Analysis

  • max time kernel
    121s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2023, 08:02

General

  • Target

    4cddbb22b797758c6f130c0b0b539c9c00efddf91d35b3c371b3ee794c193e7c.exe

  • Size

    2.5MB

  • MD5

    acbcdc8cfc06b3ac632b008e05e2aace

  • SHA1

    9857bfa43a40fc98aa8d33a9c57b076e3093fe7d

  • SHA256

    4cddbb22b797758c6f130c0b0b539c9c00efddf91d35b3c371b3ee794c193e7c

  • SHA512

    d9b2d280656e466c25b87657009b2d922fee51d63dbfa71f9f1e3e0bc570633570b01aed45c65a860d3d8c46a2eb6821c31d6f16814ab80311c7f4c504b2f837

  • SSDEEP

    24576:1NIPd/zHfWWrwPC6zwDO8VgJLdDrGnrdEROGHOhMkQJCtHYX6RC/hRJHOhHCZw:1NIlrO8qdDqnroHOnQhKsHOIZw

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cddbb22b797758c6f130c0b0b539c9c00efddf91d35b3c371b3ee794c193e7c.exe
    "C:\Users\Admin\AppData\Local\Temp\4cddbb22b797758c6f130c0b0b539c9c00efddf91d35b3c371b3ee794c193e7c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\4cddbb22b797758c6f130c0b0b539c9c00efddf91d35b3c371b3ee794c193e7c.exe
      "C:\Users\Admin\AppData\Local\Temp\4cddbb22b797758c6f130c0b0b539c9c00efddf91d35b3c371b3ee794c193e7c.exe" Master
      2⤵
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.35my.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1876
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          26cc85ca8e68c94fe44f27a6921a2015

          SHA1

          3c84848d92eb709cce1aa5bb4cf7f9b2dd129d03

          SHA256

          1bc35042807126098e5c4ea5c70f019e302fe54ca29c0cb75d4a31282ab615a3

          SHA512

          7567d50b2519b7aba103ca8a6eb07773529fac6387fe673b78c3bc360aa39f8206909db923e5aa42790e90cb8a1de24d131b9bd4481e6edf6e9b8ce6dcfa664e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          85afe61ca1be2eb587fe4962ae005edb

          SHA1

          f6be3759925ea9ddce584eaa41e13af5b088a517

          SHA256

          529d7f8a279fa0d2f36bc4ac2b26328d1ead33c140fa4182757d4f95f3e3cfbe

          SHA512

          df001b78552e150a56ac0d398304c5f4f8614978bc93a6d0acf8db4fedebe0d4860b14b7cdf6d70bac203e83e01622b125d5d2a09c02ad042f17505a75002192

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a47569b7fc31a8be58354c6da0cd1f6c

          SHA1

          60ac30bb1a60e3f99bbea5b6569f7a03ce96aca1

          SHA256

          f60e280ce6f98d247e05c0b73e119d6e8030d7837a5a14e78118d12f82d08439

          SHA512

          01a2f3436ceec99e682b4a1d14c8eb133c55e5a5b3d26271ab9fa92ab781f115fddf80db53dfba3970845d05d8cf7e8a38db371426ad08ed8afb53b89626dbe9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          81814a632e88616f8abf78f3d12e3f28

          SHA1

          59ad435ced9b9d85956dd2191ad4418576b7103a

          SHA256

          15de9a38ef1a79a853ba34f716f7348983b47dc9a549de9738c2577b81c73647

          SHA512

          ed438443582e1bd54ea5ba53f0fb63f5a1b1278e64c0c4273eea76a4e9d12de841602807740fe0ad66e9b22c2a4b9751f71cbb4b032121746eacb0dc84b2b384

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4f5e860283058db94855404042dbf455

          SHA1

          98d02c523cbe7b24d0263eca41379c9eae4bd323

          SHA256

          e93bd62d8afed44c32b8152437535056a6840b6043cfcd094efb9386dc81e6ed

          SHA512

          b1e8eb3f45d23fb1526247303b6a62e53a4e618f904c859068e3ca6a7bca23a0ea3396e5e9a81752824d6f92a3d20722a68232d11eb901a795918e1dfc58555e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0eeb3d13ee5a4a7488817f83961cae06

          SHA1

          3a0c43c2f16102279aee911e809771af336e2c9a

          SHA256

          ef5eb653e73b0e349505b74d22f74fd6d6443f76861aaea59e70be85a8a5aed8

          SHA512

          a22fc2f2b2d1084b5cf6f466d5e95473fc1007662973d97eab24f395584bc3ca062bde87710fe8b7f2a2163660cf009ed0c37ab2e0e0b32afa79f73481afce0e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          19f1c1c1911d52c53b22a5cf835762f6

          SHA1

          6e3ff7b9bdd444c4c71423c286739686c702fe64

          SHA256

          05d0ef77c3ba9508d046e3541e2129bb561f7f0c14a39e70f04868db1ae86452

          SHA512

          5d10583c780df97230cb24a36f36d5fc6e5f17371bc660131c023c1fca42589e28b9c32ec9979dbccdd5280de371c3bbcd9c9b46f58e71c9a37b359b1fd9185f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          467fdb17797d39a4c48ba108d232e4a8

          SHA1

          227e8a4b75d1f7fd0620ab5dafe19d931ec66eb0

          SHA256

          4a31e1f2c9506f0eb278b61ce6842b9d1d162a8d65fd3b9f6494922816f2936f

          SHA512

          89aedd4bf6221f69d3a5a804bb6893f1595702f445c229253b6a1141bbeef0c05f6411bd3331900ce37f45094e2bac96c3791464da88e92475269e6c93902cb9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ddb72df7e4908aeaadfa7cd2c11ca047

          SHA1

          301730be53111ef01f1937f4f49acf9a2693fb56

          SHA256

          cb17de27381bf412ec61a5c7810ecf6237d2b3fcb582c632f76ff3de9cb21f68

          SHA512

          ff0304d65f9932e2d22f2c95c47f39f0465848abb0ef1f8eadccaa62307be0d5be5085ebf0c7927f1ab98a433d959c42a53a683f64ba2d2fa023aab4de7a1599

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a6ed90d3e403d2f50e2f67cbd17ff6b3

          SHA1

          40b811b2fda5376f92e9e7b6ac13f09dc4222faf

          SHA256

          eff1967acb27c7a6ff820a56f290e2fac567e9fcd73a4846c04206a1fa8ef6a1

          SHA512

          72d75635a7eb200c9a5b49c10ec96d7a98cdb08a75cedce69255ce8603fbb6ece4409b58cdeea44472b40c861a90f72d17a43c6064b3c35518288798c345232b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          246b098ecb86f00fe8afed65e487992e

          SHA1

          122ee53be8d36d2bfe5c735c392a8840929f8a17

          SHA256

          2ec20765ecebbc06301bd6bbfcf5c6a55e2c620cd191a0071849f7a1f27c7b3e

          SHA512

          85d2db37bb5572651abd0ff6f5cd12fcf2cb74a231ce4c9de17e7e1c5a2e5460547354bfaff827f898974f836b19a79db25fd121efbee10140b452d97eac4a16

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7cb7fc0c7326864860b71a384ac52298

          SHA1

          c175565fe32a3f42202273f3a530a17e5556702a

          SHA256

          2d76cac58efb1126c95210f0e62e876d82b6e2a3263e6fc3ed83502ff7f45080

          SHA512

          72729603599e6adca33df479f61f3a65be27216187816c24074c3bab5227bf551cfe41483ebd419f40f33354a1950858d3fa5915187a549efa34c2b7f6292f1d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          86b568cf9f24c0502f5cb24aa708b04e

          SHA1

          abc1c7c8eaedb4b4b39affe9bc2f22da053e69ff

          SHA256

          268b8106be43e07d56bfcaf12aab468ab2ba6ea78318d3aa6a784b752e71bb4d

          SHA512

          a401b43bf2abb168a5d2279a1513f1c0a34f2ccd48b7031992440f81838051eb4e2f03c6f73f0bc4712996c083b3a3051fc500ba6b5c45262ecfd524ec5778d7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ca436bca506c4b9ab3edca95c328bda4

          SHA1

          e0597815a221d78e80487a56f63c84534455033e

          SHA256

          83fd9f48118726696d04dbc1bbb57cf8a453b062d7212befddc95587a3cb09e2

          SHA512

          b1ae78e0debe7b62e26a5c911e13b77a6b0b1b462cae1d24ddee366456ea8562261a6f170818202e9d6448da420c76aaef581ae00abdce65c8fda3e8030bd3c4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          118714107c8d356b0ebc48c96f2a3b91

          SHA1

          bf574ce02f108f5df40c5f3baa362c3036ef7f44

          SHA256

          45bddf6cd5742928bc0de63ec71cb28f77abc262d80a37aff6458d842404b019

          SHA512

          220f1bc9e9a2a5d0f19e607aabc355cdf7802fd20b2113648e12e29421eda5fc293446a9757d583318ddee87a32a0f1e2afa1c0205ae65514e95955ccf69af65

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f360877477d8b60a843f0a4ea67c4f16

          SHA1

          8a1e8f8da7484540289f882a4cfc18b7f4fbb067

          SHA256

          338a119cfde942a79d8b4a85570b006826e112911c01daca12937fd9dc560378

          SHA512

          0a2a88c1d280f6c13f0c6bacc7c8b4bc122c13f31fb7b012fff33ee093fad7b4df9d44e69280be4fbda7a9de34ab30f8271837c9c91115ba2a0756b9d1c6645a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          86ab157448fdf0c86e92631c4a0741f6

          SHA1

          834f03836654b5fdf6ddf7972e0300f0bdc7b43c

          SHA256

          d06ddac2313faddc58ab8b9fa4c035d1245282d3c2be2b8175f42c6356889795

          SHA512

          991beda7bb8e61c8984e0780dd4cecf937135abab99d0a00c094ce1e276d64c099bfe57f490a98c430aeba9d97dcf8464f89f92c7c9ee8c39b7274cbdf306ad3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          475ed8173d7dbf8c491169014a93ede9

          SHA1

          dabd448e1955d89c44d9d9411f250b4d28f6e465

          SHA256

          12d28cb8196617f740c27d19d3ffff612df695dd60cfdd37eda9a67b5d3aa6f1

          SHA512

          9d393fb50685f13d61e7f486fc660fe9e5805c51b3ab82515aa7d7a81469b71699d5450a923ae44a1d756bba33454a8cd7c0c5fca175a2484bfbb277f380ebd1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cc4796abffecb79d143c16180d01b796

          SHA1

          060c5dbb32abbd67822cc32889c54c234e0c68cd

          SHA256

          3340b38b48e04ebe9a979c51ab956a1f30e91df976eb745e719cec5a0bbda537

          SHA512

          b06aa66aa0391f2c5ca326db7249851b5a84c890adf84072c98f27c20a02d9f89faa208a9c43f2ac50662580cb4b7a94e1888aced07e2900461097142dbe777b

        • C:\Users\Admin\AppData\Local\Temp\CabB5E8.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\TarB5FB.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • memory/2444-4-0x0000000000400000-0x0000000000690000-memory.dmp

          Filesize

          2.6MB

        • memory/2444-1-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2444-3-0x0000000000400000-0x0000000000690000-memory.dmp

          Filesize

          2.6MB

        • memory/3012-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/3012-2-0x0000000000400000-0x0000000000690000-memory.dmp

          Filesize

          2.6MB