Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 10:34

General

  • Target

    1790384eaa38f792b0d98f8a13e4666d.exe

  • Size

    420KB

  • MD5

    1790384eaa38f792b0d98f8a13e4666d

  • SHA1

    f0809e0de20c767e988138b0004318ebf923eb92

  • SHA256

    2815ade77c86bb66d3a085a83d50835cb4881ed1a12d772d2e09be55cab6c8b2

  • SHA512

    a100c2180589a172fb30a38963f827270672e784b9e72183438f009a3ce01fbe537055a3e35f91329d7243388d6eb454a17b61d9493ac3ccf4cd39c3b0cb717c

  • SSDEEP

    12288:mwaA3t7VPRw+8cOSQN2jyGFyFjISvfsJJa/oSdF:Zpbw+8cze/jL4U7F

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1790384eaa38f792b0d98f8a13e4666d.exe
    "C:\Users\Admin\AppData\Local\Temp\1790384eaa38f792b0d98f8a13e4666d.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f9fbcf9bd1daa1dd4c257a995515610

    SHA1

    e633bc76d3d0cf37909b1583c184550bcfe2f43a

    SHA256

    c0deb6279f57177d1e213cefe6fa5f33058821b67bc56e6758a00ab36003b663

    SHA512

    b80ccfcd5efdb299b85d85ac221f763bf3cc331e2feabcad9183f5244f8c6987ec9fd12fc94748621e51af0c497cdb3561a5544347855fe630b042fe840bde3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38887a1dca17c3563c54947b382864ee

    SHA1

    fa175283d513dc142f662b4a495e2cbb44d454c3

    SHA256

    28763aa089a318a59a2cc2589fe64ae239b40dfd4832e84feffb69da9bd45bf9

    SHA512

    965ca202d74867b6565600ab3ef365ad6dfb958cccb2d9b84c8a32eb9aeffdc056e18209994f1cf4d0bf0c8733e2994fcb6096d2f8fb13256f6b49e78af5fc5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bffaca4509feb99b643bacffbe76343

    SHA1

    13ad5742cf2ff05e205ce6f501d08013abaa7f13

    SHA256

    2a123f57e30611c8c169f595cdf58115b72d1c542c50445dcb8af4ff57f871d8

    SHA512

    ecd857fe38b1bd53739cee5a03bbae982669e6a714403c7e1166f9582e16d55952baefd4fe0b6e0e1c4edd74ee6ab187547b1cdb18b01cc9de6d87452f4a3776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    867ceb05b0edfe5c42371592121abaa0

    SHA1

    2d833e4613fc8a12a36cdc7b56e554730fbf88ce

    SHA256

    f8cc426bd7c485da9106a20124f41f3608616ddfcb9660ac461dd78a4dc82f91

    SHA512

    8984f96025889593ccf66c07536aa636724db126ebf2531c69c35d8e165314fd359ea84e558f94cd7cfdfa8d73e2b23b8728d4a160c13d9c4f4e764330786313

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a53c6c450b27162e58205e8012ea6a83

    SHA1

    cfbdbe3847e5e9e27dfdf48e87b206372e7c9e66

    SHA256

    2e958209ef90f59d6f2b9e2fbf93524fb796cca36bdf60873305befef46d5499

    SHA512

    3a379e3390bc851c0049e5231e6c1ea46e0fe8a754c2c4ab3c76f67a4e5cfd4f8bea899bc038aee83d3ee3dca3e1830394e54aaa1dcf138718705cf99da23ecd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dfdd35f892ea2b94b6836a23caad3ed

    SHA1

    2217c76c3705f2ed079a2924f303f6dbd973e408

    SHA256

    ee0fef6bfc54016e01d2b1d39ce76bb2f5ece8fd97e8a4707c4e01e9a5ee416a

    SHA512

    2c3eaf659de4bfe1be1922ba7122eb26520e77d958e3d035f230abcd8e7106bef7901787330ca6841291e1009aa19b7f364726b6d6c128f4fc9f9e4d866ce1b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    632b275ccc70a2bc4b3b3813e0f6c411

    SHA1

    357847e21fb25c75c174855c19ae18ba63d2405d

    SHA256

    73aae7bdf340821cc47d3836651ce000f277a5570138bc13de7b4301cb8b14dc

    SHA512

    a2af77b7852d48a782631ac7805b1727aedfb7f9fe20152fe8844708e73836349e6c6054e5d6a0800f858d2ce5b0b222a080419ab5684d92dea3f22fa3d164a7

  • C:\Users\Admin\AppData\Local\Temp\Cab5573.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5575.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\1790384eaa38f792b0d98f8a13e4666d.data

    Filesize

    937B

    MD5

    1aebcf83ae6865d88271ca6c4c7fb0ba

    SHA1

    72a60430d535a694104ed5d23b844cc61b88155e

    SHA256

    04640de4fb08d421ec52e34713367394cfab132a5520f055aecd1731b22f3929

    SHA512

    b55453d31e5d7ce7c3f794fad02fe7e0aa9c4a8074f415ef392c9fa7a8ec7f30c361b269827850abb1bf0de394ef1e9d6db2083455e7721267e1c3ea0975d95c

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\1790384eaa38f792b0d98f8a13e4666d.htm

    Filesize

    87KB

    MD5

    2290e78ddaffaa73838e9a67d679cbc7

    SHA1

    5e2583a2c5bad107c82cab2a495d559e1385ae41

    SHA256

    ca6005b88259d61bfc9943b1236cd4f6f12833f3134a3c1553545247d95aca2d

    SHA512

    a2c6ae503b264e30925c685efb6389175138fb809989d5e4c61e62345662c0d7a6e0de57c6a8f883209c7bf613c6be3fb4ca2031876d562271c8b111ad338abc

  • memory/1956-134-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/1956-0-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB