Analysis

  • max time kernel
    128s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 04:02

General

  • Target

    b51167c4c21f411a687e3dfb78a5134b2d00dc357cc10bdeeda4a985bc10ecd0.exe

  • Size

    5.4MB

  • MD5

    89125b2d3868ce586ec50949f22e45d0

  • SHA1

    9abc0fdc284cfcf56b70e5244c3acd7df00acef3

  • SHA256

    b51167c4c21f411a687e3dfb78a5134b2d00dc357cc10bdeeda4a985bc10ecd0

  • SHA512

    e2d8623fbfc0a443d3727a8393b5d82d5217e81cf34b0bb26443c16bb69479d8f42da758b49594a927b5cffd509a2c0c6a6f7691e38a3aff505811b089058df8

  • SSDEEP

    98304:Ktvqj8gb5so7CtqwHHlbf5aNSefAZXhcSlFax7Wyu4fd0+D5ol5hxDipwG4O:KdqgCWo7C0EH9td+Soi2m+Dil5hxY4

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b51167c4c21f411a687e3dfb78a5134b2d00dc357cc10bdeeda4a985bc10ecd0.exe
    "C:\Users\Admin\AppData\Local\Temp\b51167c4c21f411a687e3dfb78a5134b2d00dc357cc10bdeeda4a985bc10ecd0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://ghost.laomaotao.net
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ghost.laomaotao.net
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    1ff003b2879ae3be05cbb321aaec054e

    SHA1

    430b16ed2c0e9f0d57f93e611229cccd52c4249b

    SHA256

    f40f8b43c7da4570100d9075df4b5f355ba18bb77f5d9698fff38fdfd29ed6eb

    SHA512

    94decc6730da93211c6d6b9cf063194ece3e4dffba9674b7319d59442726acfb0dc28c8c36336d1910d1a290ae457ee1439f454d2ac01d377ac12e100c1362c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    606c3ecce94992051fe61fd3d994c95a

    SHA1

    6627dc69c45f61bf09b6518baea609d201447764

    SHA256

    d69cc03572d550c6a2264d0750b8984ff80f702cb362de267c72d8cbb3f8c55c

    SHA512

    e7ac59bc511caa926793f4b97319adf052ecb59b8c3233aaa51ae5a875a6aeac694fdece97523b63de9baaa6257c500af1e2327d21eaca7d67f93d94f1392afb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12754da797332019e99c65052bcb69a2

    SHA1

    29e8ebbe70f2334d33cf85e8a192bdd3093b1aa0

    SHA256

    34e2583ae316ac6ab886ce83fe0545d79954568bdde9ab7b9a1aea758658f6a7

    SHA512

    e9b5eaa591c9bc9622498b67e6925f82ce17b7cff432c3a36a07cf692617043a24dbd147228f34677f368f4c84521e19b6415442cbec3472fdb2757c06f9a358

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fc2daeeeb836937e4a52d9ea23eb0b9

    SHA1

    91e48d4ae4ebb12e19c1820ef10f2e554ccbafc5

    SHA256

    5f0644675c8c4c619d25e492e49b37f2976a0f3540b4aa3d7ccf62f4b32418c4

    SHA512

    cb1cf5db9d437f4416a1dec95acfbd805d3f499d5b5e7d9bea14ddb3355700039997cca21bf4826fa6dde506eebeaca6983589291e98344c194948f059380cf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d4e4e0d391c081aa44fa3c442d38c3c

    SHA1

    6721b2dc51bbebe92e4f7d31d4adf9152a2f1fe4

    SHA256

    0327df7cb8b0765bc54a99c9f0f5210e00918ad049c40e2ad21fe6890c4fd922

    SHA512

    7a5c7857de555ad9dc6701422423d22ece7bd7ace775734b2fafe98a591936b49ab2634ced61539ee4663867f656710bab715abfda24c88f2abb1d1f32ab4848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc72d9de0381dba289c4b213590c23a1

    SHA1

    c5bf5169161198f871df20ff6529ba6a016a7e4f

    SHA256

    bfdf78b660ccc9bee8dabbdf7673519578a96584b6c4079b5e67bdb4e3aa47f6

    SHA512

    b007d7dcf7d0a27920cb734759260bfe26adc4ec04bfabe9f4eabba89cb9ff3238429b4e2a73bf85a2e7c9c4a86f9f49934e11ee3de6b31b41adc849c5169f62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e36c5271984214fcc30194dec8c93307

