Analysis

  • max time kernel
    117s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 10:33

General

  • Target

    17820a3f5b449a18367048096f35e07e.exe

  • Size

    187KB

  • MD5

    17820a3f5b449a18367048096f35e07e

  • SHA1

    ac1b5befc490f4ebaa0276e17f18918d002892a3

  • SHA256

    94421be3f113142c7f2703720069fbe8cbf24bca5d415255ec732a7963ec37b0

  • SHA512

    578a2e3048d2cbc8fd4d1b1f0e8542418ef6ba920380690a4311ca9978c662d2897a41d2c36ac6669d9b26520e15eac17f3517f7cdfa781954074afb32b7cd3c

  • SSDEEP

    3072:GYpYkfmmuJDJMCrUEk0WLLBjMw26RVTk3V2r65W2/YRPHAp7nvSozjFur:G4YSjuoCrfs2EW3Mr61aHAhnvDR

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17820a3f5b449a18367048096f35e07e.exe
    "C:\Users\Admin\AppData\Local\Temp\17820a3f5b449a18367048096f35e07e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2780
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275462 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2560
    • C:\Windows\svcr.exe
      "C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\17820a3f5b449a18367048096f35e07e.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
            PID:2796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f562ece7122bc605d9801445777661ea

      SHA1

      b1478a29f99ac1ab9997595eca2016137f56b3c4

      SHA256

      05efdbdc5f8e4d60fab27d8d0d403232aa6d2af9f36d63c96ad16a1a4e141918

      SHA512

      9c3533659bfd70f67005928833fdb35725d7c0b990d4d403f6731efbb66fbbbe8d6f6738ab9406a5bc27178755786823f33116cc203efc54892ee6a0e2c01710

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      37cf4923b99302410940b62be28ceb81

      SHA1

      a60b987b58dae1d86ee02fc53e6769964f47b02c

      SHA256

      4389e742438ee8237614e0e09deaffd4d352abed87d0e27017eeb9779a9e6deb

      SHA512

      63a600935a27be9a72ee743bde1b967b361f4ddcef8eea069e9473bbd03b7da6fdcfb0de7a832f8b6fc4ad0273aef62be8099596d85f6c2d6058fe6493b44969

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a368e7c0f27aa3dfe9566db13c0d928e

      SHA1

      4c89b34d34bae5d9929f42a39833321ad7b91ed6

      SHA256

      0ceba65c7eac34c216da4499217b27fffff7deca8ac936ca799f52c072d54c23

      SHA512

      7cb74cf8e151dfe44df00b03010b62a135a00670ff8c6cf6abe03b1cb844baf1992968e9dd1c1753744b1b8030c6858f88f61c4a70a59c1f52679244da133285

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02b570c6b8c0a9ab89c88a7cc2b1f6e9

      SHA1

      0ed30231e27076d358f10ccc8bed81fc40db39eb

      SHA256

      3519bf4e107cd116250394ba6396dcf460b9140edb694c28a2cb44d04ed710e2

      SHA512

      aec87bc84355cf1e3c933d07e833adb19d11ea53e52faa52ee0cdd050e39de791977f6bdabd4f48d9ca7bf28074b8e42a40a1cbd11b493e08fea0642b7125b67

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      82540912fd5fd1f7b57173aff4e29692

      SHA1

      da5591415de7af69affaf144894b7dd7a99de608

      SHA256

      3b6693fe266323d29171b3024d875fa990eae2d3541b5d57e3ede3c0770c352e

      SHA512

      eb2061b1867fd7b5f0faff15d317b5deb3db6728502b6161e5713a3ce9e81cdc1878e2f29986b178923501e21fe9a2679e6bd51db59ef59d69d8a8333a91dad4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f6c97be4dfe823df810d45150b698f8b

      SHA1

      23669ef048921d52239769ce07f850d21262673d

      SHA256

      331e997eb539e72f4f8f6ce662c874616d1163b8415ac0fb1aba5682988a8d95

      SHA512

      6229960a0a758be687a53941fde3247e50d815ac98e4d092f15784deed9c888b4f551a9433a9e2d0652eef15cf0d38e593324b9264619671b5ddc9a4a0883b62

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d044cf86129d7c0a05460c85e16d3614

      SHA1

      26ac913d4e9019a2e9ec4df54a5420c40f2c7087

      SHA256

      b0f381eaf0a01401e7b3e6aaf9447b53b91f4b340dbc03ce531daa61a8ac5652

      SHA512

      d5ae03ba71b12751e2a773a72b2773c22d18e8376f3762cdeef7ab2ca6476e9683568a6e97e0aca4418883ada7a9155fe758c3c8456a63f8a9e307c6be093548

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      feda776c0be46e7311dddc93a8f64ee0

      SHA1

      48f7cf221dfde4ac522b943ac15132d9d9b9ba6b

      SHA256

      ed8d67df87484f5d6e3e1018a47f56f2812a1a67576a2948afffc7f5c0c92703

      SHA512

      7a4c97f0db6a111dba3ae448a39f68441d38e4ceaf2c6087a5125eebcad4cf30402edb205e746674b0090a3bd930f6b53389574346c27e1892cb698100a005b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1a3e83bcecd24b28d98f6a47a912f589

      SHA1

      069b1c3c21ca45feeb467aa43396a3befd0b1fbf

      SHA256

      855e5942a09b96a0e1e9c26a4c81b203001596908c7b293a65f9e563db149973

      SHA512

      f170520b498594e8ce736a8e213b8f80ddecfd172193d1ba862e76b0ff901f1a8f640892a37215919e90668e9ea5c8bd5f7dc4c45876579b8754c3f75cc9e7c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      91564060c82e0ea77066956e631e4a7f

      SHA1

      0ca6eb0e3b5b3fcb1ee14a862f8fcdc85ae71d5e

      SHA256

      9789409b5197b999641a489b7d61b90207090ec170a592c3ca3b8838cdcb42a4

      SHA512

      74718cfd7721ede1d19c5217b6963b68f99df50d21e7d30ceb5318bce625daf8568f2ac7bd82d7bbfc764ff013f6b5767760e3bd23d270a359dd59ba62571f0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6968f334ad2f4a7f83673cd4d603b1fe

      SHA1

      35522759c4e79c583b9dea3c01d54bbd1dd0a3df

      SHA256

      6dbbb246b82aee990a5660ff7050939c392838748b99555f8af95c6bf6e146df

      SHA512

      36df596f6461b577be1bd71fd4f59a5e91cf5883cbc5f53bd13f4de72106f869682f5394f1a6008a3fee0ebe6ec8327cd38f4c250d2b19b2079835965f24222a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b3526c64cca3e621fb0cb21081ec9787

      SHA1

      d11a2cb2c5289763b15af9c977411fef5a420fa1

      SHA256

      886d12bc6c6b9c116af45d60ad3446c1de6fd121821181b700a236a9496edf48

      SHA512

      c7e4c85ed28edcf8813f112b1fe43c1845a7ef631bd88a0ece6acf7d0e80054ff6b79ba76c65a5e44f32612023533767ff2e90bc01e14db1ee392f78c8f440cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bd6d82f408d5c81f4f51a98f3aa5c6dd

      SHA1

      a69640f23d137507afbc8f01556f1614620ed14a

      SHA256

      361ce0abb487e0c1565f6590a1f407051570fffe226a87b067afba3435ecc04d

      SHA512

      2f2aaa02c5cd270fef7d686aba80dc96a36f0644211800c4c990c2935a680d40a13cca2a3fee7b00aab32994bf578edd0c82ea835f3659548c5097fbe7eec8d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      032d54981d3f405aa102edbcd4ebf552

      SHA1

      5480f746798516f810d644e19ea7df8015bed0f1

      SHA256

      847f455cc15e2c26d5a473901abc463d2ac82bd38c1949403d05368171b69fb2

      SHA512

      124fa19146ebbc51ada12b47d9c6acc3ea2c9e1d053d0d9a0ce024634029be9e428d46a3c006102bef4d02d44dda1b9bf01eae47ac4b661cac870d0823f24247

    • C:\Users\Admin\AppData\Local\Temp\CabA882.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarA950.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\svcr.exe

      Filesize

      187KB

      MD5

      17820a3f5b449a18367048096f35e07e

      SHA1

      ac1b5befc490f4ebaa0276e17f18918d002892a3

      SHA256

      94421be3f113142c7f2703720069fbe8cbf24bca5d415255ec732a7963ec37b0

      SHA512

      578a2e3048d2cbc8fd4d1b1f0e8542418ef6ba920380690a4311ca9978c662d2897a41d2c36ac6669d9b26520e15eac17f3517f7cdfa781954074afb32b7cd3c

    • memory/2576-26-0x0000000000400000-0x00000000007BE000-memory.dmp

      Filesize

      3.7MB

    • memory/2576-18-0x0000000010410000-0x000000001042E000-memory.dmp

      Filesize

      120KB

    • memory/2576-16-0x0000000002210000-0x0000000002320000-memory.dmp

      Filesize

      1.1MB

    • memory/2576-14-0x0000000000400000-0x00000000007BE000-memory.dmp

      Filesize

      3.7MB

    • memory/2624-0-0x0000000000400000-0x00000000007BE000-memory.dmp

      Filesize

      3.7MB

    • memory/2624-15-0x0000000000400000-0x00000000007BE000-memory.dmp

      Filesize

      3.7MB

    • memory/2624-13-0x0000000002260000-0x0000000002370000-memory.dmp

      Filesize

      1.1MB

    • memory/2624-12-0x00000000033E0000-0x000000000379E000-memory.dmp

      Filesize

      3.7MB

    • memory/2624-10-0x00000000033E0000-0x000000000379E000-memory.dmp

      Filesize

      3.7MB

    • memory/2624-1-0x0000000002260000-0x0000000002370000-memory.dmp

      Filesize

      1.1MB