Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 00:26

General

  • Target

    f3d59f3f0a9ddaa9dad27f378521e325e6b40e07600290f096994f5b142302dd.exe

  • Size

    11.3MB

  • MD5

    9b4de976ed4aadcfd8a542fcd659399e

  • SHA1

    002aa601b39cc9ba330a1c1be2724686a6b9f73f

  • SHA256

    f3d59f3f0a9ddaa9dad27f378521e325e6b40e07600290f096994f5b142302dd

  • SHA512

    46f7d3c16eb389f7b9ce4fb8f7011381f4e9e2d51251dfa65af2b8c2f56834f85484abdb7fb3f8b696a6877226af48d63be25c6ab287f1e9d0183a0fbcb3e01b

  • SSDEEP

    196608:CUXMLJxBjeXZ38Vt9f8hqaJXa7O22GBEGUtdmXmZ2Q6e3bvEG56mENiYynuIQO2b:CUXMLtkZ49f8hthPGFUtdamA5e3bvfUV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3d59f3f0a9ddaa9dad27f378521e325e6b40e07600290f096994f5b142302dd.exe
    "C:\Users\Admin\AppData\Local\Temp\f3d59f3f0a9ddaa9dad27f378521e325e6b40e07600290f096994f5b142302dd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://sd.360.cn/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    dd5afdc4677f7d0b23661764d7089f1f

    SHA1

    a2fb5a641055b08b739f242d697b05af1c2cbe8f

    SHA256

    f14ccea1cb260da0b8d7f121226aa9aa10b30cc362cc316476e5bb4a138485a5

    SHA512

    d7b5cb6e0c15c7f97d1bfc7fe0b6760d1d74825e52e3b9f837bb2ffd2457cb73f2eb7d78fea86d76168f644a42557ccb27c37ef93c420c05178f448fbca28f10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ede8729ac0372b09c823e95143d78dde

    SHA1

    e7899d1cfe60454c4ad8b89dd75403bd9857a310

    SHA256

    47f9675aa130dd4b8f8a84a1a36d38f2032f1b7679195bb06621a59cfadd0c7c

    SHA512

    e11be6f46aa1fc6841f314e2865f83dbc4894b26d19a71c2b814b8be8d62c88bc7c2fd0a50e8fcc0b07171ea9e14aa4ec3f911a14a1f28046a3e4e4011f48565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce5f695c67de7fbd3cc97075aae9c59a

    SHA1

    e27acd8fc0fe31a44be5724edc613066e8d00749

    SHA256

    ce086ec13a7da778ea57732faa4812712c2b70068ac960c8c03d40c4302323b9

    SHA512

    4997efa033af0aab7055c5d82872b7c160c5f045f6fc6df78423fdb7fa4cbdded2dcce505d91c63533f40286ea059cb112e519ef9bfb67e4dd0e5a989104e1b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10ce266fcb12671d77a5a4812812bb6b

    SHA1

    615cb5b6011c508b44e8fb3be39119fd0b0d994b

    SHA256

    3910a6aa214b64226349816a3bd55e4ce05650ec55b4be457bfb035011df25a2

    SHA512

    dbfb0df14c6dc8b964f3469ea088ffbd3e40a1dabceb4af04da964583065c6f796749e519adc2229d2035f661ef0f3ceb054d20b8e0d7a6e81482f6062f80c01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d60bc3bcf020e7dbabbc0b77a2a6736

    SHA1

    b70446e04bcaf5e295a8f6d4cdff6b9249e71f11

    SHA256

    8620797730fe9ea440580eb952eea7e7e4debf279985fe1527214df1f6b594ff

    SHA512

    926cff4827c3e9aca56a3a0d98979095649a4609ae9a509bf0ac73469287de77a0c0f52ced1c1fc9203fa005661b4d101cb908436dfd45f6b12fe0eac2079fba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00682e1221291c88c8270eeb5dc85b28

    SHA1

    d0ac4fe4a434144d0372509a9068d924aff9852d

    SHA256

    9f20223102e18ad26ec256013f8d6f0a9b3077f1f6aaae23322bba7c97c8e2af

    SHA512

    687b660c3eedca004d198688b2c830722c69f4ce4d167c77299ddb47919e6e605e7b535cb13545879c0482c0997b0006f1f540bbde6871468b8694b146d77fc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    431802d3cc26933e5d99d52637426928

    SHA1

    0ac69b1e3e63a33e5be14b353e00556ba38586d5

    SHA256

    a4391ef0912bf1e9d25df3e54060a706775c7d664e32d58a0ed73c212e74547f

    SHA512

    af20f40e4946ade61f95044353f5ed8fc9154f3d7362e4106d94b9ef2f7d236fc9025ae6a412edf0dd5bd55276ab6a446a8d0a38649cb1ee8ffe00a58b27a756

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16dc8a51d9c1a69d7c4bf11586eb3e38

    SHA1

    edf8b726e257ed157c3188f12b55487ed71f96b9

    SHA256

    5a345d3498c024464d6bf294cb78c2306efc2e7b67a53706c83c68fae3e43121

    SHA512

    1ff1c912b3cd222864634d29e9cb81cb7d1a1f60468d53a0e96b67b38d9a48cef033a65a633dd27b11e041e67b70036d0f23391d70505513ad8162dee6962c8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53da724241b5f1b243c7970d7e81c95b

    SHA1

    0fa13d1773d07c8c341495e727475cc1b0109191

    SHA256

    9f745a9b5fd76a154beed1087686765ce6a68f34c466b92dc7e553c5f514ea4f

    SHA512

    0e157f2c079f5972a47cb52029cd2cc4b7343514ad37b11eded0c8a9c3af57019b64b084c04a798cc65abf02ccde0205974917d01149d5d4b1148479f982a799

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70d497d6c4443ce1eadaaf189ea52637

    SHA1

    9bee7eb4894b494dda6b534cf780f281e7d157c9

    SHA256

    d9c28db4e66a62179e5be1306290c8cf50dacef49582055ba13af6be26fed43c

    SHA512

    400afaf84a1e7153567a4ff79d8123867ddd78eae14541c5b6676c9e689e07d2e9dca5b82246a7e1926eb7e8e17bbf00d71207771b92d3514d02f4e232a9f078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8e63fae896ed3940749f0bfeb5acd7b

    SHA1

    2e4fddd58777fee75b663f9a66d3064591ee501a

    SHA256

    7d0d51979af49ac67a2441476677f00c6d98ab0453c97d5a7f8ee4e7497e864d

    SHA512

    1ac681c5d9d1cb5d0dd27fdf308cd22d131ae4d4f8bbeafa4c3254bd9078d34e7ff9b304aff2a63b16c25007dc1a12b55f2600ee9b54b9e3e783a7f2603f3c2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a30dadd4da86a68177825f7b3b5b4ed

    SHA1

    4fec29e6a286a1d3afaf4083aa8689f4f4540a3e

    SHA256

    b3dff5905a3bb6f4979b46e482ed74d4e2826e37208aa1d0150a2a99407e6f7e

    SHA512

    e6accc293128b88a2d397c799012954c5565b578b430a1d201394918d13e71eb84c04fcd6d9c897471f6050e3608086f3cc70ffa2c682878c693408233e6880c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    715cbd2fc7c1b45c8a9293f055a2aa97

    SHA1

    890ea9b157e38c799defb8b9e5d7265cfd4917b4

    SHA256

    547654cb729bf2e4489aa0df22499941f0f770eed3711686a170189a9ab66bde

    SHA512

    ef2d780e2bc174b4d1c0506b1e0c3a5d61bfed750694748d95356bed8d241e4a65008cc41836c8df2a4fa6fca912d89db52cc986f9e23f5289c149585c8febac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94bfd700bcf83e0ad370180ae79626e7

    SHA1

    a2674f4e8898f094d12dfbf040a10a9bd01d1dc2

    SHA256

    9e5a83e6014446643ec9c15b4cc2bb784d9c066a43fc2236cc8de2a77fc6f93c

    SHA512

    0f81e4409850b769db0ec2197da888acf13d0aab14a8b21ec1f684765ffdf8a465f26c53ddabc3940a7660e0fc31b4798dac0377402da70ebc87db21c720b62b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b8a3024dc70c05c14cb334c42e93eff

    SHA1

    ff254e2d2a8494289048b9ed5e34988867638116

    SHA256

    2e2933729502f71f2195b78eba854e2b5bce90307b167736cd02a27f6b6a73f7

    SHA512

    8d0253ea1a7ffb725f011ae797e774411ff61291bd025f69480382abc4450dc3d8eb3d80039d40380b1c62b86e1f4fe68b7beadc613ae7d723279d8acf845f3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    286cc1ac033eab5e0730e18f005af142

    SHA1

    909cf9a270ef4980c54bcda709a86d14126f8beb

    SHA256

    14b3b255d060c8878ebfb1024690a1d2f8cfe1dd00cbe2a58f8bf39269092669

    SHA512

    4fa28462085c4ae6c926f4424be32bceb5eb91b75bf2395e84af0f285f47dbf448c369976a4f4a75ece5982671c25225cc2fe6b14624f2299745baa1654775fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    937932dd85733c769d3ca29e43573723

    SHA1

    ed746eb98700c667bcf42e2acb31ded43aab28ec

    SHA256

    a46f9109a1b70ca04a2cee32398d036bf35cab826cf84e59ecb7342ee1b039dd

    SHA512

    b674a0051a96f0a954887093df97cd0b053aaee25ee983dffd4c421467b3ffce4e0233aa09803eaae74cbfd1a855a8229c6b7bbf17a8a0ee024862c0d19ef5e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5ee9534c0c95b7ebe4995e5e60879a10

    SHA1

    bce9cba1fa8e50293178265d7c8abe14f9fcc514

    SHA256

    9d59b7f28efa455a790c04899c208ca4f0a7d02ca2d8c7f6cc504e663c32b2f6

    SHA512

    8c42830726cacbec838f606c365fd7752653cab126a06301ec845c84caa44233f0dbfef30a4cccdb819733462187c6676d714642a5006068b9326bd90f65fb34

  • C:\Users\Admin\AppData\Local\Temp\Cab4D19.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar4D5A.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\nsy2770.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • \Users\Admin\AppData\Local\Temp\nsy2770.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • \Users\Admin\AppData\Local\Temp\nsy2770.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • \Users\Admin\AppData\Local\Temp\nsy2770.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • \Users\Admin\AppData\Local\Temp\nsy2770.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • \Users\Admin\AppData\Local\Temp\nsy2770.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • memory/3024-21-0x0000000000400000-0x0000000000F77000-memory.dmp

    Filesize

    11.5MB

  • memory/3024-25-0x0000000000400000-0x0000000000F77000-memory.dmp

    Filesize

    11.5MB