Analysis

  • max time kernel
    133s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 11:31

General

  • Target

    14cd0d1de3560149ae96b6ca97141331.exe

  • Size

    333KB

  • MD5

    14cd0d1de3560149ae96b6ca97141331

  • SHA1

    1fc626e3868c25eef2ae8462cbe24d1b596fd796

  • SHA256

    ce3fdb19b943eb7b17c1c744a5ae71688e011a98e4194ef316c3f610155b58a0

  • SHA512

    c4d0bba07efa385109815f9eb3dafbdc5d184a37f3614d61824bc325426a2eeb26861208d749ac6940ddfcca1dac25ce68dd57db7b35186003befba63a3acc47

  • SSDEEP

    6144:Om6UslM9lJh/67b6fMMo6keEZ/jUItRAQpomDnxXV+WaytQbmjdJPpbIYzDYKoH:OmDslqNoYUrmQjDVBT1Lk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14cd0d1de3560149ae96b6ca97141331.exe
    "C:\Users\Admin\AppData\Local\Temp\14cd0d1de3560149ae96b6ca97141331.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2424
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:209932 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    339KB

    MD5

    e819c1da4011615af8641e4e3e900c40

    SHA1

    3a3e9364240811967ca1be38f55ad39f89b2016d

    SHA256

    ca67f9de48353f218d80c39d959aa43a0447ac6f4c04d8d1c45cafab67fa82fb

    SHA512

    5ec7e38aaec1b776ec236c951e3b12c04576bd39b1ef89e785ee07ece9bc5615484d906809d838e96038865b11c283881f591544dff11b5737632d262c6dfc30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5edbc460edf707b7a8bd900b8ee2af8b

    SHA1

    e22a6331f0ef2637aa1871c662953a58406bce02

    SHA256

    0c09d5ad1b6acc71749671ce376d6f67b65174b4546b2b1a435660379a37cb57

    SHA512

    baa5d18db78d10a50ef2f44eafecf111f2f5b19ca04c78daff411ec1574d588b81ce0bfafd89d885b1724f2ec9ece978b8bf200b09b7b2c931d6f4f2295dfeb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdce2e8362cccb0719dce9cddb8c990c

    SHA1

    778c6b0f6152e0f4b531984f58626aca96b56bfe

    SHA256

    8186fafcb60cb445d2c56d8373889aaa3da843cefc148335bed759fc1a767f22

    SHA512

    57dcfe4d2a4bb1a04c1bd1d174018f20245cfb04a9ff338c476b0f462a9feb5622e76690500adb06a90225cb4b9b8cc5aa211a96a1ea085a6f2a47a415ad6bf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a101c2a43671c762b971724ae9270b7

    SHA1

    e0cd80b3bd060730ac7d56f75bba1b9510d1d315

    SHA256

    4131e5b038aa4786ccda782de01ce1941ea67cca433af242173fc65e78089fc4

    SHA512

    7ecf0cbfb5f71c8b6c2a3bb61d95ebe08a9f16d14c55f169383522b57f3247d16cdf24549f9bdeea204b06d1ef9103d9222f559215015b0dc4cfe32cd5aa8ab7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c71e1cc06633e7a360b99de1634fce17

    SHA1

    c656f90191effb648b06a84d5012db382654aa62

    SHA256

    15906fa4db755fec139c20aeefa37dd60fe38950499f70fad471498d128b2a17

    SHA512

    240a9c933d1cddb3d22f76daa16a285e9e9ecdba3356435a5f7112f7196262b1292ec12235c93d25ce85cee6d43f120f87d89862baac6281dafc97c6db5881d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ed1515eed7c36b45149f30c7ab2c1cd

    SHA1

    2cb003e6b99f6b8d44bcea08fe36740d489f47b9

    SHA256

    c763dfde6745433eb4a82d2a3174ed6c9399506b72546fde9b60dab6e6065a35

    SHA512

    8fca7a412ca2cf17abeadc5b78a711bac3cb010570f69a3ce60eb00acb2c5082a9dce64c424d72e6ac3da0ac19e672e4eb3030a9fb2c0b6fcda6ee2f5b9adf3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3db76cb938578cc67c775cd5c0133ed6

    SHA1

    223a6d50235db68e5963036e5bccda7ee1dcee8b

    SHA256

    63f9bfd3ecc1a7a9cb62de91d128cae17df5ccbdec6b3258974ab96acf310a0d

    SHA512

    9f0a426820aeda658fe67496c62225092ef4917f476b3df13f8fed28c5a402f6635760f089fa070311c2758030860634e44f625caad8ae9547efa3f0a2de7639

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ab0b2ef6c5dcec1818a603da5d2614f

    SHA1

    2023e042829dcb561a11df1d0c624e33637e1a92

    SHA256

    5ce2403a52a4279e516f4b672a67be4f1a8f6e052dad74c59168ad91ba6c7e1d

    SHA512

    0fe320aa12830d6462d63eb37a0faaf84a09312deb9025f66ad3642f23c4fe3dab72a4e8b5fd7deb9e3ff4394da1bf4452d788522b12e0191f2c53b2af7cf911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3fe98753ce5b2e0860a3007f53c16993

    SHA1

    2678da5549df5d5ba212fae0a61fc6676882aeaa

    SHA256

    158f238bb8fa8d54fbac910f5afdeabd98f74843662afddccac9e93b463ff9a2

    SHA512

    75d166849f28eb7eea711c7d0e394f9434a89885ff43c542417f1af7b0d9611e129a2a656977aaed9db04c5628f73fad9d7728f3751f60e0eeba259b7d018782

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f704e01d4838d6f1eea8beca94b0cc5

    SHA1

    a2854e7a23a04c429f4d0d2555f9c0b7e6cd0665

    SHA256

    dd29ace0c6c6ef80621300bdb793187c84027cfb5dcb53eecb0c8a9671b14f8e

    SHA512

    95bfe8f0306caa996eff99274f4d25c43d6f41d0eab20aa8b6b23ec655ce3db84e2222e50ab28d9442c431b659e2096a66380106851f2ec339ffe401746ba085

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c657cda75d24955d804ec66a336bf43c

    SHA1

    04f9950eae5e2818eba827b25eafd37087a97993

    SHA256

    4ec2617cbe6e8cd11bf2ecef4752212c7c5327e3370313f40dc69192e0cd2f5b

    SHA512

    35fbaaf6c30920292e91e334fce639995627ea5d5f78fbdd177dfc940018d25db07aa815d7ce8d0b7727fcd84a71f7df97772d77f290919e004896d007967c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5979c47e3cdd6a2d8a0414b1b6fbd61f

    SHA1

    6cb196a0da7e1ec35d3e979907e659c215fa7e4b

    SHA256

    4d58f55011d4a769650fdc48db9605383c8591cae81ad5525102c7f5f6497b5c

    SHA512

    b22c15b104e4fed767041fdcb1ebf87d845c127e9c76dedf714b51c8135d76f110c136c28dfaa6f8eb5246c700e7ed86e01116726f6c94953d388364523afba4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f62e41725c91b4160810be005dc8d349

    SHA1

    c14eda6f68825807768d2ee0e1e802a8157f6ac5

    SHA256

    91e88675dde85060497156f5dea80b75c7c12ac7a2c6900017a0ad21aedf5496

    SHA512

    9960043468a8d33adea51cb8c8eaa86e97c22ec647b56a545035372593f0ac5a30091d50006afec1a9b9c41155becd6bbcee753ae7c96b837f26cb68fc7bf18f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e3f60490b9d4421b96aff410123c348

    SHA1

    f2827b21a219ef64bdd79a75283dc462d2fdc296

    SHA256

    e576376ce5dc29826af36aed66e6cfcb50666064d9399228c72f7b07369525be

    SHA512

    9877c9aeb83d4c03c2e1c7661652e39b6ec92366e5039d0c8d08a254967cdf3d682cf382e8b9976e4f089edcb76e73e9b7a47c9ac48c9d1d2af509ea1ff0a081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e86d60b97cae751b1e06ae1286e4295

    SHA1

    5d6a7e4084d087393f2a763cf1c0859aff0bad48

    SHA256

    3173d86a52eb0758d2ce659246e6a0b54a9dee21e0c6ce408ff931f0bf3c2052

    SHA512

    c4a1e319f421ddcbdf994f1eea0fe31cee89390f5d5f3436e4d0e607864d3d2cc9b64fb798f43f796ba1f63cd0760a8b80492235633e78eabd53368490ddbe3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bb0feb4d3f99915003b94d7d818a4f2

    SHA1

    839883f1d09c92a19b807308063043e520e270ec

    SHA256

    637425962e461005274e7611e61202f7177a2910e7e6a633c7c3b7e5b773ea97

    SHA512

    47e3055851767765af9523a860e233ee662b541191deb0a80eada706e0d20a14067ffbe93196708128a25f2af78972da4dbbd105cff42f1635eb09ad7e3b365d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a33024d5f6677a33e30884c42d8321d

    SHA1

    e996b53549d16c352e6d80ee126d92b2def68c49

    SHA256

    ac6619e7703c1f2235f9ea1d88fbcfac1be39041dc42b60cef794500b56fe24b

    SHA512

    c239de44cf335a4f04e3207aef6c91d095c1312ff28664a86d28bb0699a1747c7f97d63d5f9f30629842c235c2ca9fa1c4d93c2eb155023f2e87920840a5a38f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcf860c8b2a6ade4aa3c79eea8422f77

    SHA1

    7d74006dc3d1c9a1a9001f9e3d61bd4cb5e96216

    SHA256

    44f81923667a94ef4a046b9476738c935431d85c6049c40df96f198211efaff5

    SHA512

    9f64eb0546563ee908088764da97f801fe417cecf8f420e3adcfb55ccf317cfb1684efed2a89a15ad29b750e0fea87a69bf3dc1b03558daea461e11908fef01a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5d07234bb5df7d976c36d859ab686e4

    SHA1

    1dfbcd3e0fab6fa40a155478adafb3d0d4bb6157

    SHA256

    8f17e84110ed812926c1a54247c0ad430a949d30807a2797ce7e8c886a9879a3

    SHA512

    ae7055fbcbc6f333ec83767edd7c16714304a4f58b76dcb5e84e72050493b1858898786c0130f9c79cd0296e7cc3eca1dec5b8d5139ef5f52264873749caf38c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e20a9a72a4bde9ee97055f91568ad1b

    SHA1

    b432a580cd64db1530feb0b838a2d4bed343abe3

    SHA256

    6cd71cf6036acd4ea693ec1c5c0136df58cc10b41305e0e0e56ae2afa3ff4bf9

    SHA512

    8478ca118f900fc93a99f054f85ce208f1fa7aeea46cd3617d958619ae61d29d703e78a6cf7c7b5b95cc13d7809a9fb4289778f6a31b927b0ac5e7e4c20d9085

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6d1866eb294a46e8423261a81fc2055

    SHA1

    3433cb37c110e58b8dae4b97ae735938c3c0ef42

    SHA256

    e2726c1452c870b6094c9a5747f62b6e7e808adb97df30bb72553167ced467fc

    SHA512

    2ad2303c931d7b5045db67ec693073ddc5c09178c19f1503c385eeb02f49c6d592340c5f731f5af2fef76cbd46c3443e5e9bc2038e077aa486809f8238d25ea5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d36f7ab31188e215745423c37399d399

    SHA1

    a5f0e96f4982bba2896dbfc75e33de08e4ca0f4c

    SHA256

    6086f3c4517e24fc5dd7a4e15c05dcacf1f4a1a6d985bf162c00a0f9ecdfd7e9

    SHA512

    b032fca3a89c31c0a1f36e76a9fa4f95930a3ac4bc464376bf233f82f50b5d4773451267fda08b365de0c2ec43b04dc8d32bc4719049f3d8cb99c661e04ff845

  • C:\Users\Admin\AppData\Local\Temp\Cab1029.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar104B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    351KB

    MD5

    9b8c39f71fcdbbfaee131cb94f6a7d85

    SHA1

    5bcaba51d23902ae59e76bc1d46aa9fe1afe938a

    SHA256

    5e7c24c4eecbe4263dcc61bbc326e1a71d912567b80acfeb121f8b2e845af173

    SHA512

    3e93545807c01b7697523e4dea163a3aff1b56a429c02f0cd833efc8d4d367e02b991f3ee3aa43b4c1b1b7a58faff448c2409d6d2eec2d56e13c4001b559febc

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    354KB

    MD5

    cea3a0bb673f7c8eef7093ecd870092c

    SHA1

    3b49264fc1e00f28b949d4d316fae080483ec47f

    SHA256

    f5f2fabce0a5da87acafb64603be31dd8f43e771e99bb0ebd27c8eb663fcc201

    SHA512

    a03546a523705b85cb898045644d2947c194d7eaf560e4273f5f913daa017c2bf446671319dda21f95ffc0b76c0adda029f8669cafbfefb65bc1846f30df2c63

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    357KB

    MD5

    65b9b2fd012e5f19c7eb9bea61293186

    SHA1

    598e98ff77ad467a7a6f0e42cb1a1058a416b952

    SHA256

    ee380df68873c2506a08edd7aa824b2dfad4881d1ad297a455683ac51e43909b

    SHA512

    93ab6c5eeef9721f9d1fbbc65367c0d2176264e2776f03d89dcaba68bb51b513665e4c6b460c33b1b7a81a81c0a2b361cbb10e3fce1984a9f50bf01aa31729c4

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    365KB

    MD5

    6216defd8ab488e27a2166caed4dd107

    SHA1

    efb0f063fb912ddc1bfa2d6b8732e2e15a21c41a

    SHA256

    57d368a45ded1f2ce131fc99420f32bfc3bfc9ec8168a344124b3b9223217920

    SHA512

    8be401ba273e1a7222f958830e0b122d2fc503465bdbf3ea151ad8d3394566b26a87679f2ab33e8b3f414471ccd09635f8e932d076cb078736a3283ba075fd31

  • memory/2520-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2708-22-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2708-51-0x00000000005F0000-0x00000000005F2000-memory.dmp

    Filesize

    8KB