    SHA1

    1c113d8ee2518d004e5b8988c4aef7d724938fad

    SHA256

    c7f6cfc207a1e598cab6aa2fc1f0229e6f6c102cf1b4ac822def168d2c036d4c

    SHA512

    782509e7c6c9319f5ef5c7d5d5589c99752a2f63021ae68ae93b23dcb7f2d4b2488db7307c81f323739cc3adf488fc8145b41a175a0614fc6a29065b609d7cbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acdf8a02eb23564ed115612c345fe876

    SHA1

    c1430d22e4031911fbaf7dd42b09735537eba8b8

    SHA256

    14108011db5e27d342959b39e9805124fc5cf61dc6172dfaf2c3cb3aadf5983a

    SHA512

    140870d039fdf4b6dc3ef8e56f98935bab7cef594bccf1e5946140b0b18a2b7f273e17b1e1ed05d101ca606fd2d512f53e0e98c7bdc4f696063a5c662ddd3a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c68bd261fde7015391701a73273a8de

    SHA1

    5c1d7df7ea4897196e777f11a1de93211a7f3384

    SHA256

    d129611cf55853fa2bddafbe13dedd7f5119ecec08454ea7f7c0185ea69b45b2

    SHA512

    0d3f823bd30ff99d08cd07e0396a542da07f7927de4f81c5281051415c6e9789767489fa0f50413730d9cfc10159c7f5e57bf4d27ccf5041fab39c5159972d82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87e56b0768f656a70e790698a168bcaa

    SHA1

    be4acb0f350c771f9fea4221503cb970461bd537

    SHA256

    9f8d79b43eeef6c3506236b755e863c210ae6937a4d074e69e4f144ab4ce7578

    SHA512

    8a3c34c6e675d4046047bff363701f8b445db99b44bf49f8b592e875b3117d6c3fb018208bd739b5f96b0062102956bf708b8e3bb6f3aef04c12adfa8286ca39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7e0cd6f73b9501665368714b6787eb1

    SHA1

    d776efc04adfb65d54daae03339b264d9f5f21b7

    SHA256

    853d51c5ab63f7a9f6d8087c5f3502d14961a79cd98fb1bbd464533556e76f7f

    SHA512

    b086047b6e5a393b489c6ee85ffdffad377f4623e9cea96f4d70c50194b05d2e0654b5d63841a50dd22c8a527b10e506f0bea34947c67f06f5fdee7887ae5901

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f91cf0211ae27fd93b5b4565c2313b21

    SHA1

    d626788ffd4e718d98f3284f575fd58289eba845

    SHA256

    95cf0b9ea8d39c9cc1ad62a8cfc2398fb984a624427e93336c495d7bb5c44996

    SHA512

    d8f6a41b4e9401b7ed7733c319d7775df83c31b51564ff6833c96c166e11aa780774f2b26cb586c336107b41b26319f2b3617dd0acd71b769490d266aa36a59b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    423337c6c9f6e0845ca1f6e78f283f3b

    SHA1

    622e581addd1e56cfca0f923e921d4ffe6ac6639

    SHA256

    cf01262fb8b75d3726a99678defcc30cdd4d1885797d67f4c8564b63ff616820

    SHA512

    3ca9818a22c322e55ca5422598a3753c771bc4d50ac2654592cc850573ec816a120abf50ba1136662bc789898c7e2f0e0f9c8ea92418f99cc16d10004d447f33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c60f146eb0f382440160c639b2087e5a

    SHA1

    03d445cba766a5d6cfdc6b129a8a79a5a239f7ec

    SHA256

    f256ac2a5c6b5f57d9a2e8412a85ce0ece86336483f918831df7d3c042131a51

    SHA512

    36d8e7d1e137a3690d3028e1e79b81003175c92cb2e7cfe24f0cab90f56aad2537558dbe4849861b3309526cd54e7021fe23fced0adff723ff8566b05ebf1402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89fdaeda08f1ed75976ce582b75027a8

    SHA1

    b6f8c8e7252075cf4f730eebeaaf008fa5154716

    SHA256

    0c7c95955823b70ca6abf0d707cbd7d735d642e9d1ace0beb52fb180cedbb13d

    SHA512

    f5e6460436bf0f17d3fe56b6e97993dcf96f2bd8c130836d63c5fb0ef29cff1c61001b6ca4fa31458a1f664956cbda505f910769bf317d765e62f6203c1f392f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a653efdba33db041883fa8822dab10e8

    SHA1

    0c6128be7cec9129b42fac7a010e6213abe9bf3f

    SHA256

    55994d8a8114269addf23f364c4f6434681aa6472422100517d0db5b23d8d2aa

    SHA512

    74fe2358d02f428c70d511a5db28fded790c3acb43e004db37b7e6ce88626843f53d0e02ee5ae7682fc0b888ace665ba6db2f178eb8b9f206a141013a745b5b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bb31c4cf4f3d19c97427a9a89ef4a53

    SHA1

    97721238048be04df4d662230a2a3127e80f9262

    SHA256

    8e57d0f15b553f17a3a08e5ba8907e7f00328271c28e0cbd6a274677471557c9

    SHA512

    f7655bb9a8d9082f01f37b9445fff4b63894c89a581ffc2f3b1959dc5878d03c9568756b6f9af78f0dfdafb78cb5eb995975ae24c1b27bdee4b46dea51b66ef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f180d75cc73dab2d2a2ac608783fdba

    SHA1

    69dbcea470fd60553441a9cefe065b2c8f6d8d11

    SHA256

    02308df17d8afa7c810858d499b8f4db0efb226587b16cc791cd7c0cd34d528c

    SHA512

    431890ee6d7918e4e5e6476038c6c878d5625c34f300b5b54d350889582f16c480fed97352c009c70e0b88f52b4d9e571944efe814a769f2f1b6d27b51c65ca7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c422dd320b4e94e349202286d9bf706c

    SHA1

    b78023d1a01f8288b671b9c35d837f8a49315471

    SHA256

    69df92e7a7d452b5f5738a708010b5974f57ce8cc11a00db497d1d82e09c83d6

    SHA512

    a61074804f5cffc0ae6ef87430c29414c125e7ef6b8d2283c5352d5bad60daef501bd404fdef24eaad8b416df7ecee00c8d62c9301b3c7de486bd63ad1cb5cc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22c035b269addcd80fb83e40380b820a

    SHA1

    f7ae55698fcedad25a3cec101c1148583c1d6f44

    SHA256

    0a70c8c1bd715f7200725e0827215dea789e5b15c620b44869ee6dc3083e1dc7

    SHA512

    9312be3d3c0790229446a42b4e2530ee491d502b197327de8d777e4911a83176c954462e31581bf7f7b1d77ace10c3bee7a2145b2e3db201a3c04dacb3509388

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7baf38f00f88a9f19423a386e503e97a

    SHA1

    e1362815bc1ed29a125b56d96d1756947761868a

    SHA256

    cd28bc3799dc220c8a59942f67fafba99aee3ea64eeb9e0fc2d0bda6edb60811

    SHA512

    4ca7e46d4d1683c8b3bf9ed53a40598105a615cb4801924309a663d3fa606b70bbda5958be6d718bdf2dd6909841bee505eec9f77b06004204dafd0404b897f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    c9c61d4443bb2ef692c1e91c463a823a

    SHA1

    3038a4c4134177bd7b1e62882d3a756ad03290df

    SHA256

    bce655175dfb5096447ef4a36095b6f92b6a63513639d23dcd312c44a9ffa146

    SHA512

    6be9309bbc1c2e4dd81e955657f8084a1393891f28a19eb574591484fc71d02fa65dad4319c0dccf5faf6862450edbb9cd0c2336411a225f483d39a3205e659d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bucspth\imagestore.dat

    Filesize

    1KB

    MD5

    55463d0fc0b0e9f85e4bbe17c7e69298

    SHA1

    942e8e71ccdcbac5df60756412f75f9fdbdee774

    SHA256

    47162fbc6e4e50c16a48abdac1be71cc798733188fece6d19c1d62094b5359fa

    SHA512

    6be9489619e29d49c78200e77f3392bbbee782af7169a72e6a7641900eba440178825b98002042a1dd0259c72ff6444b3e6f971e5d9aace965450abf531e6deb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJKHGHKT\favicon[1].ico

    Filesize

    1KB

    MD5

    3ccd86b77247e5980b0295c59352af44

    SHA1

    7d4efe829eea4feacbff8b79966d599b131d039b

    SHA256

    aaaee4f05335317f7572d057b57d814ffc85ec388e982027e6d17bd6d43bedce

    SHA512

    61da856d6a547e73a664487169b54722209338a49036cc7a9b2d9057ce6594f4e8b539ec65d2b2e385420a328882a67bcd6bd94aa4d2ab97ccad2a2e232532fb

  • C:\Users\Admin\AppData\Local\Temp\CabEDD9.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarEDDB.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2312-0-0x0000000000400000-0x00000000004B4400-memory.dmp

    Filesize

    721KB

  • memory/2312-6-0x0000000000400000-0x00000000004B4400-memory.dmp

    Filesize

    721KB