Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 14:59

General

  • Target

    776eb0471abe6776d3cdd50431138c8b.exe

  • Size

    2.8MB

  • MD5

    776eb0471abe6776d3cdd50431138c8b

  • SHA1

    070a4425aaa5b8b1f14bb7efd00e2aba1a9dd067

  • SHA256

    bd562dfe1eaa9187d3be6a99145d155067889a8861d2bf08d47bc2cde8ef3509

  • SHA512

    29daac9af34dd1c35329b4aab011c0fd50bc1f897614a4f9f5359f03513cc420e59dfea0e992e5c96e777cc4776216aeab15b49e1308f4daa0815cf198a3f3a9

  • SSDEEP

    49152:2OtopcW0bhYTX9LthopO/SvRFeHjon5aqsLCtJMo:2OtocXbYlDoSSHeM5asb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\776eb0471abe6776d3cdd50431138c8b.exe
    "C:\Users\Admin\AppData\Local\Temp\776eb0471abe6776d3cdd50431138c8b.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2201cd1b479c6c3e461c36cdcb838eda

    SHA1

    52e7fdbe4a2a359a550465a1a6ef1fd3d0428dc0

    SHA256

    9ec9930d908faf0b31dd987e81e3c2c9de6fe2f1d17342ad3869f513d5eb674a

    SHA512

    8f53d7ca04a03bff974bd4b0cdd382ceabd8c2557f8e75f8589dee3c6f34e5f34b961baf71caa487c27651579b598dccae628522b3ef28c237c5b9ad8b345a9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1688ca5392f95e42d0782c1ddd5eb76

    SHA1

    65f240a48065d1ae3ecf508341ab89464d7ac299

    SHA256

    25fe6038d34129388f8aef37cdc474f1f63c64d2dc4ad2e90f1bdb22b38d0cd2

    SHA512

    754ac6e9cb05ac3ed6bbd12bd910dcfb8b240124e0f1a3285132de96356a030327e0c9ac33490280dadbdfdc5a3abfabcb4b79ca934b3cbae35922badad71bed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    6d0634544609341bbecff114cc720ac2

    SHA1

    b212ff9064e118b43f7a15e048157dcec9ad5141

    SHA256

    b3ffdb6d0ebb21107a21cff2f365184d2c3ed020363fff26f091ab58ccc77df2

    SHA512

    78cebcab019311b3d468091deda5088cc56b58b7cebc07b8bafcb8b70c0f06d73b0733a65106a23aff28d160ae921b95bffa48f5cb2bda7e1022f715b5d509dd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\RGC3Z56N\www.baidu[1].xml

    Filesize

    113B

    MD5

    13f5ab22790c191065edd48e467b20c7

    SHA1

    da8a1468d1981d6a417e978ace850e65c6741e2b

    SHA256

    e8e6468c4ebe96b69e0c580c897b2c246b02aa8354060b4a3a7d50f9a2953b24

    SHA512

    2033604e090dde0d93b0c309ec84c7310b161984f49559e50f58098fab1c07706b6b3b114905d8cbab6c9bec8b0037b44807f448efae40035cc99fef2294519b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\RGC3Z56N\www.baidu[1].xml

    Filesize

    268B

    MD5

    5749f1d12c99499409373b509e585cac

    SHA1

    67cd9c12b255ef9e145bde1a6df2ec11c2c4fd15

    SHA256

    1c366844215b78b481032a2fc3fbee1f1e6f841817aa5d7ec35bba042950bc6e

    SHA512

    cfd3cc10842519b3afef1f84387667808163b06f7d305e5e2c709328ecc73ab2cd41bcb08232a11aab5b9240d13d432cb55808e803fd41fe5a7ed1859630d619

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\RGC3Z56N\www.baidu[1].xml

    Filesize

    342B

    MD5

    e3e91579300fb51663c027e864c10c53

    SHA1

    28891b211cb6cdc4f938427dba36bc8ffef5c0c0

    SHA256

    48399356537eba26e325f8418a4c83edaa277ee6f31ee8deaa258c13548c3a28

    SHA512

    7eda5f046bb55472fc6f1841643639ecc7b9303f6fc61998443a7a6740fcb7c42ca7527a5229e35a832c31b38f86d6a5ec003537abaf9fb2868b2ff0d00f85e1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\RGC3Z56N\www.baidu[1].xml

    Filesize

    18KB

    MD5

    e2176f5da228a06f94bc759b485378c7

    SHA1

    3d101c67587f182e2e88feb9f4ca81d5b3255646

    SHA256

    2f8c99c98376ad495dda6a1f0304ba83cf4c665ad70b5344b021fd12fc85e54e

    SHA512

    76ea4c132d9cd35d712eff9e0831f9ee86e946aca67fe9334fb8645527ea9cd2039770587a5fbea03e0efda0b79bed135487837b159db81b6527cecbbae9f263

  • C:\Users\Admin\AppData\Local\Temp\Tar4281.tmp

    Filesize

    99KB

    MD5

    fa178920e56586a7d673ef62ab4575c0

    SHA1

    cfd02c6a6b26f3407a1f9a91411f6f4467b1ee54

    SHA256

    777c3d087168f5f42bbd550047ecf607a3a375eb621d7e30a38e9c8803a861b9

    SHA512

    12b20ccc55780883d3b4c36366e335a8d07d9581a2684de3e1c05055b6fff4dd3e0124cc210e93f5f4306c37a163a92584047d5eb0ff5d71f04ee30c593a836f

  • memory/1748-167-0x0000000000400000-0x00000000006CC000-memory.dmp

    Filesize

    2.8MB

  • memory/1748-190-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1748-201-0x0000000008D50000-0x0000000008D70000-memory.dmp

    Filesize

    128KB

  • memory/1748-24-0x0000000000400000-0x00000000006CC000-memory.dmp

    Filesize

    2.8MB

  • memory/1748-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1748-261-0x0000000008D50000-0x0000000008D70000-memory.dmp

    Filesize

    128KB

  • memory/1748-288-0x0000000008D50000-0x0000000008D70000-memory.dmp

    Filesize

    128KB

  • memory/1748-287-0x0000000008D50000-0x0000000008D70000-memory.dmp

    Filesize

    128KB

  • memory/1748-304-0x0000000008D50000-0x0000000008D70000-memory.dmp

    Filesize

    128KB