Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 10:33

General

  • Target

    0832fd308c0ff181cd3af6e627a199eb.exe

  • Size

    218KB

  • MD5

    0832fd308c0ff181cd3af6e627a199eb

  • SHA1

    bcda79eeee370e686c88693c30b987e0ddb73b71

  • SHA256

    da2a9f7c31f076433cf46e01b8d1b313d94fd87c95309be59842df05af25355f

  • SHA512

    3cd0bd5f3f33936690e704f7f8a55efb1fb6b896b9a6c3c4d1138c4e53a54257b55efe3c81870c62f6a7197af8cbd8c99787bd53026ef4b2721b43f4f26c5878

  • SSDEEP

    3072:B7puEEMo2qTY9VfBhu3oVocpsZBd4Tqqkn3sLBO6ZSETrhgbXX9llGZ2:ppMMVVbsmS6IA8X9Ss

Malware Config

Signatures

  • Contacts a large (1005) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0832fd308c0ff181cd3af6e627a199eb.exe
    "C:\Users\Admin\AppData\Local\Temp\0832fd308c0ff181cd3af6e627a199eb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    364KB

    MD5

    356706ad3404cdb22b9f005f330899f1

    SHA1

    8c831ce286e768998b9e62c0fe6cf1a5f8c51e26

    SHA256

    ac787840b296f3e3550a6a591747aab36d94c31d7d8ba4173df44bf578d3fa35

    SHA512

    2bbdcb939e250c3ea89ba6eb8b2b9d5fb844beb1b81e045a3b0d8dd6dcc6952a195f787f615db9a5e96c15c655b13dea9f516ef27db4ab9fd0d10b4fa95e06fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ccb8e57f5e851cc984b832b872dfcad5

    SHA1

    3b68e06acd1b1d64a0dc4ef7e9cc9aa97ca53e77

    SHA256

    72bc282bd6aec30d4d9e9de25dbfcdd82e8972881e71dcf32b1bf9a99e566ff5

    SHA512

    9fadee14f46820c6ab34568b51786ee652184f84c1cb7ba835239aaf49a0f96beaa2a6edc4e10387647d33029b856ce1cb5764641da439e6d2ed21e7f9d810fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e18b1f1ea1876d40828be922f35243cd

    SHA1

    5488c3282919edcf7150619f57a56116a95ed453

    SHA256

    d03a5d35ea6343bdc57913955bb019e245092622660a8fe15656ada0c082152d

    SHA512

    b961975436252825bd74f201e3ad906f27981f92b6f49eb1757a5b658f721d3ae67c15fe73608f8d5bbe85a427cac6785612914a17ab619cbff4233a0f13a1f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6431cc440142545fa9290931bab617a0

    SHA1

    987097814b4340028e2f9bbb0d8891f491d1345b

    SHA256

    4adcd1f5b8ff1b8a44fae431159422896acb964557b24279ca5cac970833fc06

    SHA512

    824f079b4cb6d0826d7175158ae92ad7fc8967eefb8d2f21cf4c6c6c0b5ed4c91de567a7e629ee030d2eda3ca04059235c5ff8956b0923dfc960b477ba064ec2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95e0c1d4e46fe2b9c302a9cf34c17bdf

    SHA1

    aa6953dbe90b36b555774a690f91e211281a0c1c

    SHA256

    f331532448da7fb03b8e815124f88261b00c4850fbe0a62dc8eb85c59bab622e

    SHA512

    b4e27fcd957f42aacd74fea0db8ad08f296db9fe7f356626915c67b1f9d5b879466a1abb30b9b417be3c6a914d83b3b1943bc774b958ebe1bc3599528d3c90e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    021107fc685fec9ba127b00f75f268ea

    SHA1

    ac009c1371295e95412baeb3ee570daed5dba075

    SHA256

    abd5318afc03af9493fb5cbeed1fff99fe193745fef38fc489300bbc44d57a34

    SHA512

    6e281b4642270aa28a9982e3c9d64a957027d109b90dc81386ef59810eff1e10cb6703327a3da134ef47239f8c7cfdaf75d03b9e257c89b76d74259b8b9dc946

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ad3f44feb6f8ae7c22e54628f2a6fa5

    SHA1

    2ce7ba94efc9ac7e70b222cdb361ddc733792aaf

    SHA256

    a6c98abb34657f145c1925a532180fb0bd343e99ef6e2ea4ba3b727a1de12a91

    SHA512

    ab40364b9d3952c45da2c4c5aedb9e176ad8e3471170f2461b0a8675a169c30c6a2ff93e1faae065e57e3847b4d4665a51db0422be99ac6ce236a4a6136b35d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    166eb1ae6f9b1067820bf1e21bf6b7ea

    SHA1

    ef8271af0fe5c24cb28849611e0a1d9c671db4ed

    SHA256

    fbb330aa52c3a24c5a587f4c0e1f75cf47f1b9d41c09067f8def3c878095348e

    SHA512

    40a782ffbcd3bfd284379d9f4fcfa23520a78ed5d96ce016dd2309902ba64d4240e3afa4a8e22bc5e91fd85663acc98aa1cdaa38bcb94e70b3a413cdf9cc05ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a4fa63a354d9eb8058b8f5a2703c905

    SHA1

    ae69945cc2d5591fa959c0df5da150d57e2c8fa0

    SHA256

    f42a72b47607f78987b8c0ac6b7d142d78ff9a247868b3abbb3b7ff2dea36226

    SHA512

    1b1e6344026d33287ff8021f02071b4ff8841726b8cf126d982046282e65a1dabbeba2c71438018298d4cf0ba0081e839e14416f94de37e4065e38b6a83d409e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fd2b54847ed6d26763157f8a8bff56d

    SHA1

    2443a6adf0935b37da1315558c98ffa9bd752a76

    SHA256

    8684efd0bea77527237227b3d886263a474435c566778b61a8778358e9f6298c

    SHA512

    55e0143725757be025fc5e9ab7898a2a333cdd5d4a6e82153db08f2ff52ad0943a2b2e9799ec9caaf3e40ab481e3d29a3f904c79db64a9f22e9470405a6c4afd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    679d343976fcebc81412ae18b43ab637

    SHA1

    d35c1705b487d893194383a217af69aef7d7e8ac

    SHA256

    0c10dfab20ce703e2ca08b9866c3771e4d1ade8bbff6f9995a4daa5f0cb066dc

    SHA512

    1d5e33127cb76ddb02d6f66b3182ff47198ef24fc4e38beec96aa8e31c8a2b6c182639d5c6cdf1a0bc036107a7948a9557133cea540ad43e5bc24d90b3bad93e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91582b56a41ec71692b18f5ab8ea925f

    SHA1

    e1831be6ff709d4fed15a3f68c0c1eeee0a92a5e

    SHA256

    12ddbb8f401bee156e2e16490d739b498b1b42ca005b621d4d86301a6b9217ab

    SHA512

    d4ce2c3b4ce7dc8dbdafe70fe279a4e1531d4ad2add1aa2e071bfc6b8b438693d98dcc1310979e8c668d50687dc4e7650ffe42e3bb5820bfae5147bb38557dfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb5f4de7874aee6990f65b6397683e52

    SHA1

    53d721188ac7eece1330903c880b58646fdcde62

    SHA256

    4c973114b63d6b77f4254da6f67b89faf4108c053299d3992de1f3f16fd83055

    SHA512

    74e64d4a0f6a5d244a57f504bf951402918b76066c49793ada9e6a4b786efbc72583f596874caecc21715f253196c1059ddb9461547a531861d56c913da6e53a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d5cefa3e03b2b348f0e5723145726a0

    SHA1

    50507e9eabbc4ec8a81e85e0ac5c80ca072a8bdd

    SHA256

    79c1baae6c2e3997dac643551f1cf9bf82ced54d82dae73cbf6bdc9a6dba45c3

    SHA512

    fa2f58f3b2bee0b1e10543378ca966b9d9be9e63f7fddd0252a2a0aaed90a940d61c3aae3565c65dbc5733e54b4dd1dbe692733ee94ce5aa99af0a9d6c8f5c67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84855483c217ec402e49ec0dfe46c79e

    SHA1

    f198b29f8a4c7730ea7b2d62096b1870baa3f7fb

    SHA256

    32bda5601dda458851d83ffc34f2996aaaa1a536e834bcc4a5cc70b1527abcbb

    SHA512

    246cfe6b3563d468dc70d840c559c48357421f47f1e4504826b1458f56d8157320fd994245117e2381dca3ad0214d4cee8caf15e35c889b524cb2dcc7e7571e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62a918969477b9b2192d6a026c3981f2

    SHA1

    9f9672593f74ad9bcf5723e956754d2a1f20d447

    SHA256

    2def465cad666431f9b3c24fca88d5fbfbb7f01853041557b88b244d0cbc84a9

    SHA512

    dc711e4635fc31145a5dd476f961a8f377c6a848d7f0d7efd00e75302510be123fd02831827910305e3f7b11acc2b447cca35501c069a5ce2b96122f1147a6d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74297f38326418439d06e722cacee774

    SHA1

    6a003b550f32985ebe23fe422a4669a8773d9cef

    SHA256

    a7f6f86acb7416757f79a4cc6761332e0a171b81abd853087cf1ef8d03d26e65

    SHA512

    914a78da65c4deda5c4989c9a87dcd4a77f49ba0c4c2c174d1b0f76a28cfa9ac1a760e3ba0fb571ae6f16e43a9c41b12ffd3b5243973f31faf79dcac46e2933a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bbdce1a5accfc7a8d32eacc8f9a857d4

    SHA1

    31649efc1edc79bd7ce3b4ba696f2c58608ac5ff

    SHA256

    25c03eccaca8e2302a541e7f690509043b723af4af9cd7dce4806660012fe6bb

    SHA512

    a528d8cc2fe06d43e6fbb7bab7fbbc24b98f1342b5942b5340e1c25928d3fa86986e28a4936e67cecbde6376ba3ed4113c3a5c2a4a436a1f9602d0b3dea073ce

  • C:\Users\Admin\AppData\Local\Temp\Cab5F43.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5FF1.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06