Analysis

  • max time kernel
    72s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 16:45

General

  • Target

    0671c5cfbd0ea6344d096ad46cf0fe17.exe

  • Size

    25KB

  • MD5

    0671c5cfbd0ea6344d096ad46cf0fe17

  • SHA1

    33a80b4fb446ab1da6457b018b6b3a9a11a184a4

  • SHA256

    6c978b13d3a48cb2590123d5fdf3fbf5945ec0a73621caa32af809ffa22b2fa1

  • SHA512

    085ea0ec4df5e53e1e1fe5981d4b2c457762a4227c08c6ea18c2ec11b293ad132b59a34c380ec034de2ffb5a2858bfefcd8dc8c25f73a7afd0478c40602e8e21

  • SSDEEP

    768:MqbKI+C2pbyw15X/WllPlqZrpvUnYiu+:/KI+C2pWw1kzNq7MnYiu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 13 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0671c5cfbd0ea6344d096ad46cf0fe17.exe
    "C:\Users\Admin\AppData\Local\Temp\0671c5cfbd0ea6344d096ad46cf0fe17.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\wbem\csrss.exe
      C:\Windows\system32\wbem\csrss.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Windows\SysWOW64\wbem\csrss.exe
        C:\Windows\system32\wbem\csrss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\SysWOW64\wbem\csrss.exe
          C:\Windows\system32\wbem\csrss.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\SysWOW64\wbem\csrss.exe
            C:\Windows\system32\wbem\csrss.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:344
            • C:\Windows\SysWOW64\wbem\csrss.exe
              C:\Windows\system32\wbem\csrss.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              PID:1148
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                7⤵
                  PID:1296
                • C:\Windows\SysWOW64\wbem\csrss.exe
                  C:\Windows\system32\wbem\csrss.exe
                  7⤵
                    PID:1880
                    • C:\Windows\SysWOW64\wbem\csrss.exe
                      C:\Windows\system32\wbem\csrss.exe
                      8⤵
                        PID:1652
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                        8⤵
                          PID:1592
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                      6⤵
                        PID:1568
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                      5⤵
                        PID:2288
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                      4⤵
                        PID:2692
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                      3⤵
                        PID:1196
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                      2⤵
                      • Deletes itself
                      PID:1692
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2792
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:2372
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                    1⤵
                      PID:2312
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
                        2⤵
                          PID:2672
                      • C:\Program Files\Internet Explorer\iexplore.exe
                        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                        1⤵
                          PID:1492
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:2
                            2⤵
                              PID:2640

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  31d613684d7d57ff4a6a3805ae7742f0

                                  SHA1

                                  d89dde7bc07d31205f67d2dad9e9daf354f8d4b8

                                  SHA256

                                  0ff9cc4551f3f949cecf7c100bb73dc54edc7673ca61e98e18cbf427da12e0be

                                  SHA512

                                  4f7974174c7ebb0bfd78d7a03de8e4f6d4df49304a21402aa10e122db5b4ce1a74d4f9e06abe6d38b233ba14147898bba00c3abb806e454e5d59fa0193722237

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  3b5aa0cba0cdf6869c631ce702c6b750

                                  SHA1

                                  a61fae03303f49933f5a5a6007b234073606e7ec

                                  SHA256

                                  afadcdef65abc3276d968efb90f04968f03032df80c31ea537e37455477c750a

                                  SHA512

                                  6191da1d9990b95aa099ce446b8678e90e624aaacf51521d266fba67b76cafb210d5feaf83ecf380a6ba29e9ab0d5f8d2600a6d101b7c1baf1bd1174642397ba

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  cfa6fb34e3a5939241952c4a860313d4

                                  SHA1

                                  59b1817fe5cb6c84e7d683f8e500a45db385c1bb

                                  SHA256

                                  5a5a29aac6205ffe6b3656186d455f6b0c48db5bac83d61b3b4569373f3e790e

                                  SHA512

                                  3e3d32e7ab6a109f085593ca1192f24ff56c4473d065b79bf3f70db6cafb1daa0bc2440d14961bf99239bebb9879c12b4d41052f990724bc7bb044e82fb82d5f

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  023b39dc450ce0b5d410d53240a0211c

                                  SHA1

                                  cd5f61ea600803e86c23b25dfa857679e4882c43

                                  SHA256

                                  12ef8f1ea24816480bcdc9d0e765f3d64a8e7d4e5690f100ce0d23e79f19368a

                                  SHA512

                                  00395e03e852fff8d390555fc247e6e245f9db1cda72e650296593f4b0efd2d278a28e1e778644c4596701bf242e2b4a3f2be58467c532655836085a4d705a29

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b6d14a83d23fd4d4d0d82694bc72b31f

                                  SHA1

                                  ec2e25a293c655ad83ae411e3055bca437365976

                                  SHA256

                                  bf9ead1522d93ae7b6b400d091b14650f3caf72b298e54100523f90247f928ef

                                  SHA512

                                  b73cfa2b8e76cd0d578dd69231ef80b950663c9bfdb48963266fc14541c3c93d5b3c54ace6682aadae0c2fcc7b90d2c220be030fc9942e8c14611211916db3a1

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  13db4450041dd3de9ab1785edec79212

                                  SHA1

                                  3d03168e3f444f7c10d2a03bb5369d5eca77d6b4

                                  SHA256

                                  8393be323aba61eabc13320bb17ecf7cc5b000969ee383e0ea9bf85e95b2b1d8

                                  SHA512

                                  3e56f0effcc7b7841cb65c5b5295d0ff150fc37feec9e7687e98ef19c5bb63014a8187d006201c46fa212da3fa5531338e5b3b9ceca1baaaf310df76dcd9ae8a

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  183b7d5edfa37ce4233d49c66e830a0b

                                  SHA1

                                  63b01eb514ca1419d57d35edaecc8ad9727de6d5

                                  SHA256

                                  876f7e7cadf003164102c88a3500f6db84c0561e36c86d25de495a239faba053

                                  SHA512

                                  8ec4bbcabe3d64a0c56866856641d4e991a6b75a5e8c2e8005b427a52ad1d9c1ab3d6517401998555627b4d9170e79ee7fe824ebc6c19c97483432c216cfd4af

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  648f243da71d865204e785abfe90c238

                                  SHA1

                                  cdbded1c7d4d1131ed62d263a6e49154471b09e0

                                  SHA256

                                  432fca235620ae3c39699cc1d7fad2194533bcff68906c68e0e5151b715ffd93

                                  SHA512

                                  de76278c79c29d0120dc1552229dc941249e2ec63af565b04d8f523ef6bad580b2896dc1395f7b90c02d1826d7ea47775dfb851dd0be579b07b7729e3c63dcf9

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  8d304567f3f502c6b46e1d31a17b3fb2

                                  SHA1

                                  4358d21b97ceab8fecbd2de2d22d1764a736b4da

                                  SHA256

                                  f8ccaeda780e78e17077f97f1758ac6c140ed865d46f71612ecc4d54a9a8dad2

                                  SHA512

                                  d7a8e3e517deb88c5ad5f961d103e6cee58c1db9737cfe0503efa23d2ee0eb5fd5939d1db3cf3c769c83e9c7bcdcda3c6c2344c7411dbe0b8b149d98a656bf72

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  5ba284b36340232a48aaea8e3965445b

                                  SHA1

                                  15306009efe375dd1ac31936f795be70e230cbab

                                  SHA256

                                  d610cbe2c30c20a88b68ad50f615ea2f138d53da690f5694e61f3889c8dacc16

                                  SHA512

                                  1c7243d2e83e212137bc394b3d64824abf6e8220d05c080b8be8dc1890f35347dae95dd842dd68ec918784e3f76202a251a460605ab7ce2738ee5bd22c476531

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  31222e68e49fc8bb07f6341b6fea1f9b

                                  SHA1

                                  cbd16dc2f6e77512e055c60f70cad54bdb56d249

                                  SHA256

                                  1529db18cdb9d2f2c3dc1ae158933a15bb1fb68aa19b39b0802717fd13cb1e29

                                  SHA512

                                  dd0d8b8ddc6440bb6cbc8e08dabb405c5f9b9fab961b58a9ee226375208d3e77e85442c473855c7d3dfdeeb09783a665924eebd4915abd62959effd272bab88e

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  cdef17c0c55dfe796750d73946cab3a7

                                  SHA1

                                  14a64d4b0ea135d8d7be67bf41a5a5055db8110d

                                  SHA256

                                  3a92148acaefb0849d825bc43a8e8803edd71dc24fa9e1246f96c146bbce0fea

                                  SHA512

                                  8fb964d622d4f93c79d75b8979d81806730401d5879190c60de4de6696c993771bca00aa4e79aac19b23cb041e50616254dff7fceb30b2fabd6eb4255b9c7920

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  f6ca09d24cf33e7738911dc7e26852e6

                                  SHA1

                                  b4ee0fb3064b81b61014f641d5efbe9d5f923919

                                  SHA256

                                  c30981bd81d5b3c8f7ee2473b376e4919fa9dc46d5bb1094cbb5d7e918826066

                                  SHA512

                                  4aae163629ce798e7353e8f1fe036c4a564b0ed6833bc247916b33abaa3af4f6a4eb99e0dc010b2a3641a91468904647f30a32b694285ba13b593d23a379f147

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  08706fa4757185b2570ff45cd0268ff6

                                  SHA1

                                  7d8f9504974445621309af384e06c9da9584c17b

                                  SHA256

                                  942021c30df41dae705e65020d604c5532cb6188d95ba1e757f447497ee64497

                                  SHA512

                                  664240dead1097ed97d858819098e1486b7c55a48df7774b678a2fb37be837fc43d5ef9918f8c25ecb6accfdb4399b919e9d0eaa5ebaba8e241d6aa8e0afbedf

                                • C:\Users\Admin\AppData\Local\Temp\Cab2CDC.tmp

                                  Filesize

                                  65KB

                                  MD5

                                  ac05d27423a85adc1622c714f2cb6184

                                  SHA1

                                  b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                  SHA256

                                  c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                  SHA512

                                  6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                • C:\Users\Admin\AppData\Local\Temp\Tar2D7C.tmp

                                  Filesize

                                  171KB

                                  MD5

                                  9c0c641c06238516f27941aa1166d427

                                  SHA1

                                  64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                  SHA256

                                  4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                  SHA512

                                  936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                • C:\Users\Admin\AppData\Local\Temp\temp.bat

                                  Filesize

                                  232B

                                  MD5

                                  ca754767517770cb111f822b6a54bb86

                                  SHA1

                                  e270aa162803ad6514b5975f7d654347368776eb

                                  SHA256

                                  7462be25adb22cb0d7db4cd0e8d36328e59729463ab2f5fc4961e398bcf2b916

                                  SHA512

                                  275caf430152b4671379006b319d02c59fc0c154de5a0cbcb68b091886fb001eea6cd1c22985aa2b9c7c1f7b82e7f42bee7de5ec846f3dd8e051ef3347827f03

                                • C:\Users\Admin\AppData\Local\Temp\temp.bat

                                  Filesize

                                  160B

                                  MD5

                                  688de2c11d07cd1a0f0a22aaba2f38fe

                                  SHA1

                                  c693ee247172adf49b1fe68c597358b0e0e2477e

                                  SHA256

                                  8fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7

                                  SHA512

                                  d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a

                                • C:\Users\Admin\AppData\Local\n.ini

                                  Filesize

                                  19B

                                  MD5

                                  e415f059d8566da0d8d44108e0e915fe

                                  SHA1

                                  34dff1c646f465308c2804f0f046bbdcdfb53661

                                  SHA256

                                  b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

                                  SHA512

                                  fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

                                • \Windows\SysWOW64\wbem\csrss.exe

                                  Filesize

                                  25KB

                                  MD5

                                  0671c5cfbd0ea6344d096ad46cf0fe17

                                  SHA1

                                  33a80b4fb446ab1da6457b018b6b3a9a11a184a4

                                  SHA256

                                  6c978b13d3a48cb2590123d5fdf3fbf5945ec0a73621caa32af809ffa22b2fa1

                                  SHA512

                                  085ea0ec4df5e53e1e1fe5981d4b2c457762a4227c08c6ea18c2ec11b293ad132b59a34c380ec034de2ffb5a2858bfefcd8dc8c25f73a7afd0478c40602e8e21

                                • memory/344-430-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/344-462-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1080-12-0x00000000002D0000-0x00000000002D2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1080-24-0x0000000001F90000-0x0000000001FA2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1080-15-0x00000000001C0000-0x00000000001C2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1080-13-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1080-39-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1080-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1080-0-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1488-234-0x0000000002040000-0x0000000002052000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1488-231-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1488-72-0x00000000001B0000-0x00000000001B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1488-71-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1652-1042-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1652-1029-0x00000000001B0000-0x00000000001B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1652-1041-0x00000000002C0000-0x00000000002C2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1724-41-0x0000000000220000-0x0000000000222000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1724-40-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1724-69-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1724-70-0x0000000002350000-0x0000000002362000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1880-1002-0x0000000002030000-0x0000000002032000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1880-1003-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1880-1023-0x0000000002040000-0x0000000002052000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1880-1022-0x0000000002040000-0x0000000002052000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1880-1021-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3052-429-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3052-233-0x0000000006000000-0x0000000006012000-memory.dmp

                                  Filesize

                                  72KB