Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 13:00

General

  • Target

    c6d0f02bea025532e682522dbea4a954c3f809b7f345f7cde35c87bc16317d05.exe

  • Size

    547KB

  • MD5

    1ec9d8e16dd772d385b7ebef5e20cc86

  • SHA1

    20bf9c50d4efe107178c82d15990c11bf4075f89

  • SHA256

    c6d0f02bea025532e682522dbea4a954c3f809b7f345f7cde35c87bc16317d05

  • SHA512

    1550384c53c1cf4808e1e4c5e2cbd014ff98409abaded2a3cee6b05bd43c6d68630d63d45995e3133aecf75a61125be3b41ecd522db16c596ffcde055a708dd7

  • SSDEEP

    12288:7+dW9dMuKTAu+uoVqfp2CrbJFEZRz+feUymwzBSsda:LdMpTAu+afZcz+f0BLa

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d0f02bea025532e682522dbea4a954c3f809b7f345f7cde35c87bc16317d05.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d0f02bea025532e682522dbea4a954c3f809b7f345f7cde35c87bc16317d05.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:828
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

    Filesize

    1KB

    MD5

    d5078f2fe3a1e54be81f6c95543b0a63

    SHA1

    6ba1d11452b5523542b48dd9c55adf06a8d771c8

    SHA256

    4b40eadf8976225e01b0b0cfcdd1e04295162b2bb4398fc8e20e37ea036b90d5

    SHA512

    43f5d30b469bcd0626e9cd04c23a27c61e7dae0fd3c73727948fece0ed3ebf144e4bb453f826bb0488cf64fd503bb6bf2237bf69dc6416c35e24b9ceb2bfb8f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B

    Filesize

    1KB

    MD5

    a18a8693add6fdcfe520958cda4e1dd3

    SHA1

    d741342df9ff9141d03c85e097177bce242a31de

    SHA256

    5175b0021b8709e572482eb5c5883b125fee8d1c32efd8cb50253a92396c1503

    SHA512

    8421d1eac5aa2357b2c01f3f558699060ada22ae8551347fe882837ee621b865211ed5489472367ce4a0346aba2790772499a82c5e2e2ac22374fe02a563cf70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3

    Filesize

    1KB

    MD5

    cef7ff70e982293826dbf8ac5426d45f

    SHA1

    ad5c6ececde5e3ea5fba2413bf80541ad010fbb2

    SHA256

    d9e9d4c2a6f8b53e1f69d11a796259b538b15e9279b63a9f29ffaf67a0d81823

    SHA512

    6a9f583edd2599dc54963eaba8a5093651b5bd1a3fc6651829130143548905391179e528f1e0e318f79fc52317460b3af41503688b3d0f9f496c832c184ac774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

    Filesize

    508B

    MD5

    c1b0bcb8eeffc85974408fdb158cf36b

    SHA1

    a6401b8a4b2d7f3d4ca1183a1f47344d3cf66935

    SHA256

    0eaf2d639bd90cbc34a223fd21ef19846d426555cfe93687fd4801dc3b652a07

    SHA512

    e0f66050e64a927cbdef95b1a7b907a586ea421ef0c5babbc13c20965d8a95bb217f435dac6d3f45c65e5047c8630640bc76178be625801da23b8fe275530dcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B

    Filesize

    532B

    MD5

    c77f6561ffa0543c85b37bbab95d2100

    SHA1

    a0dfc4bc9db6d80600f2bdd0291ab0a176c9ed94

    SHA256

    e32ffa32d85936d9b05781eefe43ec2b338f0f2ce1be1fdcc2893adeae5f54d6

    SHA512

    8cf9852c83582830aa8023ca486a08830eb07f718dc8472d788ddccbb96768fb63b33319b6c531380d271a6c0817efefff2d25c94f8e83dffd014788b698045a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    75ca36b6026a002dace98477050aed08

    SHA1

    e2ecbcb6269012d3e6573678eeae1124df80854f

    SHA256

    0350e6a355498e74d7092f3993d88fd6693f39ca44859598b10d22b464471bdf

    SHA512

    bae525237d924c39f21636762c5cda5f78f6b8943d1ed3c143a2a7e647468950d3ea77abab64e37ed9b9dda426329b6f3e1abed413bf44031e7e2b5c22830d90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3

    Filesize

    506B

    MD5

    84a3f7fa9e26bccc6567b47596de7704

    SHA1

    8ee0656c9c0b5011f7239ff91fe0bc76d9befa09

    SHA256

    6a1b3fb5ede4497966b9fdb872d1d3d5a0d8a1b54cfe273fb69926b74ffe11a2

    SHA512

    22a327d16711e261f33f3aafbfbbdfe0d4eccf34792b6e4b65ef79e7fc297a06e9e580b0711adbbe8fc2e6e256760678d47892aa383870c5c5f8226e5368a4b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZBG6V46H.txt

    Filesize

    603B

    MD5

    86926dea4176c53b2f5868fdf5e1efb9

    SHA1

    22854aa47e990c7f6ee49d70f46f5a8b0a93bd96

    SHA256

    5f66a7f133d87f1c3e938598e1e7642a4459c1cd46f78e9fdc6261c020b77376

    SHA512

    cc30c10a0b28011d1fc9c6d81aeac0cae8de4392060d0fcef399af77b28f3e444bd95d29a15c79f09365d800eb59ea1bbe049d23c279ea102cb10fb0c557c3cc

  • \Users\Admin\AppData\Local\Temp\SkinH.dll

    Filesize

    84KB

    MD5

    a00c474dc4ced90b8f5a692108c45dce

    SHA1

    e02722d30a6218523e9ddef287817788a4a9b9fc

    SHA256

    6504e515cbcf89cb98fd9f1a310125bfdf93e1f6a6bf0c64c0229e5670cac9b1

    SHA512

    e81b001379f94fabb71f1d6a019b81202e00da7338048b77d1728b40427689a32801419377d3e86c51c5e418cc3ccc328ee00adc69eaa575267bcaac8f477abd

  • memory/828-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB

  • memory/828-58-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB

  • memory/828-57-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB

  • memory/828-56-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB