Analysis

  • max time kernel
    147s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 20:04

General

  • Target

    3a0f9b5489a3d5434c72a9088a8b9807.exe

  • Size

    191KB

  • MD5

    3a0f9b5489a3d5434c72a9088a8b9807

  • SHA1

    c3788a4fe94f9ac16bfcee2576a870829c952f46

  • SHA256

    7917ddc85c27f7c9c237ffa7e8239ca3c431dcf397d41c2e3eb3b6235c9cda19

  • SHA512

    a73374a2e8f6411715f21b785c7bdbf2c422cee04ff1895dd868c597022edd9a62fba82e500115bb39ad185339830f56c8de920d032e8ef2fcf5de996ad20592

  • SSDEEP

    1536:I3IHViDrCi7ZOVRPrzx2HqXCtmtuxi0zw8gTpdLY1izKYbbn:I3uVgZOVVrzx2gsLmHMiF7

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a0f9b5489a3d5434c72a9088a8b9807.exe
    "C:\Users\Admin\AppData\Local\Temp\3a0f9b5489a3d5434c72a9088a8b9807.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\3a0f9b5489a3d5434c72a9088a8b9807.exe
      C:\Users\Admin\AppData\Local\Temp\3a0f9b5489a3d5434c72a9088a8b9807.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies WinLogon
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\Explorer.exe
        Explorer http://xyecoc.net/
        3⤵
          PID:2508
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://xyecoc.net/
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d4a5fb11997a87be362db1745f9dd7c2

      SHA1

      cd9507cbc1af0216b7e049b19c4268ad20409c17

      SHA256

      ef794913b03b7ab64c1ca103e54a6cb094a900b121d33e6d5bb74797f4b87cb0

      SHA512

      e2a00e10973761815fcf469869f070f604bfe39fb0683b2edf49a87e1bebf20e62ae71b8c14ddf8dde9b2e433184f937267002ffbe0606d3eb6ffd684bc063e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      da3c7e5069175e51613ce3d64ae1f619

      SHA1

      25a51686ac458f1e5888a1a27f4fe725ba06c341

      SHA256

      434589fdc62b63e49f6a04a1f28fc2b4ae18c1a03c0a6f488246500980bebd1f

      SHA512

      d949cafc031ad1cfb19a3bc0b392e3fb3860335ac7939473ab8f52a2d8425afb0917fc124a77da1fffbab19d5751acebe059dc367c3508bb5dafc84ad60e382d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b98c91f5e2d08065d20c74aaa5cd6c70

      SHA1

      8c8fe2f3f482951c5b09bd69b3b9b5910db70f35

      SHA256

      eb2d985a94cd1520d49cb1899588fedbcc74c754247ea6c345f04cee8065eedf

      SHA512

      f03e78fa00ee70df63b83d204874ff5cdd49b3713d454e4aedc813e1c22fcd7ffda6262aa4948f7d61acaf541dda31ba9c2ad77b2fb566acdd62a9752a7c5eaa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      75c4de5b6e323f75dc81d4484dfdcc7c

      SHA1

      63bbb694cea29683efe6b41638872b86d2a54115

      SHA256

      8cbae5114214c1410b1788d2f2031fa1190dfacaede5f671e1f4a1d59de987ed

      SHA512

      d8290ae3a25140fe8d1ae449cddd3c1831029ad38324c3bee2757c63edef25bff497971cca4f94cc3508be54829acb69a032e92d0f9e970868b74aa06ff6dd6f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0979e8e628aeecef96bab1f230b1a41d

      SHA1

      e9d55922fe4b2c762c3ed2117f74f47d071c9374

      SHA256

      f25b144b5100857bb594d56b45a9015627f8ab8237b63f74ce3db2011fb7fab4

      SHA512

      bda6980c42e54d0cf65956b798244c963b667c45ac55a9caca5882269031ddbc1a09f6e6b002fe45348ce0f2480438532411325e62475cc12039fbcf72afbecf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1982555c4d1676baab5df0b85b2d3e22

      SHA1

      6a1450a675d288e8d0ac75ccfd0257026fa283ad

      SHA256

      cbcc34216c09d43424170ac6b792ad0d85672ad193dd7f9734e9ee3a93fccf55

      SHA512

      6f9e0283a42cb6e9d8eda2cfa5ba5a184ac0ffd2d235566ee5715263a25e744f2b3f02d9ed3720b361117a8f287b39dbc40198048fe04b2417738834143aa1db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fafe025da8c8fcda9e9e5e92cdbe8f34

      SHA1

      db7871b90e6e0fceed5feff40fddc10ace790e58

      SHA256

      46134ea81b20871933071072fa63d35886ee07f4eafd0fb8a166782a61ef866d

      SHA512

      445772ea2c8238095d9a593643840103e5e6ec6fd4b52cbc74001edfa8c918953b42ddc0d16c3a53f4bdd474a2239196e3230df1e1069bbdd01342b43d71f565

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      27496320f5192bf1878363cd2aff6e06

      SHA1

      56ad80ee4b24e335b103518a1ba13152fa61de79

      SHA256

      47f3f120a166d066880fe8e0ad733d3fbecdad91c91f0c3fbde1a5922d528eac

      SHA512

      e44da5af9fe9bd5bb262bf636c65439fbb3b8d49bd49d90ec38a5e98afb28f129e449be468b3c165034318d1dc8d447529fb8b5b01c208470d03d90805b87a0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      630393ee572ec7c748143ff319ab4e7f

      SHA1

      92aaf618a191c9dfdfc8e8e4370eec5dd0487931

      SHA256

      8378fc7883b543f1a7f3d766ab2366686b3f6ae2658f18a4599cfbd57fd37a83

      SHA512

      5ba0192e611cb038fb66be011670e2d57e42f903b0101fe2262ffca56f0adae841f0271495df7bc48402be5f1ba237c589483d1d22dd34cd621ee69c3337a185

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6e49f8a27c8c42dd689b5fa2615d7f24

      SHA1

      c1ac509e731231305a36169a5de1017741f55e7c

      SHA256

      7d29a469f0b25e6e87c78669fcd74216baac6b63f73cb1f939dcda36bb2c67a0

      SHA512

      813c7e5c4582315daca24207cded5a08973a3db9b95afbb37ebe4b94456e0d029cb1c221eb4da2b6cbf30dca544b78d0e3e63caa6b5f002021f5216e016a2a84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      54b42062073712c244ecfa67431a6b4e

      SHA1

      42f88c0d3f8155651082e7c3777100b46ff4b8db

      SHA256

      10bf54a8255d6be0c8f435049cb60fbe696cc39de39e99e526f689e5e6c27d8d

      SHA512

      1c0907b5f2911c9d322e5c2be8a5e9abf565926da3f05070988c04ace2cdd008ab21e94b6106cfb16637e5bf8da199e26792541548729a0f67d451eab56d4d2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4f31e194e465859d3573167f751524d3

      SHA1

      38bf89ab2a3238bcb4391cdb4611b3de73ee6852

      SHA256

      bde9a064994dd6e53abd7c422878ffefdc70b169d10e70427c770144efbf238b

      SHA512

      2c373e7ae52c21f77081d78dff70d21551455affc6f497c078daf9481b44d8a8c8485803fe144255bed70072bcd81a672243f13329ec510b8dcf4147ecabe54c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      34367898c49408f648edeea8fdaf3630

      SHA1

      9b07e4d152a1fba80bf46d5318d3176d6c4184d6

      SHA256

      58d575f73b544dceb33e2519da71200dfa20c3040397409758afc49e1a2ca5dd

      SHA512

      c0477af4018f62f3f7a93196c968b1791f9bbf459f6036f65b446ad0b122de4f80efea78b4b25aeafc8ca1ad33ed7a044264761840640c8f7da1efb638317c8f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bc869d2857dd664233d5cb4b66d67ca0

      SHA1

      a88d502ca6c7fd34df5e2a35e534945703857243

      SHA256

      c9a28afcc6f955ea5e02e564bb3383de48e9da2c745bcb278fe70affe0cfdeb8

      SHA512

      85b927e5a3c6177203970d09edbbb36db45acd417dcda1106602548f13464c4e4ed559eccd2d0ee94de7269ad4ff791d3b28792350692218c5f5fb2224716f46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2c9e6503747a5f9191c23c146d08cebd

      SHA1

      5810d298c2247d0bee3fee3ef07226cb6c82947f

      SHA256

      92e4be80d79040ad15b1de8f66c96a42a25bce055bd97a46adcebe9dd2732c0e

      SHA512

      a9b9996581cf97fd1172d0a163747afb937dc28226740909211aad3a7d86c046583be6a06b0549b50bf9976ebd34292f911a5522a60f92efd649b4ef6f0cf306

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      319a50589b01c5c5fcc497fdd876f91f

      SHA1

      aeae940edbaaa789e68b7798961cdfd28f9f1153

      SHA256

      d038182521120abf2e9243489658916540ea38ac76b8597996fb0a5fbad39c7e

      SHA512

      82264366a6af1cca1ee6fc15fbbcf777111160db1a10d60a8769ec2897a581b89d37c1ddf40baa6ddb84f077b5f85f6e943f64f10f13e8151e4aa1a348ababee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4f8d095abb6efadad7ec46d76f3f18bc

      SHA1

      097c37245fd97b1bd7d9656af35536fcdba5b62d

      SHA256

      d126044dc37134cc29b0e3e5fdda549098bf9800875c3991b1c72287966e9449

      SHA512

      567cd59480e94301dfa1f7da8554e1c46803253429171ff63fa8bd3c49c7af57d0ed24d4350adcaaafd6891c0b8fb916747182125ea9e2e73fbdc80d060c280e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cc5f6724c013b5cf9ba94e88f99368f4

      SHA1

      2b27219e7e93f8e5836420303bfd4b2f5ad4e1ce

      SHA256

      02c7cd2e0de7b45521445d54054a8de32f37eb53a7b071c78189f417cebbbd14

      SHA512

      3fbfb555554df3d87acaa54c05a04b34a19146c1fa47ddf4c3a00635e8f5540621da74f379a543f2aeac5d155826f7f95c518f3ad8d95f9ffc2210902b640b05

    • C:\Users\Admin\AppData\Local\Temp\CabBA3D.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarBBB7.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • memory/3060-2-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3060-5-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3060-4-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3060-3-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3060-8-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB