Analysis

  • max time kernel
    142s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 03:24

General

  • Target

    88d1da2cd842e8957f1b398558e4340437350b67d8d41ba2f4002af11f026714.exe

  • Size

    1016KB

  • MD5

    9dcbea78a55ca57a0c16c94831374eeb

  • SHA1

    91a982bc500fcfe7d8bc2a7efc50bde6f6a9137d

  • SHA256

    88d1da2cd842e8957f1b398558e4340437350b67d8d41ba2f4002af11f026714

  • SHA512

    b4baf53cf2f73d7fce0049890197f99124029017f7ac464d2e8d500c23b6a95cf334a793fb7a24095bcf80689f56d88ac356ee6ba82c72c0c18ece876fecda3f

  • SSDEEP

    12288:DvK84XQFlzNWK3jeHSci0PiXKHAN0iKjB2BQ0R5nWFpPoSYSn9:DvHFlz0KzeycRPOAjYQHbiSn9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88d1da2cd842e8957f1b398558e4340437350b67d8d41ba2f4002af11f026714.exe
    "C:\Users\Admin\AppData\Local\Temp\88d1da2cd842e8957f1b398558e4340437350b67d8d41ba2f4002af11f026714.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.13fzw.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    edf47f6a85365a75da97790b83d797f5

    SHA1

    8a03da849f5eeaa5233a9be4fed87fc3e22e7b93

    SHA256

    146edc762456508afa2dc65eef48088596e6c7d3dea5924f6820b114ea5f2e08

    SHA512

    4e08fd24e24c2878738712a370426029f709bc4ded35af3614bfcf5eef156278383b3f5742546e2a2737c729cd977656f640beaaa2432efabe7611716636b6b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8adccdb27ba0774fdf6a93ff5eea7e97

    SHA1

    43652b582c8b25ba813276f1d02676f2660cc623

    SHA256

    a5eb56bde58b60367ebe8267a261cb7f594349b54bc90704560340a7679f87fd

    SHA512

    ba2921149ab445a48b194c8dba9d5812e1b7dc07dbcd3a3f5224cae0cd496473e2c9c13a610a0ccd563ee91cbdb828ad8d1a0ea48673ce34ce5144ccc2ab8ad0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7cd3bc4d7e6c125aaf51db8e728a0e2e

    SHA1

    622691239c86f73dc3ade898c6d8eeea1724f084

    SHA256

    a6fba1000906cba3353412675ec3f5d3c548626ca00eecfc17f7be0601548888

    SHA512

    cfd2bae7c3971e239fc47604b4330648d1eefd417097cc6df0f97e7a7ab88ecf522cfbb965130322303645320a95804e30d5b2e3512fca18f5472eba6cb3bca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8a6ad690946d6f375b4bf6cc36eee84

    SHA1

    6fc9112678a57d854b5ed98c3e5404b8fb8aa955

    SHA256

    27eefab36b01f1db4e53ec5f7d0a5b97848a650274264b55ab2b6da2dd383fe1

    SHA512

    f28533721bab78e6ec7b8827cd3ab1303171756b7d906df2403b55e6f2a68342b3d54d5938e66be8b6a63e07112699ca841bc035fd6805cdec91f3c49af3738b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f8873de4ea4cfa2bba6dc2b19a8a7a4

    SHA1

    747d4572eecb2940b35a4bc63950edbd4277213a

    SHA256

    5af7423cf3cfe9864fd8a6bd5e49939c16844d870668045c19889cbdcfec773f

    SHA512

    c51dc1d097c01c566dd5d0f32be65e7b1af3f6ca98b1d981328b491695f0494d805fa7f89f8d87c478d72bc0a41590952c6e62362d52846e7232a24e83e67f5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c10a846b220a2be9b2692f982156461

    SHA1

    f61242d8eb392e9d7c29e4f1e0a7ed2c4bf3468a

    SHA256

    a16d72c41a14cc2d707f40359a66e739cb6298766d62bdf26f19cbf66fedae20

    SHA512

    e6f4cf002b55f99c7d96c22e9201d2f01d5892d1ea4bd7df68e4fe37bbda3c274eba484bdc70ea37f90b0e7c68ee4eafb64f3cbf87717aa040df962df3ab7c38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3eec71433c04c5f68d0e66ca4b91c188

    SHA1

    8a28045262c5395b5eef8aec8d3e4c305583c9f9

    SHA256

    87f86c3a05efd07bd1d390be3a6668858d947cc451bbc1825a43ab414282d0ec

    SHA512

    84efd45a9ebb4a05b25d4a2037583e784afd2d8aba3a21eeb06530fd599d68e49ea819599cde5cca99e305bd2361e8dfb25e1dd41f4d548f95074377992c2bba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40a918c8eeb7fbad112a288530c5321b

    SHA1

    acd65d361fac0c580f89b8174b9001fd268aaf60

    SHA256

    d0048d4c222940b0ac68ecee5c6e30acc4cd6d92919f33c141e589123e22a18e

    SHA512

    ca03df1652a20712aa249a0d3c361368bcb33ba936db26d5ce62b00bf6c4c4eb900ea6834b057e6428e507e0be287c43bf8d4ebc221ed5f37a3bc0a81c889765

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efc190f00e5e7fc41284765ad4c4cea0

    SHA1

    adbb1d62075fae6f8401cc8a6b2db254be85859e

    SHA256

    904748f55c3501f8069e9582705ce414448f2ee07c6695a84a663e472018d411

    SHA512

    80fe3d6353185323b6d6c39edd1325c9d4eb04460750c9f3951d1e37d909d12f690346cce533311947890a76e936956595220f162460e4a481600b296836cc6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92a59a10ed0eb3f71538a2a048a60dff

    SHA1

    331ba973f2ebd44a258973ba45c9df8cc3dab942

    SHA256

    d1fb7382006cb0a09af8e1f8fc8fd4eb9122070a69f8df0d572e0cc3119b55a9

    SHA512

    4786165033fd655a44bde2a3a75f94925b47f621f5f19c864983fddc9db3bec6117f8cf36051d2fa4df2cb08c5206fad27b8bb7fc65eb26560ff59539666bb5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5cbced300014d16cdb83d376a8c0ce6c

    SHA1

    e0a033bdbf16f631436aa6c13cbcb4d25ee0c291

    SHA256

    7a61a1fcfd3cca0314bd9d897c5b840d4e46cfb3b988bf20581bbd421c98ff8b

    SHA512

    614234f1741de25cddfb54130bf7ef4d02e97bebe91efe0a6a1de23b6fee280470dcf803326831222eaf40c4303ee3a0c4b943ddc71c6c0d3d34bbc837c816f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74d3ac73ed4460380d8e94c240a6f7b0

    SHA1

    fe586adaf9f51e430f56c02e0b93b884c97a860d

    SHA256

    7f842fb7b9d4e416c825f87c69abc3bf5f95759859f2048593b65d6c1436a331

    SHA512

    a3ed33287483b6e59dc543e2e0f5a1ed7b40867057e05bfcb8f21edec0284d59fcee42bae76d215d3540de98e2d5d766dbc5535284f8109f8773adcd2fbf6cda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78683cd2b2ce5b20a6eeed9a5aa9a326

    SHA1

    b34ec614c2628d7215d8da3aa59878af39237779

    SHA256

    d056325a0bf48b023be80b78042b83eaab4dc8aaccc54bbc5442b322f196881f

    SHA512

    95c89113636257f2d1a2c48c7251cca1114aa3ba7d84c3f33cfe091fbc2cb89fe8933b1fde109f41d8968ab49dbf06cd393215fe56152b444908889957801f4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b45491c4c182ffb8d4022cc1e764d294

    SHA1

    0c96f83f04bd4010cbd2105fdb2db84af9fe1223

    SHA256

    6b1eae379e87b169912be15b0734852e89f4621447dafbb3fa345ee8ca8abf69

    SHA512

    7fcf23e4db709a44f024cba5b7804bd88460a1c3eccc58e6f5db5d622b02eb2668cb036c1ab9a493b584f978f0bf3cff49bcde9a0aa21ed5f556704d329fc4c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    001ec933d61954f06d62d4060b6178d4

    SHA1

    831a045087ea0fbe5f1bd800ee65792c826c8b23

    SHA256

    32441a26dac9ca266fdad84354fdfd5a95999cf90115a6919330da100a865a94

    SHA512

    d86752600a754e536707126e14404c1232e125d9709d2ac34eaec1ccda8a1aaa1986a5445e671e789b91b6fcd899932c3ffc47fdcaf2bdf80ae805ce62e4e587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea0a5a1f403075492676222dcd1ba75b

    SHA1

    c59b390d4f10290f53d1a7333871c37c099f2e39

    SHA256

    c9ad86757e7bb86cae27dcede63ca9de14c6a6d0e817211e32b304cffc95ffab

    SHA512

    8da855708f67b36ec42a08e92de200961d486bd2e25147d94e010d7902c4eaebd8ad5144619cbc7ea6fb4c436161592e282951d536c9974ff30fed2fd3013fd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8595e6ac34122d03d79abf7be78bdda4

    SHA1

    a2cbdfae52893603263d8c8553deef45f52e979e

    SHA256

    e41ea825e0449de03baec3c23678886ba50385482923d8bab537b044551638e6

    SHA512

    dd28552dbe97aae40346a8a46d3eb7d623e201f31eb0874aaeba105bf559b0425d78721abb46e1825da191c634c58fb5ba070f27629b2b4d1f6bb49e829f6407

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91bf7a1d2b8a5a4a3e477ae37a45239c

    SHA1

    ee81c12896356b9f74572f25f36aa312170d4eb9

    SHA256

    67c9dbff73b3ffa938853046fe173806467f462db350b8f901f4fd6ce7d97077

    SHA512

    3e02cd4830f4c9ddb5d8a12e34874c5b0a6f3ee58de8d1a567671842c5c389005474b1ff551d2d48de54a71f5242c8c2f9b29701de58030e3a6078b62bdf969f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b5b6fe7cea46b876aa470b83373a4e7

    SHA1

    c6f67d17a0d3e68681fd35a6c8d12794a244f8a9

    SHA256

    b1a5470aeecfa0035b777d8bd5b6783b395170edcddecf0c18240dfa3f096347

    SHA512

    765dd494266c2695be7c2dfc74073493df523c05ee2fe7a0a7d687ad3b676926b67e346ed7ef468dacc71b311df1e08678afe3ee68752d19746b561beac7f6d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1da341b99f6bb41e25c1575cd007eb5

    SHA1

    67028d2a2cf65be67a8c1eb784998b20aa0c9c63

    SHA256

    0d61135c44aefd9cc86af90b5658211488f9e5f79f1ad6b60838c0f38bbecd92

    SHA512

    2b2b964e15ee1fdd23f67d4c595323e012aecb9f9b4101e3fc1a2d5ccf2327693c0c9fcb78f49c049621f7d08c1a6f1b2688162d89d94b470fdcf6923759395a

  • C:\Users\Admin\AppData\Local\Temp\Cab6B31.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar6C30.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/1668-33-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-37-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-44-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-5-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-11-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-13-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-21-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-25-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-31-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-35-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-41-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-43-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-39-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-0-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-3-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-29-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-27-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-23-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-19-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-17-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-15-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-9-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-7-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-1-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB

  • memory/1668-2-0x0000000003380000-0x00000000033BE000-memory.dmp

    Filesize

    248KB