Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 20:44

General

  • Target

    0384663b4383114d9999466e3de32b4c.exe

  • Size

    13KB

  • MD5

    0384663b4383114d9999466e3de32b4c

  • SHA1

    4782843c4ab093c6037ce3ed0b3b035b09d693a7

  • SHA256

    f2009dec4af18f74e45d58a827a25a84a983b76ce3ca8b2a3e4a0f9b971a4ffa

  • SHA512

    481023d5fd8a31f4d9027375aaeb0a43a38069a2b0fbb0468153f1382b1d093d7d091d9998371ad6a4ebc4b1e4c73c03b21817e1c51b3d3078f6af6dfcb3a52f

  • SSDEEP

    192:LvOeihIaivohlwv7E64GL/VwJknr9ZCspE+TMwrRmK+vhOrF:5aivB7Nd/VwleM4mk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0384663b4383114d9999466e3de32b4c.exe
    "C:\Users\Admin\AppData\Local\Temp\0384663b4383114d9999466e3de32b4c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=433
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    d0e96502109ae31626b903f7f03a758a

    SHA1

    a2723df35a23c54a760c880daa10c1655b6f2431

    SHA256

    5f32c3a10e57fd5700a1d196f420927c06c26b69afc33e3c301cd6490e0c2f9b

    SHA512

    be11f06659f405181a8eeeb2a1809f6fba1d361d946466432f3df6fd2979bd960d56fdcbe563e2300d3ca50ae7da0446187f5eb640b7f3a7c547d874ec30d555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    336fa56834f2b46417d4e0fee994128e

    SHA1

    d04c7c10268b19190c032885c2408d8e89b18b2a

    SHA256

    b6ce986bebc65f29710fae882410a51406089cfd9cfddde40640aaef4e946690

    SHA512

    ef56b42fc47a839f0d6eba91cc8eccf203f4a2d6473d1f14bf3928828c7240bc12e2be4bcfe75c845e8ca8b5f1aa635a8e2c84e0613248f612144c84e35b0f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bfad3388fab4e474683af1c21fc40842

    SHA1

    581a7b303c9ef95fb09a494d1b5bcd2d9807316e

    SHA256

    dc728a7e08445fef520040e20335b9c147d976cbcb4bbd1da6e9297386d645df

    SHA512

    050e4e1234c71288b8a4cbc119cd405dca7f53ae93bbe06287390697b6fb308704225ab10b31ec65b8e363cb45205779beb9771c35e202170dca3dcd88545c74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27c37ee656391193915eff0c48da9d7e

    SHA1

    368f3c9b412402eb5234287ae13892ba95e50afb

    SHA256

    dd65ef6fc50ec77b2be93d9c19a55e98f461eae6ebfe2f34e0b35ae500c68cff

    SHA512

    000a6f44308165ac48d16e34a79154e378251211c59a9463be6b592e15a3e7f94434087ab2651ab9c904f5001928e54f1d8b105ae111bf83d93b25dc3d75bf6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    124003feca31245aaaed71ea51b0a647

    SHA1

    b77ec30a5b485b872019256c3b594aedee12d157

    SHA256

    912f1554627476c47024cf63ad1f996352a963ff5b39ba423b03623ce03f48f6

    SHA512

    80837b683deacf44fcd0fd275f00dab54b26362b701e29dd3962817896e91b229a7c6920db69afcc59b9bf24fe71872027959625284e3d60efa01178e30abae9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a10fb7c11787bf7290a32d964464fe20

    SHA1

    69faf8af5680cd0db7d9f4ecf0bb389d42b73be1

    SHA256

    155e57a7f778da2fb6380e6c0ac6a89107789d3c5df99d26877498b64fc267cb

    SHA512

    3ba43abc06fa4809a5038443a52a85e1fca66a584ebbe4967527b6d549037b844aad8d2394f7ab16f69eb259ba79e9c56e1518bd13d5af9396207a6719ec602b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a88128b6b3d6f0ddc542b9efdd5e5b06

    SHA1

    4c0f73a52d2e14dd8bf1bb81f60b70a92e8cc7b6

    SHA256

    2acbccabc67495f7e3e122264eb1c939fe19060e10d177afdff77329329f3954

    SHA512

    1fd27741a63b1220e35bbf1f1f068d0be68ada85de865163362792622e7f322d9866b2689f633cb86813c0b356b2218da0a616650d6a33842b42692f4544a1dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9884ac155e69b3e22a6ddf24312dee70

    SHA1

    8679b039e67b529f1522eefff5ed8c973cf17277

    SHA256

    80545c60c0c22ae241ef71f301eda964e08148ce0909a87f00c29351a197516a

    SHA512

    12e25b04df0766c1001b5c1a9eedca4370954be1766d02c044d0b4513d9cd60d924f6385b9a0aded898cf369f7ab7195189465ebff01bdd6beb7263c81a1dabc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a169c021662614a9e9fcd2a919041a2

    SHA1

    165c1a2ca6f4546c0bd338a6eb566c93a36fa11a

    SHA256

    9025d8bf7f8d2394dfbea8242904c694794bce4b2ef9a93b5d730118a093e85f

    SHA512

    536a5e9311be6a11e483fa1640ede2844d48e09bb1d022ea0098dfcddb256aeac8d014f23a67364a2f169f1f896644329e94a9df65e40ea04eb9679bd9c16d8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02ebe9170f8746d1ca034ce03288c16a

    SHA1

    93d84217d8f73e0ba02bdbf999de8a0bb09291c9

    SHA256

    dec6cafe70d4888ef81ee50f0f4771f33464b9f54ab15fb082bb662902d60ca8

    SHA512

    381480f6cf581e9958d02ef1b46db82ca0fcd0d0927c860e577fd4b671d09857dbcfc6af2fb025426d9fbcd7928dc1bfc997579b002dca34e1d97cb8680f9c7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    346ca9def0c8efe6f362afe41c814792

    SHA1

    9bdb8d1b647f4a8d14647bc6b1c4f2256c717d91

    SHA256

    310b8eb548225161d7478826b5db743b94e45440e590aae8bf2f2ed08529deb4

    SHA512

    868613be82404fa2c7ee5a95d0f712276d94f7db7f30b3b079f6620164b82390707c388e2e72007cc743094437a4391e47e2198880e004c79ba63253e33f87d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64c993e7c13ff1a10ca2687b80d9ddf9

    SHA1

    3c631d8fbddce30f1cc5a095af9bc7438f0b8b32

    SHA256

    734a2efe79c4806e241d91e7bae770b3e73394e28029d73f8f6dc69cba5cfd20

    SHA512

    d49596de0f49a9d771e355cbf185d9d973907603b88101e6c3b6842d6874e633dccb3a3801e3bb5f3128813ba6828db0f626a69a76ba5b3c73dbae5a10fb28f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    06a81e973713ebac5b1c2b9659cf22cc

    SHA1

    d195d80349041588fad273303ddb40e168a20a50

    SHA256

    d72e49d86b075d5793678edfad0f7cef68e27bff0869f60d6d7d898d59a7ac98

    SHA512

    c1c199e48b648fba02b37c459f146e716ede81e55dc203b1f91d4f59ed34b21a911d9bc40a718dd439eb0fd0c74cddbd7e2ccd3b85d16364bdca09e97564947e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar26A9.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2284-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2284-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB