Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 21:50

General

  • Target

    49dbdf05fd82a54399d931d643877e17.exe

  • Size

    108KB

  • MD5

    49dbdf05fd82a54399d931d643877e17

  • SHA1

    608049d3e21a5dcfdbbe6d0699e72e08fdbdc401

  • SHA256

    1597d4a9035e4c641ea6b71f6dcafd8382faeda7d640b5c7986d62084b2031e4

  • SHA512

    7929f808f99664789b1e8c405ba01d69444f731a4fa99e7f9603b3a37a565dcfee95a3105efcc6ba2836612e1caaa2122b290ee7db6cb2ba02db11ed976a1e29

  • SSDEEP

    3072:6X7DItrfaocyTgfsqQOlJUzboBZV9WO+Nshu5I8fF:6saocyLCUHoos0zfF

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49dbdf05fd82a54399d931d643877e17.exe
    "C:\Users\Admin\AppData\Local\Temp\49dbdf05fd82a54399d931d643877e17.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://blogbb.ru/ger/1400183376_spin-tires.torrent
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    decd999790ab0270c812537a108307ff

    SHA1

    c5af646188e5191c4d1887f0d8da5c8dbefe7409

    SHA256

    0a88fbc2a2d6c660f7548f31445aa7e876704cb54efa463cb4a13f2da8f64f3a

    SHA512

    285ac4942ec30f87ea9b749eacc664c9b356acedd53498db013b13ea82492f1f5fb0ec8207efa4e32bb8f83f52255eb95e06330a72228786fe1697826d8d3d4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0091a5f7017803677b6f0c08fed6c34

    SHA1

    874d5be2c251354cba074f41e26054f43f1ede43

    SHA256

    bfdfc4bff107c6dbb8a4427ece903949ac7485638c3546e7e073daf6256c3daf

    SHA512

    819493f84d64743ff3baf3c2edf2ed15a718ba5dd9eb565f52120d3f54818ae61a0ebd8227e279fb1d3a5685053fd75c8caca04596bf9f70593f9af6812693b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec032fad722b6cdda962cd2fa510f007

    SHA1

    d62612114e0c725fb8c29412759ada646d199701

    SHA256

    e8d770a134de9c1f49f17ec9230ac12715fa9b6e7dc2e875462d834614298ffb

    SHA512

    a98f4e4091792dab855925fe8cfe616333a64332e202e691b1508b76fbe4e44209c335e7531e98887736e824567a41a97942f360fed6eb8959426ba035a44b98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b88286fac19e3bdc2cdaf5a627afd370

    SHA1

    671ff91aeb5f272f0217b7e9325a8728dc6824ae

    SHA256

    4209d1897e88eb4fe5cb6a4bbb89d2206a504d270068d7af6501e46c98a97701

    SHA512

    2e1a88cdab22844e9bfe50b2861b49d1fb0d390020089271b2eb29f99962dc5e56450adc43c48280766237e099dfee01836bb180b50e017b6bcf7f77d2236835

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0092a48745e50d3037aa24174f9898b

    SHA1

    ac03dc34a2208b3e03f346b5fe7da9b0b0534f09

    SHA256

    1b4301c8e47b0393cb0be08c2f8856b6dacc971e9a3ca0642ecd6c1ec4e39465

    SHA512

    c941fb3f71c115a050d976cd4829645f850e50ee920042b491fa2f6a17d53ff9cbbc79a1eea52a075f540d0f4ae4774d19e657b1c21126df29fc51a38d59f414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de571238e9969d5d2724cd66857db77f

    SHA1

    750e1c6017d0a3e3318a764b1d97a28ff263878e

    SHA256

    2003974ea74c768a63f3623fd70e71eaef1e0e67b9cdd5fa5bed1557431a8c83

    SHA512

    e5fcfe6c880e36066b7d960cc7909242afeac8742c9f92ff983f49de43c2c5b03026ca40f7d78ee29b48ff4cbcf85cace6c1869c83741c465a43cefe22eb60a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afd285ddb5ccc14ef29208cc0f0b27c8

    SHA1

    e25c29454344d8a4e03a5662af7d21d175472982

    SHA256

    2f48f65c9f5e74dfce52866a14c7f097efee72bea5752f5680f7237fbe01eb5e

    SHA512

    d92dc029d3ab772372688b390f2ca5bf9c8036d7f5861cdc7be4b5431da1eeff083f8484266aba484bef45a365c1a8ba044cb93ee2c635e46a652ace55405290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe30a56eabaa882d5c626820d8ab70d7

    SHA1

    c5ae358f0eb2affe7610d2f32f2a49da5acdfddd

    SHA256

    f24dc156862985daae3addfaddce6c2bf40945758aae40fe8b54651ca556b69b

    SHA512

    eb0f7f211579e0ab659e2c304504ad3a66ec09a78c9454e48ef5b811b2edee10b99844f8e48e1a03c85f6387f4dd1def3f2574bc69c11391581e51a02b7be05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7d1007516d00d550ef7e3c412c6bdc7

    SHA1

    72f7bfd24e63dceb80c38d39eb5eef0134fb8f35

    SHA256

    a7c43757927241dd569a5881e17a43b60cba5b9d3b28dd4c9555e9d2810d161b

    SHA512

    5f765f263778f708295789c49c51ef9ad26333e41966a03a3ba30c4857c1a52d465c504cd634b2eea799d27bfbc10cb3be7b09972481e06ea2d3326daff6024b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aadc9e4306606e3c8dd0e00921b6faf0

    SHA1

    cf0db32432e866b08c24dbfa79c6329a63028889

    SHA256

    2d85d528442b9cfde96fec623b88f814c4f7a24b07bcb0b00ff68f00ca606aac

    SHA512

    20326c1cf45d667424ed23bd59ef0db5089534aa006738bacdfe63a4920c7c72385884360f448461d4dd91f3113ee31a1363d8bf265fcf626eaf68eda78d6a20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca7475045cffb8f496a507eddb268949

    SHA1

    9865094616366f25656eb8396acb2ca332714155

    SHA256

    4310f8b9572bc7a3e3190a2092c80d79b18e80ae080934b74deb0227c4e00bfd

    SHA512

    a97069a554cc3022b4c8b39bf53e0cdc5cf53e88b7fdb520391281f877e69e071326612b254f31380e450e0af88a8f737a69315cddc1afdec8e1623c748ea1db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c282a8f3a7239bac569b1b78234f104

    SHA1

    53d89b7a41b3c533ef56571690e71f1027ff87f5

    SHA256

    8a657721012055c0246147aef885aa485a580efe2c5b6d4259faf37e91184cfb

    SHA512

    180759c84671cad4558fa19f90eb678af8bc2f6de2a3e776039527d0e22446e8e181a57538304bc94545618823ce8b48793481866d4ff104563c60ed81f09ec3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78979898711c0c1f737e40343647ba04

    SHA1

    054c0e4d97a1ec84eb5ee92341000430935817db

    SHA256

    1b4a6c619e2060e56866f45bd08a019a8b777e9065ce28b22aec89947595b1f2

    SHA512

    922350f2c4f00364201293bd659f4be36b3a9fee107153f28d2796013ef417f578ac1758b66c5cc28108a2883f2847c1548f09f018b590564a516612253ec54b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83a0a068ee5c68a12d3eb11c3817d866

    SHA1

    eebbec1418ac785995e9f366fb7ab4290220c2e6

    SHA256

    034abd99b0539f43d09e644bfc40700df0b88294f81bd1d892be2f28bdb956d4

    SHA512

    1f2c4c1aa045cb9e5227d46ed91587fff5938137ee032ce2224e78ee3a106d8f857994407f226dc629377ead32c22533089849dcc48aae6f740e4861e779c8bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    a6ecc65a2d09cc71244d0205ed555db2

    SHA1

    85e28b96b6e02e481db1c8c68654b3222b4d2993

    SHA256

    295a02f0781e5c619878bc0da1059abd439b1812d0d1c6a2e67e90827e59a2be

    SHA512

    506032d84fb316f266e3fe745e373e402772a3b4dec48a78f4df0dabd67c28d977423eaadd01e9d962ef4c31704e4a7a293ce6a05b80069cfdbf96534e66fd01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar4753.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\nstD1D.tmp\System.dll

    Filesize

    23KB

    MD5

    125aebb055446fb52aa5956cf99e8a9a

    SHA1

    6b58fd08a8ff2763219cc6b0dcdb875f9970f850

    SHA256

    2e1b11ee20e5061ea86dc6b01e3efc659e887540afcab7317cdfd6a8eff87ec3

    SHA512

    5f85e48bd3ae2fd2be0595b93cbf74674e0281210688dcc73691178b295a702e8d43898afb6e5d8b7e82de98b4ee28194c9838ddf8279cde85f7fe48d34dc8b7

  • \Users\Admin\AppData\Local\Temp\nstD1D.tmp\nsDialogs.dll

    Filesize

    11KB

    MD5

    790d227d847f7571c8d58a79057a469e

    SHA1

    75c347b1441383c61166b615dfd6e7e65b04629f

    SHA256

    37e99ab9db0045870e31db147438cf0c69b6fcdec4f3737a9743c447cbc0c3c0

    SHA512

    5821605bfb3e57ddfcc1a74829968814aae92b13cb713ef3628913d9112d493117e8aa9cc437770facdcd2d4bd1e53a271d491e6b4d3e4cff53bd027f4b07f4c

  • memory/3020-12-0x000000006E940000-0x000000006E94A000-memory.dmp

    Filesize

    40KB

  • memory/3020-11-0x000000006E3C0000-0x000000006E3CD000-memory.dmp

    Filesize

    52KB

  • memory/3020-10-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB