ffc3cf4a32468884b6aeb1f3

    SHA512

    1953a96ce6dca9207d1abfc263677e7b85df63e0feac1b4bb0d8aa3b5942620018fffd1f2a2df3ac82ffe6eed7da9af1f5060473dd1fd858f26521bb98b9e23e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    87a85188557f15407d9ed38eaf008867

    SHA1

    c480c9c5457d6ef3fc130e5764d7e1859ef1d685

    SHA256

    15a21c9affbd053da863bd90f7f26f65e71d027315176479743b2c7cd8a322cf

    SHA512

    8b8049daa8c24d8f49af339395910d50f97399ac43bb9692a11ce960a7417ca084232920e99eea6f46c947770d3a0505bcde89abd08cd968875d4d75cb5a5e78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    83b75f31b15d57a6a74ed7753022b03c

    SHA1

    57e3e6972da813141e40d4849cec5671c72641dc

    SHA256

    8b3be70e501b5e54bd358ec871fb4880d2bc83eef4eab3b26af70283c329340b

    SHA512

    17288e429db28e398dcbbe63d534fffc4e50ca0e062c8fe07529fe61b2324f670318edc202bcc52b08f9f39f0e789d6602f15fa0828d05c3b30af2b6fbad96c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f37620992e32bdc5e0f276af223ba526

    SHA1

    f368cafb93b7de994d0d9148efec2bccf201f14a

    SHA256

    b9a9d4888ca7d555b36dc2f4421731d7c9545f8faa46c90628eb5d8aec0f9e67

    SHA512

    f343d829f222c5c65920df6e23eca4f6054d91528e9d751bf53d19e8086ed28afc009345a728e47e14dfab0a9ecef9393d2702d00bbd284298caf08cbcf03b4b

  • C:\Users\Admin\AppData\Local\Temp\Cab18A2.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1974.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2224-1-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2224-0-0x00000000002A0000-0x00000000002A1000-memory.dmp
    Filesize

    4KB

  • memory/2820-5-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2820-8-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2820-2-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB