Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2023, 01:09

General

  • Target

    9ee8e3c42c5afd846583fe6bfe8fff9b23fc4488c9fadecf41bf56249841c61a.exe

  • Size

    913KB

  • MD5

    12e1ada93a7a71db224b28693b2661cc

  • SHA1

    fc323d6c9d799ff96db9f0d930e90696b077bfaa

  • SHA256

    9ee8e3c42c5afd846583fe6bfe8fff9b23fc4488c9fadecf41bf56249841c61a

  • SHA512

    000f8e760eb2608cca473c3527662b782f735b7da16c2aba8d07b72cee7a4b3f5ee5b3086b8d9cd39719502d58754baaff5174d67b6cf114f42ae3d39e6d3a28

  • SSDEEP

    24576:v4RF+cRDtzqUXWwioBq8MUwma4AGaM9Ra31G:v8AKBz7RlApz4AlM9RwG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ee8e3c42c5afd846583fe6bfe8fff9b23fc4488c9fadecf41bf56249841c61a.exe
    "C:\Users\Admin\AppData\Local\Temp\9ee8e3c42c5afd846583fe6bfe8fff9b23fc4488c9fadecf41bf56249841c61a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe url.dll,FileProtocolHandler http://www.unionbig.com/v.html?P=3063&A=&T=1&Z=0&AP=http://www.vlss.com/
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.unionbig.com/v.html?P=3063&A=&T=1&Z=0&AP=http://www.vlss.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fb176cf33d77b7d5fd7fa85abfb0b809

          SHA1

          c42b2b289245973b04329989be329424bab5bdf0

          SHA256

          949b72cf5af23e365ba8f97c10d21b2f5401a875ce5d684e99d2188bf35f43da

          SHA512

          535dc3c5de6e82da079f362d670ea3721ab6b622459e516cbcbfbe84eb528a2eac00096abdfa484706036c7e25ad524d094b46b2ef50582605982c30591bcb29

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fba8598c90afdae3add59460a77c3dbe

          SHA1

          f9116e32d80fbdc1a1d65d81e4ef345094c3daf8

          SHA256

          9571bb7986fcacf56bbdfdb16fddf03b3d31eac1e32b02eaff0d573e86020e59

          SHA512

          f0bff77d95922befcd19517ab275e8d3f192de3a2aa8c6baa28bf2cb0ae545b7dd99c2b257295e1632a27b83154c05e717a1a52e91414a686a0c2be457ac8e41

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5ca05d09ba2472f77e6ac5744df3b5a4

          SHA1

          d96663027cb9c91c759bae379dcd34ba6ad834a6

          SHA256

          82ed7df27bd4fbb98efd617e5bd9b568887bd42e43862ed0afd7145bc9e341a8

          SHA512

          2c27581b61407bd7a2ec0d85dae9118d82362858e2b22b712467c54c568f7ae7c5b53944715a012f0387d020b9d828589c24c10d224580207eff84dd5bd9285e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          56e522022cbd152a9871f9e788404eb1

          SHA1

          7acfc83e738dd9037bc596b6bdac6f5a4aa01bdb

          SHA256

          c3349fdacd28a18ed58277d827403aae42cb30b8b7cf31ff94cde3a5a23a22a2

          SHA512

          5e8e63e9b878e4c4bce54370157e047fa835f934e9cc972e143b5344e14e5beb5697d6d959d77eb07956767cb5acf1dbe9ef8fe5c2f361a1e694988a8fbe2b6b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9ab1599801f03972258a1fa4b82e5fa0

          SHA1

          824bf741d7d8e7977dcb7ab2430753d195044650

          SHA256

          071007affafbc88e969aa66e6371947d00df90c7a8197d38c9d8c6ea088a085c

          SHA512

          512d49c461a26dd463de5ef67fcceab2f12c8b29f7856d5fcdd3a9a6437dc1647255426053de996a6f16bd40d751c47b0f3ac10901e67cf917afbe58b51329d3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ed597281c56c589a5754b5a592ed2686

          SHA1

          de6cd9754e874df85ae5f1d7a0ff300ded2fcd4f

          SHA256

          6f12ba8c2223bc34a5f0fcefc40ac6cb9c97755e46afc67997ec40b7482059f3

          SHA512

          5159eda78b8b44fb6a293c4bed5dfb3cbbb3f57dff77425c7e9d5236e85a5d222bbe83e0cffc6dd4bdeb7f215c505454491a9a6f81c70fbdcbe93467ba724c99

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a3125f9c0d6c769048008ec60fb65625

          SHA1

          c21b630a5e1549ebb1e9bde645d247776a536c1b

          SHA256

          c450e8db9d0369e4465406b7223116dc347351bda419d14185a10de6cdedccb2

          SHA512

          322f37a8447c48961d5dc2b61566b5fb9ff64a615e7fb5b8ebd0bd277dcad3ecbf7e0290fd3f75cc71b9cf24cb1bf079efb6115443d3cddb7d974be97f0ea6f7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f37063b5deaad147e696f71236bbf297

          SHA1

          566798af3d171206ecf6fe165054d61c3b276ea7

          SHA256

          ffb5857e7602fb944a23a03a3912eb0951f80f889363b7d07a9b15e3d49b484a

          SHA512

          a2a39c109797bd4c73548018b451729a55fdc5b2dfb80cdcdb69bfca3ee928c32399fb2acbc473d6682f59669dd32d811e496f39a269637bcdf3166c3760eb87

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          48fc2b71aa96b4d5a42d8eca512ba67d

          SHA1

          9daccd38c1cd653c059180c22bd5f020ea292e9d

          SHA256

          527d98aec6bfea58df60deff0fd42ed97efbd6c5cbda77f4942a5f0c90303a6e

          SHA512

          ab682f41712222bd89d71a2c260eacaa5c73d4f0b847e0c043afe236a35684fe908386b1293a8d796d0efa25d25c864f84c811878c9d7ef6e459ee2de8947d1d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fb0f5e803885e1aec85433950010204d

          SHA1

          4891c51a3aafb0f27131841cce2b47f159453859

          SHA256

          b77b4947d06c0f15e662ca51a3bdaf5d06a536674bd1d0a4d72f3632ff2b2394

          SHA512

          8762a434724468dbe37941be56a6acd8c2dcf4da5a93ebf8d462d9142ed1565bcd815ad660f949fba535aa1d53bc30f7b488918d3e9453c331f27ee619a72c06

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e8f32f6991c24f48454441d2ca8fb9b0

          SHA1

          79312788d8d14e2ba5a0bbca1f408bc57e10e5d2

          SHA256

          115e82ffd65d115bf4974b81cc33d88ea3f93c4c7a82e0ce6671bbdc143ebadf

          SHA512

          6a406a46dacaa9a04fd1858d67661c2471b093b51033b499f0de648bbe6e25898f817522154c2615eccf18f5bafdcf1d65089fddfa5a2fe5cbb828dfdd35fd57

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          145d252dedce23adeca298c82ddba3cd

          SHA1

          353f34def5efa89bae84218f99f678fce6081fa6

          SHA256

          c80ecf4c30ca910c7073e27d39c5f4aff8c56cbc178b9d9cbbf002979fe95224

          SHA512

          0bfdd4a2877a48f2f3926aae12a5858410ca48ad65d76a180273c91ec7c7011235cb6998a23893215ac5dfe79bf611e78ad743f97e232a5a8bd2c9c268147c8e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          823c4dca92d52bfaa0a6fc82ed16222f

          SHA1

          25708746ad8fd138b639823b2ee7c80885e58993

          SHA256

          3203cb728a5adb320e5dbed995e77e486772982e59700793f731eeb28a465bb8

          SHA512

          76f3d1b0cc85bbacbd266f759e671821427b5a6b806e504928232fc8813f5380b1970022e43854a1069c1de6acbc48ef1c552bd7377c32cdbb4e45e170f42940

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          90c64f877ea0a6f2eeb3bf41b931b38b

          SHA1

          7868be73d4046e3a72da5474553cdf63f93339de

          SHA256

          d80bce3f3e52e64080c5b0fbe0072bdb22fd82ea420e5789f12562758f6f2f5b

          SHA512

          c6310c784213c9ead7498e30f85ca6413a8bba685faa49da7230c92ad73ba3d65914e5e3a1d92667893c39ee28b50599e116b92196e6d89ed034476d528e6d23

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          12f33e9329eedf2a2408ce034ae2b198

          SHA1

          eedb87323c55ae0ff3a4b1a8161e776e236b5922

          SHA256

          35eab28e1340d26feb4bf869ea536856f3fbd2248cf5ac7e9ebd7ecd09ca3bcb

          SHA512

          b9fc32788fb5e6ea6a8c223b24417112f43ad248805dd99fdd5402fe5b0a3689ffdc7f8aabe4dcf5eac31f6d6ef83578a7d987089a831afc75ce5e860296eda7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          22363eeb2c727baec1d9c5d83f0645d9

          SHA1

          4860a86958899d7896208b4069d13d47ba95bfbf

          SHA256

          6e50fd515a2e2feee90bfe615a5a5d9afcfd2f7df4a02e839c4b89baa4bf283a

          SHA512

          c536e07a33421b41b574813f3f6ec548127db0e462a76e9f25e3afeb22b5374246a0d08d71a22564261ac37ed772e9774ea387f1255f128450f451364049426f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7ed6e1c9e4732f9e113f32308a217d8d

          SHA1

          048eef91f2936d91b288debffd7c99a5dfd563ce

          SHA256

          211dd6e169b0be25ba6bd0664b40191b76ed1770e62d35d750195ca000f77ff2

          SHA512

          c118d222b144d6560501695220a97542364615d8b7b121f485081592dec576cb662da563fd6b5cb8d0fb597ddad7f0c0a92ca29e23f2faf618b8507d2ee51cd3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          55cb06ca115364890fd7c2a2a9d0933a

          SHA1

          753836590f527912c5e0b9baeef462a2fe05ee87

          SHA256

          178e4a244b81864c4a2dcbfd74cc856f9aba7a3806d270fa711903db84e37e20

          SHA512

          1bc473d58137c504e11899ec0e1f13144933e0c52caf541ed659d388e03876a97ae7819ab4ac1c6e59fe459b5cef5b6096d48398be6859a35c0535e1c01288e5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3d763dd23f6709da4a5e03ce42b26ce3

          SHA1

          8d4d6e0ac3447cd02bcc90389552452fd3eb1118

          SHA256

          0afe38680e86f86e9a4a9c84d5b4c6af90289cb46dc9fbefa9f038c3bfe629ed

          SHA512

          2a1cafb80c35713f28ba084265a4a4801789f1bf8c889f7cc94366ef14dfeaf05fb398d7dd062835e02ab1574075754d9a818ff86ea69599870e1fa161bc71ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bd693357153792b7f3d990e219eb4673

          SHA1

          fb0fc259428d8f5aa8c36dcfc4554844dc5928fe

          SHA256

          8f7d280e568630f2e68394a658e9eea2a6cc082921af25262b5d93361d6e3893

          SHA512

          1d97908b7ed4f43561be1ca91a84207a2120af9f075d111a1e208dff7137d4a65e94476d9039afa0b591cb9068e6bff2da1fce55f100179b9733f08e456f6caa

        • C:\Users\Admin\AppData\Local\Temp\Cab84DA.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\Tar854C.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • memory/2284-31-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-0-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-40-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-53-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-55-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-56-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-57-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-58-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-59-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-60-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-61-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-66-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-49-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-47-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-44-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-42-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-37-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-35-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-33-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-51-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-29-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-27-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-25-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-22-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-23-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-495-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-496-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-14-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-18-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-20-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-16-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-12-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-10-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-8-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-4-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-1-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2284-929-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-930-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-931-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB

        • memory/2284-932-0x0000000000400000-0x0000000000769000-memory.dmp

          Filesize

          3.4MB