Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2023 16:32

General

  • Target

    5f37b85687780c089607670040dbb3da2749b91b8adc0aa411fd6280b5fa7103.exe

  • Size

    283KB

  • MD5

    a62d5c8ef4d626febfcd2c00898c6c27

  • SHA1

    854e020efefbf393e04d897b6b0b83ef92fd2db8

  • SHA256

    5f37b85687780c089607670040dbb3da2749b91b8adc0aa411fd6280b5fa7103

  • SHA512

    3a35487449b985f338473866da4308de760bdd3f52934e786dd28fb0030898a98000c0538159c8e2cb0ac54cda04fd9a73d7dfd1bcfc60be1c397c42730cd6da

  • SSDEEP

    6144:guH8asY3G/Mzhc/Ly9iB036PQ3ouBIkBZ8dRaBvvQD:gz1aG/L/O53jBZcGvvQD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f37b85687780c089607670040dbb3da2749b91b8adc0aa411fd6280b5fa7103.exe
    "C:\Users\Admin\AppData\Local\Temp\5f37b85687780c089607670040dbb3da2749b91b8adc0aa411fd6280b5fa7103.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1936 -s 56
      2⤵
        PID:844
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\HideUnregister.dot"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2204
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UnblockTest.xht
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1996

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d85684a2d5752fb7829304e93ce848fc

      SHA1

      fd022a9d5ff7569ab33140c2a860a945dcef78de

      SHA256

      988575884d9291863e3ec4e020c42273a185d6a5b74267c20b035fd2d1013e01

      SHA512

      fa7c462cd802a5ce988868c7916d5b0dbb81c0ed23d554e98603d78f42caa443c738a49d51e66f64f81712180f176556cf8bf19bb487d487c9e66187a7a93103

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cc8bf8dc4502aca2a211e150d423b3f4

      SHA1

      ac81d719d1b22e0062c34214743c3b3f5b2d0031

      SHA256

      b36e4cc74f8e7b15a65be73031edd067d2ffa51ab89afadd8a5baad17a5e9692

      SHA512

      2101eaf4164f94c97e4c45cc6c954d04106d5bf8da46f59c3fbeef2d154861e5d5a32e7df68d92e7c3458391c201a7fff26de133399f5b3df5fe86fd5778177c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3f366254b9e777ba015e33e4aeb6c400

      SHA1

      5c25a9a6d95d1b5873d54cdcb1cc5ba8d6ab3242

      SHA256

      50d57f4af8fdc9b3bf43d47ecf845b9435d5f7d974f63bd325318a462c5bc122

      SHA512

      35d788b783a13071122ef60e8124fba34559f67eed885e8469dcf6cccde01f7bd6d7c5b4398b43038d20e72cfd36b20be6d217dadfa7fb709be10b96bab82ce4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6c69eaae31f8a23e62eb21c0693d676d

      SHA1

      f25f79d3988335aeda9f36ef0d25f90180795a39

      SHA256

      d64572d5194e5d8bbdbe0aa49c4b4dd233afe23166870ac2a767885641b45969

      SHA512

      9441b4d77f6031e99155ff1ed704bd8f2ccd0d4f5471ed16eefa710dcda7f0c4cbe1fe5af0e98946b4cfd329755415713613e6f7cf2f77a51d2cf525972cc993

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      77d6aebd441bbd2bbf3035dc2abf7860

      SHA1

      a0d5cf646541007f9b876cf5cbbd43dd86e81c7e

      SHA256

      074d076fcafaedffecc51db0e2a8aeb027b542fc29dfbc968e5d394c34a406ee

      SHA512

      227945d664beeab9c9d12bcc5fe49d1ce4b1fbae9c1684a62e35bd48a9b098f0dbcfb70e4662a114cf3f127a70f6956619dd158ec193626bad0d977cdddbbbb9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b88b6fa60d330c37162d4ec53b75f28b

      SHA1

      bd9537cf930faeadbd2262ecfe94aa5dca254735

      SHA256

      6adc765b0d9d01ebdc8f2ddb2b781a9745eff951becc9f5a2c61aab002edc920

      SHA512

      70180c80aaf1665a484d9c5c6a0e209aebcc1875ac07f04b7edd5d45401ea22b6d5517d450e4041419508ac6afb1c85f313fdefd673d76bbe0de9507e5593302

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      15b9b4c2ce18bb69869527a653d27896

      SHA1

      b969864d21078774263766d9ab52775633e1c3b1

      SHA256

      42ceab317d6cd5108b2d0948bd9ce8aaa55c8ea77853d9a61797e0f3fe28c65d

      SHA512

      aa549822465e3f32ab1de2fdade844603f225f8abc7865e6ef7bc5076b576a2491bd711311efb3922f5273949c6d9eb3acad60010e2922685e33b25dd9daf6eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9d6fd55eb5dde99947fdc72d3f5f581f

      SHA1

      94bbaa2ceb092cc8a7c1ba33f0163a4ec53a7405

      SHA256

      a38afd2a94581077a7bb5645cb6e68220e94fa01552cdd2eb10000c9710c5303

      SHA512

      4867650d41162852947d027f7dce070876b0cbbb9b65b1429bcd6ecd9f5571440ed0a0e4e44b9b6e4295b677921a4ef51f6fbb0e16811278ce6ca95865dda526

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1fb60239ebea764b23b2255ef3dd4d98

      SHA1

      03750cf1e5d3bbaabb92d55dbbf31775d95c0cdf

      SHA256

      7cdc6443e3826efbc0aefef7feb317cf537c3163082035da767103a7ee9c6a20

      SHA512

      894c2c7ded1f5f997a9a3cba63f84be7508ed49db58b37cdfc99619c7c16c861937aa42d4718b913137f272f6b4b1df52a5f87481a399c252caaaa4687b91386

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d33124155f7776d34f49c3867c2c0177

      SHA1

      931c1ce76565c5212cfc635e2914d86ff841fb3c

      SHA256

      1b81b4dbe64d2b929f19489a0ef53a89028f74ee9b21cf8efcd147d653084fb4

      SHA512

      814d7f7039672bc4f6f2bdcc29cab7316497550d72acb6cff551ae7a16970b95f22264bdb8c352c5a282727ebfc4f3e34c0a7471e4bde871326eba89d09c9ed3

    • C:\Users\Admin\AppData\Local\Temp\CabB9AF.tmp
      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarBA21.tmp
      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\~DF2898EF59D582ADBC.TMP
      Filesize

      16KB

      MD5

      a7be656c18be6fb5d1df91d0b3108327

      SHA1

      e18eee2c74e84cc271ed57478b3bab113bb2be3b

      SHA256

      af3c990f546f26ae2462589fcb32cbedc4dcbcd9b437012adcd1a1786f9d6f1f

      SHA512

      57e604e0d96ac4e30b4cd6265e763b8f1caff9c06013baff57bc641f3b728f5573390a5c1a29bc3d4ecd041a9ca70f4878431920a0cda45a465b4e72f5321acc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      6dff40b9267789cb35bf3cd4a73ce611

      SHA1

      e3db94cca6f6ed985669e368e912708ac69c2a25

      SHA256

      3b38a4d16f9f88417bc6a736f38bf085311117da54a7b028b5d089c8874b51c2

      SHA512

      c3734835af5e3a246ee74c83de3f6d660b55479d8d9875f04fd0b415e9a968e6eeaead600cb1501364724c2a9519c090807588482b7709105de1c94ff1728499

    • memory/1936-0-0x000000013FB30000-0x000000013FE09000-memory.dmp
      Filesize

      2.8MB

    • memory/1936-1-0x000000013FB30000-0x000000013FE09000-memory.dmp
      Filesize

      2.8MB

    • memory/2204-36-0x00000000715AD000-0x00000000715B8000-memory.dmp
      Filesize

      44KB

    • memory/2204-35-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2204-4-0x00000000715AD000-0x00000000715B8000-memory.dmp
      Filesize

      44KB

    • memory/2204-3-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2204-2-0x000000002FFC1000-0x000000002FFC2000-memory.dmp
      Filesize

      4KB