Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 02:00

General

  • Target

    e8e98e1c239086a56ca13263b7c4506522bd380f076187d05aae7f1debc233a7.exe

  • Size

    1.8MB

  • MD5

    4c9bc9edbbdc0e1a690203a2b3634b41

  • SHA1

    3128157c85412e4606a40607227600eb83b89613

  • SHA256

    e8e98e1c239086a56ca13263b7c4506522bd380f076187d05aae7f1debc233a7

  • SHA512

    be295267dbd32b1f2849bc2d6ef8e28174ad278a1dde46254af68777fa137c0e32478871c418ccb44f9d5edc3d52d5441c6b6c34218c4a37e6c58f4c2a61a8d3

  • SSDEEP

    24576:j3vLR2VhZBJ905EmMyPnQxhe41LwvHYgCTBHUhifTa61tz+IJgzQgMjphRSYRHfN:j3dUZTH5LAlyBHDDtzX+zQgMHR/HMxf

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8e98e1c239086a56ca13263b7c4506522bd380f076187d05aae7f1debc233a7.exe
    "C:\Users\Admin\AppData\Local\Temp\e8e98e1c239086a56ca13263b7c4506522bd380f076187d05aae7f1debc233a7.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\e8e98e1c239086a56ca13263b7c4506522bd380f076187d05aae7f1debc233a7.exe
      "C:\Users\Admin\AppData\Local\Temp\e8e98e1c239086a56ca13263b7c4506522bd380f076187d05aae7f1debc233a7.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d7457cf41f816ccfcd7a5c4682d7501

    SHA1

    c75d172ac1cd1c0f3f4cb30e21676cb3218ae2f4

    SHA256

    fb153e503cef29cca9bbe13fe634ff727d577819d9f04d1a5bf89bf06c0889d5

    SHA512

    842c8136120163ffde2bac8466065dbd93c0891f53941856cf55484e3740d61644116933cafdc026d44f2e9f043982b9d0761377969883bee1d1ac881bfd0eb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b64aaedf72026885a176f29e55875e7

    SHA1

    d6d27180b6de8876cf2550fa5d9dfcccc4eb840f

    SHA256

    8c6498bb46d8b25d48be7d3721cec5c97a5d38ef2649b2556d1cd1dc7c12632e

    SHA512

    7481ea1eb20a29e601ce4b0ca75ef3f3f49e48d37ab5e5fee3335a7a99b1bdce84966025fc63a9b40225c15c1b8b810c680df828402acaeea384dff2fa28fae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a65eacb859a41bd9fb2f02df34d03afc

    SHA1

    ea6efab8845f89652f3210fd129579ee98536fda

    SHA256

    7d62ee01dcc7d172ff51b44d6bf10090998d43335b5330b52f7a0e68638b80a4

    SHA512

    eaa71f5f98e015b525199e6c094696a52aaeb9eec91d90ab6c67a4ec3909285ad32cdcb4b8e70acaf060034b33ecee57b117b135668e3f3b12a4adc1b6c14ee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a87d6314178d5c37e98abac8b6df9290

    SHA1

    0f80ddeb35a8cd102e639ed0947eb52ba2ab30ad

    SHA256

    a91fa33a9f302774cdcd622eecf47f10eb81cdfdfdd6d7e2fcd24aab27b3aa89

    SHA512

    b3dfb202241f6a348380c24a67c9795925f361090d66d45a850cd6eab1efef2efa6ee90015414e21bd81de74282d18e556c44394450172ab43b4d01d69c145bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dd97be08191ed953ec24edb25dd5d90

    SHA1

    e21e1fa638ce564a91ebf029ca20ebd5782498a0

    SHA256

    9180ff624703019d1e6dd18c2f48adf0ccb89b0e31915cce7c214e9cb42ace31

    SHA512

    c076a0133b31e1bb5d004443875c1d4b0cbfe5bd24b059040757acd04ef7476939fb189a8a3ca53cececdad43980bc259095c7163d1bde04e3f5df9839bf3536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61150788a87939ab6be9c26182c73425

    SHA1

    da6427e05b404d18541a54a2fbecc922d6ca54df

    SHA256

    cd8d891e5d0483967199c94074414d592290e1472d9f1b4cbd472f8cc6916cba

    SHA512

    7a69e5326596c5dff2c53d25e4b56e1c9b6f1c1ecd1db124ee44907bc5552a126fe807cdf1a940002b3150172dcda16731a76e03707db9fe58436c7698d10610

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9063aa4614be05c963e8207f778c1243

    SHA1

    2d00223a69f4358725e9eea333ac99da0b9ef678

    SHA256

    3c362a78fa5e5e95f4cd1f235d68f22032cbc59ae2eeee42a77f7dbc6b7b5618

    SHA512

    3698b879b0e69072e46f85dc1d592b464c745bc7714b9babd4f514266ef4ce7a68ad1bddbbf10037e44000695fb7e6cbfb358713a48b3b7b4e7ab65cc7010bab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8afa461e56a5022f141f19ef639d6b8

    SHA1

    12abae93aa7f8e8761bf2c6d7eba21938242e88d

    SHA256

    a4c61fd0a1c48450bcc39c1798ef7575f2ee22377c8140e034578c078d0dfe1d

    SHA512

    27fe3ca0745ea2b61fab10678018cb506c8a7928d2cef0cc96fd11dd61f8b273efbf02cf7f749dd512516ee3dffdcc1cd0078f00600173b0254b6af2a05e3acd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78f1eb1955a4b4a557140d6341b4b964

    SHA1

    d754fad57a001c60fa3b581bd02053d24389fea1

    SHA256

    d1609e5fe407bca74620b99f5bbd536d0e8756d4866e4cd1977fdf8c7dc9eb05

    SHA512

    1fb7835579c327099ce2acb3c1dd50e8827864b7a722f465750d4bc17236712f867ee96073652ddc45615394bfcd50b1f0347047fae10a74c9bb60ebcd6efb04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eefc3f747f48b4684391802b87eb3638

    SHA1

    0c7309a0439b479b990fe32f88d162fb0af87c7e

    SHA256

    1662b3f7a663572af4cecbf111cfe5f52566b9983c4e98044b558dca81af8612

    SHA512

    f03ef6431359e095ea75201cd879fa56a784de08df844d4c3d08d8eb4c500e20e1247b73bfd2e964b2d2e10b0a0812b2375caf7e4aaa7d1f788cab6dc6a7f65a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01ccfe7016702940a6ce7ffc663f60b4

    SHA1

    71564e50f5fc32eca8e9d727629c88497bc229a8

    SHA256

    3a0d74089083485855ac80bf5732f8ecd12e3ad9a798f943f6138f07f92b2053

    SHA512

    df8a52664dce27338d8279b165edcf1e79860e4d6b078d9c3ba89855e9bcb2c57ea311d6de701b44ec915b949cea511fa6635ff87f585059c050576ed040b48f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9c5b22fc6b0c16029058177347383d6

    SHA1

    83d6fe6f081010049b7092926e29e49ee3f58b34

    SHA256

    0c4fe41cb09893de7e4c99595f60f1b620ea836c8c4ca6341017080ff8085492

    SHA512

    b755fa810c83e756e28cc980eddb3fd0f29e3cdc5f2d9960d0330bcdef9f1767932907a517bf8324ef3cfe9ae7b051c9fbc3fe03d0ff887ecb5a5ce5df8630c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8b1b1a18b69f27577381c823d489ff9

    SHA1

    c7257f965494dce5007b7752df913808795608e3

    SHA256

    ec2b0b4b21ea90c6ea934ec1aa3699f00ba9472ca785191e44d048c28b07796c

    SHA512

    9f6134a47c6f3304d15bd6aa90bee44f2015f5e26efbde23b69e32ee77faa32564f6393842b92ca522f80237bc1ae9bae7aed85a72dc6d89c1c61ab3b73f2d4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da2db8a17467138da567dedb9bca1c77

    SHA1

    1a598247a6dd541477375e88443d01f972c1899d

    SHA256

    126599779d1b46e7e7ceddf9360d930d1d2b51965f8362fcc03b3bc27a7c67c5

    SHA512

    a0adc3a55b27894763ba44788f7b2ea43186484f9753f4e50f7d95dcb0811885ac7dc9e05be0caab6d9a6b84028c19883af61e52a47af451a8e115eb93fe264f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e0f57b5767ec6cede03ef302d3ae998

    SHA1

    96d452c96cca25f6d6932f508440be4f5cbc1e9a

    SHA256

    f198da4754f2e9feb5c55f1075dbc21f2108d8bd8893c03b5fa2cd035aa50d9c

    SHA512

    7794f8e3301b80cdc5d3a0653fde20897635a47aa27ff8110fe1db52cfd629ec12efac154de97b85d3e9183e72f6ac0f0bfec4641b7e84398f36f6acef642c49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eea3fb1e69f793b978eff686f23e66ed

    SHA1

    61ca13c19320fb7b8dbf6ab8489a12207788bc69

    SHA256

    59d63b825d0da1946f6c0ef7bc85b191bd381ae1241ca3cdb1ce94571aaaf040

    SHA512

    5ca1fd02e48fa909f59d361162c31cff3f19f123f1c9f80fef7ebbe54475436fd298c15dbc5b9b9603b5e1802a278af2f4e107a6b97a637d362253e663f89cfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84bf53ab96901a10f3588df37e36c792

    SHA1

    c59a15b3a9332695d381e82e83e1ea3547e63a97

    SHA256

    789e727166242cfd8bc7db68dbdd71b87cd772581d2a6c803580a0855870877c

    SHA512

    bb47cd6744346b6b7f63fc40996e7fed048d6fc9be4ef26fa86d8571923c0e17ccef6b7df74652bc0383c70f23bd5c568f29eaf6271c53e020a11313b11a4e75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3784939b3c8b6f54714de79e5fa10f06

    SHA1

    6bac27ef79e1e8dd7418b1e4dba36ee439cbba3a

    SHA256

    d08acf8dbef4a031f7611e6bb04403383251150f2e1e3d48440a6202a291a104

    SHA512

    84bfef60c98756b321fa5423e88177485817dc70ba1f1a3e6c14be1d86e6e31d8750097b49f9532c9f1b9f82387d60f3f165206b17965604a8837b6ac46a790b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3162376044b8cc7ee6b90f836c6173e3

    SHA1

    06311a871cf68deb328f5fe4137de15fb7059af6

    SHA256

    3f8c9f0d14adf30c234214df9145469f8f7aca6d832e77a9596cea392b123cb9

    SHA512

    4d53e43452b2b4e98478ed8620e2ffea76146fa071e51ac643a2d58189bab9bec07fa781b2392b7dfd97b85ac2b7ca33b5f37b681d30f5122bb11e8eb7081a2e

  • C:\Users\Admin\AppData\Local\Temp\Cab80F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAA5.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2212-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2212-1-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2308-7-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2308-6-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2308-5-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2308-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB