Analysis

  • max time kernel
    94s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 03:18

General

  • Target

    4faefa65d24139866e42290969447520.exe

  • Size

    29KB

  • MD5

    4faefa65d24139866e42290969447520

  • SHA1

    b0491bf1a75063c3678e48375bdaed26c8e17764

  • SHA256

    77fedee466bdcb59bf1446940af2eab691afc7afde18f1c383c6454265de4166

  • SHA512

    c70a306bab4e0b836811ceae146961dec426c5cdbcb3214c4de289c6a48c148efc2247cd28ad7c5a995c1175339d6b68ecd78e321ce33b6483effc1135c9f672

  • SSDEEP

    768:XKj2jM3E2DN0bbgvHwMQ2bj6XvHlEAZITdf5:XKj2jMU2hggFQ2wHmZJf5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4faefa65d24139866e42290969447520.exe
    "C:\Users\Admin\AppData\Local\Temp\4faefa65d24139866e42290969447520.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" www.oboticario.com.br
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3816
  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.oboticario.com.br
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4700 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3240

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\5PR5T0SV\www.boticario.com[1].xml

          Filesize

          1KB

          MD5

          06cb9ee21e0133645b1d97bd3cdf0ffe

          SHA1

          40a38eb277a55e0f99ae9867bbd06ffe0a99a4d8

          SHA256

          23d8cbe84817efcdf4e9bbb511582e24046d506240469b093aeef4b4ea2dc7ef

          SHA512

          da58e1ba0f4c3db21076a3557359404aee39c8237641c6de78cb559d2d69f42f0ec6552bd71fa6aa425566c3b3143432ccc02ee89bfc38ef0139687440e720fc

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\5PR5T0SV\www.boticario.com[1].xml

          Filesize

          1KB

          MD5

          d4ef97508bf5c670e2a2c755e2c99105

          SHA1

          08129025bffd9ca04dae9a86c115ebccd839f5f4

          SHA256

          b50164709a9e3b348190f7b5c248ecf61c43224277590157a4b1add7bde5ab83

          SHA512

          e1f6f9587df0e2e058171a4c3179c6e3f688ba94bf2c2a33c677e3b469fb460285ac698a0c957aa5efdc3a9ef258d8227db3b222ab0c48d9538096f4656b91ee

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\5PR5T0SV\www.boticario.com[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC321.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\flj0k7l\imagestore.dat

          Filesize

          497B

          MD5

          49b1ea3f5db9bfc98a1a89d313999af5

          SHA1

          ea7b99ea9216a7ab7d0fbac4354e5e7b61494f1e

          SHA256

          1b898900f9a0e463c39da05a856396d8e57dd3f09d0acd818bff027ae0ddeb69

          SHA512

          cc3d7e608312c3909df1c3c611538be6be05fc9d14151c6df2b931ded0aa891132ce27d4bfe3707394afcd351b4b70c0aea6080698fc5fec443486216356405e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\icon[1].png

          Filesize

          155B

          MD5

          2698dd4d785648dc4a794295aa044b3d

          SHA1

          7be62220fe404bdd887bbaac3b2a8ea458985733

          SHA256

          ba59a8163405f9030bdbc28877d638b5f13ada0c34b4ff6820d647aefde6080d

          SHA512

          9d8c08ac71a18f2ca904ae0af1f274f350c83208ef417d3d57f65a7a1add1e7b1911e522fcaccc2242d75d0c2bb7416c36164fef496c881688949ff39e8bbdba

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\10186538[1].json

          Filesize

          2B

          MD5

          99914b932bd37a50b983c5e7c90ae93b

          SHA1

          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

          SHA256

          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

          SHA512

          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

        • memory/3124-1-0x00000000001C0000-0x0000000000200000-memory.dmp

          Filesize

          256KB

        • memory/3124-81-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/3124-0-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/3124-311-0x00000000001C0000-0x0000000000200000-memory.dmp

          Filesize

          256KB

        • memory/3124-312-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/3124-2-0x00000000021A0000-0x00000000021A1000-memory.dmp

          Filesize

          4KB