Analysis

  • max time kernel
    132s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2023, 03:15

General

  • Target

    ce984ac12be18798f7b2cbb06b3135f8bd36964f9b2e4fac5a074d55d334b0f6.exe

  • Size

    1.8MB

  • MD5

    9b6cbfe4a1012d8ab7914d40910d2a97

  • SHA1

    3e6c1dda6e2f9d115cdc2c0f359bffed588a6096

  • SHA256

    ce984ac12be18798f7b2cbb06b3135f8bd36964f9b2e4fac5a074d55d334b0f6

  • SHA512

    60381e192db19f5664cabc03ca1592795c91fdf11735fcdf857d51722a2422a668b10e42bc00dbff038b1a7daca1a43352b99227af820be8f7b53456f00ed712

  • SSDEEP

    24576:j3vLR2VhZBJ905EmMyPnQxhe47LwvHYgUBoHDC/hR:j3dUZTHHLAl

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce984ac12be18798f7b2cbb06b3135f8bd36964f9b2e4fac5a074d55d334b0f6.exe
    "C:\Users\Admin\AppData\Local\Temp\ce984ac12be18798f7b2cbb06b3135f8bd36964f9b2e4fac5a074d55d334b0f6.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\ce984ac12be18798f7b2cbb06b3135f8bd36964f9b2e4fac5a074d55d334b0f6.exe
      "C:\Users\Admin\AppData\Local\Temp\ce984ac12be18798f7b2cbb06b3135f8bd36964f9b2e4fac5a074d55d334b0f6.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05345ca228ab58b65843707e445f8012

    SHA1

    14f0cea633332f03edf5697865e7173502588a9a

    SHA256

    332618848d8c39a81bfe6f85f53690cbd3970ed61fdf1338ff66db8d6e1350c3

    SHA512

    03255f94dc1926da128146e763e39d9513e966b64ea512c95c2d51b3ef809882c647728d2dca7b88f175803fd5eeb76ebac468ff354ea57010fdb8341b5e6252

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a23b68b6237b66149dfaf47a72f42e5a

    SHA1

    fadb538ef063a2fb10683fad245561b7369d62a7

    SHA256

    f7d948349ce37ad83779cc2dc780e57959120e7942cdf5e34febe5d9583cb262

    SHA512

    f2b0ce47a55addd3a8450829e323ab30c8596fcc16142838b2d74498da102659570a0199f8caaa2fe904a6f323be45fdc4376b118cf279988f423b5757672d78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ad1775cf965f70fb8e8e6c2dbe167d9

    SHA1

    d586d6eb0342a522a580647da0535a52615a5249

    SHA256

    1fb6c7768c1d8655b053213f43611e178da418d42fcda4609978624e8e12eea6

    SHA512

    e425933018ba9380295dad149db027db34b6c03d5abe8af8d907da672004e38600c7fea8c990c1c7a2af4483fd994ad928d6a910b40c795d73bf64b17d098a43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f75ea30a5d574ec27b50e9efe2d60f7b

    SHA1

    b717fa9633bb32248cbf8114c8145f0d32864817

    SHA256

    756d315b7f940b00c1dd0034951563e3471086e4f1c0851ba8dd15492ceb9586

    SHA512

    53c65e857098995dfb543fe0feca3d875161afdddabc356821ef9791bf30518b0eac7b544bbbe2cb150a5ec2dd9dbbed372eb91df938078a6c335ac5a9a9d27c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20847d2705714ca3d91360fafc7ea2c9

    SHA1

    4959237ae11dd0e12ac27ae75e55d6a33966ae44

    SHA256

    b232ed4285ba3d394763163b0bfa12949cf491f83b218b8b4566dd3cec8adcaf

    SHA512

    3adb55cbe82cd5ab560c2a1d9c30d88711addaeb57f4fe102a0e8575f71d43606a875b45aaad055bef0519dd1716c4cf0ed66d2c8161816697da1c4c067a20fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92ea34fda4b1020e62a3c96756c95c79

    SHA1

    8345d5fab7c4bdb89e13342e2cce81504fde2301

    SHA256

    0663a92a7a7d55fc24f72efa085ba22703b9164e4c2d981f57d9c0c3628e3afa

    SHA512

    6153bc07de0a9bb66b1006aa809bb7be666a91e8b8f685527b58c77111d54804992ee164780fcedaa8eced2d390f5343b22c7cd7be7c0402eb2a0efdfdbc571d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50e91a3dc18e6052c8b3cc7259f6744e

    SHA1

    41c1c2f93377a04957bdad3c4943446617058140

    SHA256

    dc62ee05ff10a89cc6f8200f86c0dea59e4197cccddf8dab09909e13ff5a34d9

    SHA512

    1432456fbf957f94e4b2aee45192d3c26b796faef740acad07caf49380b1e74ca2954dc12abce22727e6fb39ca36f09c4cacd14e1433870720a6993e9c9cf358

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf5f1c596c426a206cc0dc78593ce1a2

    SHA1

    58b7fd878ceddafdf90fc7b21780519af26fcd22

    SHA256

    51d9b1e89d2e326d923aa1d40aa531d29742eaec49358406f7036ea42c0b357a

    SHA512

    972c62a5700d35917ee466df3c7d3e658631ba4d572341026fd951a137836fbafbfd8ce7077f7fab3c02169ad444732214741812ca75f5300b64a1bbfe59ee2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d990e7e214d2e3043f6b570662d1808

    SHA1

    70a34a158a9153e05b97288866a3f464ea446b5c

    SHA256

    e61a7f3fd2156576fcea4b23d7d2e5ca5845af1b8e435a284b14318a685b28bf

    SHA512

    56c062bb9d5d32fe3bc182d54484b9db16d6cb243565ed860df939a609ca09d912de11ce4a815f5f332c7cd1ea77dde79f6d8f103630c34235f175ff86ba31e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fde993b75f6ae7a879efd343a68c991

    SHA1

    602385fd86b381f9656de277e0b21b10aac8e393

    SHA256

    fe75b84915e25a4cbbf4d3f3d4f361dfad1ff49ebaaf18c955ed8380909115ae

    SHA512

    d9fcf8e1b1c34dde978e3f69c64aa0d72e310fff0a62003c5a0ec54711565eb451631d6d6d5372eb6b7b810390b4f4176830e885a482e55ec6eaf8703bb9a6db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92fbefccb7c7c8a09b0361c3ed22592f

    SHA1

    5aa63fb3e96a03391a206519f5eab4850c5ac719

    SHA256

    90682d0fc0b556f238cbb1c7657a600eba183f8ca609cf171fda0fb2ce9050e6

    SHA512

    cd7348cff6951c434194b72aee66cfaf11e00a823bc7e9590aa9da7b7e04405e1551ce2b1ce24be91922cd5e96588fe31913222704496b571792d99965611bae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb6febad1354f12c6099514957a88414

    SHA1

    536833fa904de8fed18ec39289f8676178ac0cc3

    SHA256

    f2eb3e468d728e53519980015156439508d8b277f76e0c99743a6e0da4cb17e4

    SHA512

    7f7d4ee0027578d34ecb2f1d49c254c4fc19db988ac5444534411f85f23dd4a13f717743786e31a37cfe829b6f12fb5ca3c68090b0906b14027df52a0d1146ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98f31dd3272447ec15e863a28f73d00b

    SHA1

    e33eef453c8eea271ee18a1b7e2d616345c5162e

    SHA256

    f580addb79deafcb7e384c3250e9253e3a703595895ef5f69dc54c95b70029d7

    SHA512

    6d9d6a93e6eb1fc6e10761f5f5d7a6e88f051f126fdc7fd855f0fea1f44dc347d3c8543bd2e69caff677b1841d87f535691014511d2c9fb80764150f32322d96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e406edcbbe7f549ea9a0b2433424449

    SHA1

    11582ea7120df8adaa996972a8ba6dcacc6774fb

    SHA256

    33c3d40143da04caed634db638599bb7c5e495e832c065cd951a7143c8d998a1

    SHA512

    4672e913519e7ec4c6e020623b3511ca4ff6502bc152962b54ec91f23f28f0bed4700c3a2217b09c60ca1f1394e8f2c014adc7d1cc0999efc4e2b123bb614a14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b177f6a5c303e9e0010ff10e172e920d

    SHA1

    aa56c28f46add388ae2d489904ce52890335cbb3

    SHA256

    78eedebe4772e05b3e06673043957ca041762e86c654ab5a9543ec3a86ca3ef9

    SHA512

    cbfc397e138483ec92d01d11c0e9ad5a1eda8d63c7f9fb2a4a23d43d1d2fccd7565af0bc9bece3a0fe0ea330d9bbebaf59c7e0fe66e448aa28fb4f3639b63475

  • C:\Users\Admin\AppData\Local\Temp\Cab7294.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar73B0.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2084-7-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2084-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2084-5-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2084-6-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/3068-0-0x0000000000380000-0x0000000000381000-memory.dmp

    Filesize

    4KB

  • memory/3068-1-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB