Analysis

  • max time kernel
    235s
  • max time network
    275s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 14:23

General

  • Target

    25405c6c2efe864ff55c417016129881.exe

  • Size

    1.6MB

  • MD5

    25405c6c2efe864ff55c417016129881

  • SHA1

    b160d5bbfd52bc7a940d3308259863979173108a

  • SHA256

    e9ac1f33c62f2d97724f6584562c24fc14a3bea2401266d4932f904ef77738d1

  • SHA512

    0859158534c7729f781e6065494db492a13a2433f14ff18f255780ac4cf0db210bccc5f8a812d031f4b4fe329759eab0c2fca0fb3c7750e59543a04d6eefbb7a

  • SSDEEP

    24576:zv2yAWqrZtPuLol4UqI70Yez5VEHYLgVZGCriaRU9nIlGyCMZqHe2Z:7gzPdSUqI7VQQHegVBrjW9nxG92

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25405c6c2efe864ff55c417016129881.exe
    "C:\Users\Admin\AppData\Local\Temp\25405c6c2efe864ff55c417016129881.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll,FileProtocolHandler www.900dnf.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.900dnf.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:676 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1488
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll,FileProtocolHandler www.dnf01.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dnf01.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    893B

    MD5

    d4ae187b4574036c2d76b6df8a8c1a30

    SHA1

    b06f409fa14bab33cbaf4a37811b8740b624d9e5

    SHA256

    a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

    SHA512

    1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4dc7f93c034f8ca61482eb0816a4ad5

    SHA1

    7bb254fc8ceaefe07516d271b7871285df8f4de0

    SHA256

    35b66524b8f8422c6b3497df3d6bcfc9ebf5e2b20272308b017ab1a92f02fb6a

    SHA512

    3a2d3be18d0b25e29826cd1dc2bc6511b7234db93a9864e263b287dbcca0005cf62691fd6d4d40e3fb45e8ad01d59926803421421e0aced891341534e68d9648

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bfa1aa3eb402d9f06fe9538ac07f45d0

    SHA1

    05b61da174012348b56967f74be510cdd2568927

    SHA256

    95fd03c58180bf8d0327991b5feddbbdd3b5754e3a9e61fcb4b81fa0d233612d

    SHA512

    64688c9e1ae39817ac309a3e0fa06d0296331b92de93f83d03c13a1b71837275c3d41968cf6776cfae0349a7adf533bf765ac873eb5436c013880d934885659e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6da42811347156b281b0dd2abeb18c30

    SHA1

    dbf5db16960ae446ed013e706e2004c2a2c341c3

    SHA256

    b481d42c36c5f57b2f5272d279a34edbce1b8ad033ccd61c82c0cc5be29db75a

    SHA512

    3820f502a47faa92f3d47d2a1359d1f355a1de4d39b548b8591985b3d7489958865d4edf5ccd7b2e66ea4644d672e25293f3280e62023801090f78d9860050f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a925c50825e741a58e7af6712b99bb9

    SHA1

    dce7bc2e3c83cba55dec2a39d0fd0f1bf3b4ca4f

    SHA256

    ba6ec14b8f560f0daebb22cd2f63eb359c8f4fab2c124845f442cf2c0633dbc5

    SHA512

    5c94afd07912f4ce0e08db9c23007c92a98c45b2b7762af5af13cf94ae2ea5844540a4e6e3f370146d14ae30729392d9c70b37089c2bdb58820be44e6176b540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    437b944767ff53582de2361b06133599

    SHA1

    10c8a849c9ae302537ac0c6ffba4417b64e4ce40

    SHA256

    1ec11a65072ae5eee0cfa19d930e25e5c761aea95bd92390bcaed8dc68129941

    SHA512

    6e0baa6bd8e9ea7a961241a295e8d55afceddcc573e4330381b5213f46049211d4095af47954fc60ed1bc21d6a70503369a6617c5cd42b0e0545564f979d3de6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4360c27b90bf7c8fb520577290ab8e7f

    SHA1

    c9c44f0e52d4490dab1f70b7dcfd0beedc7c4311

    SHA256

    720354657ee8c7d177b7cda18f27e0cf7d5328f28c7e83c62a07d095793e2183

    SHA512

    c66624770e6c936a1befa43b20ac0dfef124c04d70a34fa3421c00623f1772abb05022320baabb413799ac3ff41c7d67c638e6be5f8cfd20a722e296ee5b668a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a16790b888e149a536a399a4f67094c9

    SHA1

    f6c31c65126e1a834069321737cd287a0fd09165

    SHA256

    78b00cff996ea10001c49befd186e9b4ab4a79824ee4ec0dfaafdd21ad7dac15

    SHA512

    747782301969c88fc891362d464bb8123d4b9eef5892ba1e07c1a94a14771c19c8bdce9ec3c85ef945de3b8b16d5636e48b24ae4ee164c187a1a82e0d4746fd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fb474b4fdf6be3b85520509907438aa

    SHA1

    91fe7719a9320bbb6d8b038e03dc4a304072801e

    SHA256

    b37ebd44d01b43b3a208f1eb9eb18b0ebbe876da0ab85eabc5b7ffd75aae1216

    SHA512

    22c0842a8593162e9186711731322bd0c9a60d992f5c8e1cbcc4f1a7f60e1baee2d32633f48801e6fa846be5f8d881abcd6d6d403689178d726d4a8d093f454a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9662df084cbc80b795950dd9dc0701d

    SHA1

    2450a275d713e87a52581bcb78075163f101dabc

    SHA256

    b4ca5cb39d4132bd5cd0b94aa93736e307a278e08fe96cdf913d24c62db95d8e

    SHA512

    8970e0d5f0f28b109864ed187a899a1b61157efc28c7530d6f8873a541414bc204103d3dab2356833924a0b9998250a75d85014b7e70bc2ba2bd684c3dd53e8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f300f1135e31057222e8bb15faafc27

    SHA1

    0b89899f6ff097eedc9c7f3bb7f66dda526f1b4c

    SHA256

    4ac6849818292fd753b66d34b4473b210fc0c1ee01f5096cb20951a28b70eb9d

    SHA512

    7ee756b759c0e115323df73c6e4e7f75fd34fd20f2cd6b955d71e188fd5f608d809a68dcf5ab1398233468ff1da9fbc016dc14f0c5170605440d48112777ab93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    889747ff4d65464e92d29c4d86916652

    SHA1

    6a04a816751fc4c2048dd2115d08cf8232c11355

    SHA256

    3380dc66d8969733bab6dfa8da5cefe67192230ee25d04de5bb9c2c51ccd4e6f

    SHA512

    0662bd8687502c5cfa0ddb83c3b975bad2d76da4cee2bc6658c73551b1d0b18a8756c6a874462612217c44e0511c0ef62e06952d01d83a9479869156823dbe1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64404068523b3f78b077ef59b493cc38

    SHA1

    68da2932e30ced5c70227cc337eb25eeca8c4e93

    SHA256

    23ebd2dc75853c025af3b632d87ce85b2a2ace8d939b836c7d094f35d01591e7

    SHA512

    4fc6b6f11cc436a58511ae2f4410f8817f54082e0a0eb1986e8efce03909897778af945c3289230b78ef3b9ba49ad1fad7db1e5faaa6a07fcc87818ca45410fb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{72FDEA01-A3C5-11EE-A5C8-EE9A2FAC8CC3}.dat

    Filesize

    5KB

    MD5

    ed48761dece9078d041035efa8804881

    SHA1

    e927d585ebc0a307616862031f160b71e4180840

    SHA256

    1a3ad15b7245661524f534c3a46b52a621af88adaf9fccaf7765c6f539f2eb18

    SHA512

    2b5f36e4824433732d849fc2699f6891d7e232be839692ee22dd20e44b1bfc5e5abc70cc3bece4eda02b9fe5972ef2278612097e53b36ac795a1f962af6d1586

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7302ACC1-A3C5-11EE-A5C8-EE9A2FAC8CC3}.dat

    Filesize

    4KB

    MD5

    011f4bc3936c8fb0c9671909d525eb0b

    SHA1

    a5b5f07644a5ea1212c68eedcf67141f542fb99a

    SHA256

    02b2b9f7ce7bc5dcdea70f893f8d52d37be743f7d785e6d55ee943202fd842fe

    SHA512

    66fa363354d0405b7dd0ff75d609ca98eb05decf8a4d19a454b6f411968bd705f5bea5d23baf80312c471111b7084c99164a550e814414c23d03f7e21a668b37

  • C:\Users\Admin\AppData\Local\Temp\CabA45D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarC181.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\zZFMzgxQThCRjNGN.tmp

    Filesize

    2KB

    MD5

    a5d642a25fde3132dcecb50c17948ca2

    SHA1

    13ebe22d541f0fd3fc4f67c69a75195fef28d771

    SHA256

    b2ff676189cb8b80855876e11277e9e70168ed3038067017ad510113916b6a7b

    SHA512

    952e3f71332dddff06cdfe98fdfd3241854be05605e1350042bdc14124ffa70ba0e01c88a12a3053be74c99cf50a6adab56aa4badf0228d4161696b25aad3a59

  • memory/1420-789-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-27-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-778-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-788-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-59-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-24-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-0-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-722-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-38-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1218-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1220-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1221-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1222-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1223-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1226-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB

  • memory/1420-1227-0x0000000000400000-0x00000000007B2000-memory.dmp

    Filesize

    3.7MB