Analysis

  • max time kernel
    118s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:04

General

  • Target

    1df0ff08c3ba072b9da60197a9de61ec.exe

  • Size

    156KB

  • MD5

    1df0ff08c3ba072b9da60197a9de61ec

  • SHA1

    e3579052fb41611c76349b338243428021ead4e7

  • SHA256

    bf2a4a8b4b42f3b8e522cb2cf5f67be2511ed70bdad058e8dcebca9ff34358fb

  • SHA512

    4237d0f140fb1f6afe32c46d886c4f5ff88c02d2e17863f78352c70415a71ff8e71be51ab0520b2d3ac192437a167fce90995d7fc84ba8dda324702a4a8ab5ca

  • SSDEEP

    3072:3ADpYxzSf2PUuISlG6s9CmITZwKvoo6ojY1+5dCx1b:3AyEesHVqZBDO4A1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1df0ff08c3ba072b9da60197a9de61ec.exe
    "C:\Users\Admin\AppData\Local\Temp\1df0ff08c3ba072b9da60197a9de61ec.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\1df0ff08c3ba072b9da60197a9de61ec.exe
      C:\Users\Admin\AppData\Local\Temp\1df0ff08c3ba072b9da60197a9de61ec.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Users\Admin\AppData\Roaming\Flrcrh.exe
        "C:\Users\Admin\AppData\Roaming\Flrcrh.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Users\Admin\AppData\Roaming\Flrcrh.exe
          C:\Users\Admin\AppData\Roaming\Flrcrh.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2656
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    8fa499dbbb584cc7266c9e998983a5f7

    SHA1

    dc47a2fb87bbfb3201e9490020ed8479e8de57a3

    SHA256

    60157c96fd8deeaec1c0db4ef69cc0682736c4388a2b0843979f5d3d1b100563

    SHA512

    8d519f8580842b4258d5cfbb4e4d7d96ff1fe339a015ab72fce011c661b3e3ac42b07a026f5c2c9d3bfb4abede3cdc575da73f13c35547a3bf1128631c7ee9f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5af8cbd56fa796d2c8e4f76b8b541b4c

    SHA1

    d2b02d99dc29609d70edeba4ca9f969e97c2723f

    SHA256

    c4345d9999424daa7181f4beed6972b3c63e83b2160881a9a0bff78f430140bf

    SHA512

    56eddc1a51835559cb3a0827b15cdc4be96e4913f5c1c50bbbf3cdd07dcdd8c1ab7b56a141b9f11656874c21c8acf33d750f95d9425e1dafa06d51c40e9a9455

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ecb68d8d41d1606f4c76ef7b89fcc997

    SHA1

    52c77aeb03f82fbc16d0a7c4f719c2674c4229fe

    SHA256

    2b56a64343cc788ff3144c65e3cc10d6bb5a514fc183f0811a5c990af73af22a

    SHA512

    67df9a95930c2e2849600d3f6fcb4ed3d0ee6bae2b4b0864773649c13300a3308352dd09bb576200a32f876039e69a730f1f3bf03ebf081dedf8d8a50c9ffd21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    365ac1698a2e06de48005cc53d2b0a28

    SHA1

    d36e0b03618b59b86ed539bac2b9e55e4bd9ba71

    SHA256

    84e38e715dbdfb0c1d6e3f873326ea8098432aed763d226b6abbc520befcd78e

    SHA512

    9887778829fba63bbc8acde4019be94d48231fcec1fa0a274116db237438c464e780d6a7fafb0e2c66d253587ef976b30d9b1f914b165941531671576691568f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2df9c77b4b04cb221b669974b0993e5

    SHA1

    7ac5f208b9def898cb6ab37f1b313332bd669b70

    SHA256

    a50fd5da1e270497395f7f3f943bfeb3da58988c182331aae4f7fa327833e46f

    SHA512

    26f18611cfb683bac0d9248d969727e680ac408dc1da6dc81eae7e8ff9c0d0b8def0166ea07ef73b3c7ff2f28e23092ee66b90ed7d3fbc25f98090e528e6893b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c6551eab114133bac56544e92d07ee9

    SHA1

    8af6c977d24d643fa90bb713e61c4b1cad66853a

    SHA256

    68e13a70e81b5080d3f2e5041e8f86829d2de4ebf9dfcdb9eb9a54d60a2658f1

    SHA512

    918d6c7317dc157a18f7a389d3a9bf16ee671db4b29305f2581d32dd209be2c98eccec22a28bbba037b308f9fed1fce3be069a6442250bbfc7dbac2ec1b344b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0444efb194fbffb62ce1a557767c41c4

    SHA1

    e7510bfe31c462aa2d9456a409ef0935675225df

    SHA256

    2f5670b13f1322250b41124fd34ec9571629fc8c7551474f990fcf438757611e

    SHA512

    61996234b4340e05502be54ceaf8368936faf0eec38c5045450747035053c18589ee55ded7b67bc02492d6e39b090f1beb2b384aac894b4524db7e6ab7b27073

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b43c176ee6f2a59e60482145adfd03f

    SHA1

    94f49063b578fe7023420700fe16f8879f8a5850

    SHA256

    496339cd0b19d953a8754f1fc7156b5caa8e4857e9892e7b4726ff35cc828d2f

    SHA512

    f25c20f2d029409a4840b82f2bcec6e931e0fb4ece5d72b48068f12cb149b41ddce93df684a883955aa81f289d5793d4de9b253a1ce3b47d6541a3129f9e1fb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28230b6c66e42376f0e7d6c9867d1068

    SHA1

    608546620de2637d68600de184032ec8bb4e4c1f

    SHA256

    410e2bac43da34049e5e419cb81106b114335c021283c0b9fc94faeb4d857562

    SHA512

    42e53d0ffa23a0236fdd82dd26d716474f2062eaa12c3ba35c480474f2fb430805fc34004b75d0fdb240d175b614153ea64d5ede4e0212faa38c187797f626dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc350d69fd8261d1ba53402b2ce4ab22

    SHA1

    5d9c4be2cd5e075be73cc2d4db8e938ea18259b7

    SHA256

    923b04b1673398afea1e4d94dac19fc23cf853b5f3787d8cc3d1b086fd26d063

    SHA512

    2867606981ef4b257286d34d3ad4c813ee8062740406ed1719e32c662451e86823f8ab308135e9bfcb8ef073309ce0af8fa948858437068372c22db1696dfe22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f47b55cb0201eaf9641e06df42ed0f8

    SHA1

    5fc09365bb3ed7aa2fdaf9182c93bf6b7a377454

    SHA256

    471363b476cf42404a992672a1b1bc8c1d815c11c304b8d78755f85b20db3c6e

    SHA512

    6df2c26dfefe3caa8ca25fbbf9697b9be07e75b4968b0ee3b2d41074a0339793b9f50d66e45e2034f0be9113f3d2a48a01eb2d3d89ac7a258263bfda7db29948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3eed4f17bfc6abedf6f1b60a886d0792

    SHA1

    cd932765ea671e3fddbbb915e371de05fb07092f

    SHA256

    bb07749af69f9329962f907a9c888c7755927c1fb06728af9aea4e4a44814158

    SHA512

    94cf9c94a78424794a0962545786e6b7db85c7d98ceabb5a5342068cbdcc635921e30c915c796b2092ce56bcc2da566d3a08385bc3b92757f1dab43ae3a0d7fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    98708220fb8931b642472ee57551c2b7

    SHA1

    ec425ed88a289a6562ea37a91a00549004799be4

    SHA256

    6481aae3f851fdc20219bac86eef26e10ea8ad3b8b21f18c40638a308532e59b

    SHA512

    6c66bf8e6d984c50745b911a52878d1f08c2852a4f0a042fade0c2e08f984fa2e28852ac09d514f174d7dca4ae4fd77e8fabbd7d2dcd499f10f3aebc3d30ac3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar412B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Roaming\Flrcrh.exe

    Filesize

    156KB

    MD5

    1df0ff08c3ba072b9da60197a9de61ec

    SHA1

    e3579052fb41611c76349b338243428021ead4e7

    SHA256

    bf2a4a8b4b42f3b8e522cb2cf5f67be2511ed70bdad058e8dcebca9ff34358fb

    SHA512

    4237d0f140fb1f6afe32c46d886c4f5ff88c02d2e17863f78352c70415a71ff8e71be51ab0520b2d3ac192437a167fce90995d7fc84ba8dda324702a4a8ab5ca

  • memory/1468-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1468-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1468-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1468-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB