Analysis

  • max time kernel
    141s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 04:39

General

  • Target

    Boleto_Cobranca_Setembro_2010.exe

  • Size

    325KB

  • MD5

    9c4e702bbb8a5812d288fda280d25dbe

  • SHA1

    4569461f4046078d88ed112f6409170ea7059bd0

  • SHA256

    4e39d45d2ddef4550bc2e03b853b5f4920f5913cfd7916f9bc760248f5af1f7e

  • SHA512

    13850454d0f94ce841004c21e8f1616e27af9a942f879d9ab302a125bd67efc7425a7ecb2b8b613a69f4c10b6962028aa54d34107d782546dbe9da80c746bf99

  • SSDEEP

    6144:44DA5NKABBcr+Jk7gJaBHuhPCpQbvnYFb4wge02Q9j8n9KdMs/lb68:XDA5MG2akEJMHu0pQbvnE0M02Whdfg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Boleto_Cobranca_Setembro_2010.exe
    "C:\Users\Admin\AppData\Local\Temp\Boleto_Cobranca_Setembro_2010.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67d176029fa0e908c2e9f766c8a6c086

    SHA1

    4cd8aa30b0e172f0461800f4d43eb37cff8dae29

    SHA256

    b4cb53630b41d3baa684b71a222b7d92b2c71ef6b5c3b1a98a2b967681c12681

    SHA512

    8c0c50e0acd21395292089f60d93e045cb27fef91b0b9b8f97d429b73cb3a58a300c23f612ab5c3d94561679d81a019cd05bb74e2fabcbfa920870187c9ce498

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7be5bf449b397aafdc4a8761157ca0d

    SHA1

    43a1fe4b542ce87cf8a3d638b994930c5d3d196d

    SHA256

    60512f547f262b9a6ed24fb664993657491cd86481c046f69d3dbbccaa248319

    SHA512

    2b16703a972cac8a66cf63bdbba2a240b18474ac2930297af5cbd5f8a23d4bf3fd13acee85683b34848b52f553ed0ddc95658432138b360c8028775fec8ce166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6efa50733e5a39a5fcf15bbde08239a

    SHA1

    6014fba534459ec63a9b10eb6b788ad63ca21ff5

    SHA256

    258081c727b3bab55ee4b333bf61726188b5e827dd8b9ca7d525832df14eb8b9

    SHA512

    c222903ce68973aff4af54051254f8c4d1a0d8f69c01a5350633a3e7bb82b858ebcfc8e8856817abd60322a9fa626f0f2dfce3875dbb637848dfbaaf141a98b2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\index[1].css

    Filesize

    8KB

    MD5

    b186dd2edf2769f4c0459a79fb7e634e

    SHA1

    17c4b6ef9e7f95334023898e7a12d104c97efb3f

    SHA256

    77d9b9a332449a4865b3c38afbf1c61cc79ccfc97581dc14ee14ec3acf78d26d

    SHA512

    ea7dd338141a3568552836c32b2eff0c6f071dae9fceb9ff444a46111b85a346c0da5adb8e87bbe5bb492ae90c0e8d83dead63131d7cda9ab8d409c782adf457

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\jquery-1.4.4.min[2].js

    Filesize

    76KB

    MD5

    73a9c334c5ca71d70d092b42064f6476

    SHA1

    b75990598ee8d3895448ed9d08726af63109f842

    SHA256

    517364f2d45162fb5037437b5b6cb953d00d9b2b3b79ba87d9fe57ea6ee6070c

    SHA512

    b5c7b19a6d0f05cfa33a7f54c1b8075698d922578429789fd4c0a4ce035f563857283c7062e9ab08ec61679b486971f3d83a44135e217e3167e49fada5a1520a

  • C:\Users\Admin\AppData\Local\Temp\CabADDE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB292.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2356-0-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2356-1-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2356-163-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2356-193-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB