Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 06:29

General

  • Target

    5a8634b706c802467361854c968dd703.exe

  • Size

    196KB

  • MD5

    5a8634b706c802467361854c968dd703

  • SHA1

    24697c6e63e68f97da1de9c6dc955112825e0f4e

  • SHA256

    f798445364c29f495dae9bca2fc2d9a5594ebd80d34dec86675e8f184838637c

  • SHA512

    c00eb4b99bbc86ebed580a2333a31e7ddce9a17b30e22061fabf4e79778c64e8d63396620dd09d8a8346827fcc172e7a92e34b5b143e4e7f5c2d85d5518e6221

  • SSDEEP

    3072:ofi7UDetEwxjpOWVP8C2s4weorsBmZctlTkMdAtMw:oo8Wky8C2s69oi3bWtMw

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe
    "C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe
      "C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8b7a89df243a4fc4883758bf70ef941

    SHA1

    73f864556257dcfeacf3c2b74e0913650ab3627c

    SHA256

    8e5c6e90543fccb72ea6730986f3f11b2295371dd2532ed49508a62e705c101f

    SHA512

    e8c9eef6bd9e5a245d49f757c7e17cc4c061e80544bb453d2dc789136314436432f85ba342cd53034d19b24a2fb0ab33fdb5ad4ce95364bdcf6dfa674fbf9779

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b921e4413e8cf9d62174365c9a9e2c7b

    SHA1

    0d6ba18bf328c8cd7657d641b5e2eb38b5ead82f

    SHA256

    0634320531c81ee23d6856cd185fb72765771049d1cba6c1361fb3aea036f865

    SHA512

    e7105b77aa343b8e76074f21c05b4d427b6010341a4e2a88fae855a1e41245a7593d093778bd080f7ec3d4282e63018100d34b980e1e9eeac9588d80939ac22b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bac7de976a1f3d112293b4b0ae09c728

    SHA1

    cd10bfe172552d1afab285215b0ebee88d7c4426

    SHA256

    54bf55506562bff9352aa8e3c129eadfd07fc7ac39f22c6720831144d3956489

    SHA512

    587cd068e10af77f6932152437e3358bc2fdf51ca17dcb12933782c2455619ad3aa11dcd83f7033e441eb914ba3874c89678090a0d5e010cbf2760a833c61232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    788d49f003d7760b73db16eec23c31ac

    SHA1

    ea41bbb6d174fa87aa5a637e565111b6deb2dc7b

    SHA256

    c62a52637f583d958cf4555f0c8fd92df1b4e1f1e50f03f283311a921ecb3515

    SHA512

    1c65548d0c0283f367647b1561ac7a9c42d13e94b511029a41248fcc5eede5c3a3da7136af0bfb54dab93b25a10ac1fc40cadc921027c823602a4f846efee765

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a3ee4c1115fe2b8a31fba41e1a4bf4b

    SHA1

    521dd642e6aee897a483134f4e9487f963c59877

    SHA256

    f36292c4d0a5b595cd9405ce2042e2fa743114d2da851d50da43ad7034210c5c

    SHA512

    7de95424fe2a8790c6f9d1821c474987a02b9370b96b0e4c4df9c1fc0f83c2c381ad06ce3a9e25145cfe65e1a2fd86b0cdffae1b5d3ce7ceb24e57086002bfda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b06803d3b291c9a2aaf8d59fdce1202

    SHA1

    7d8ec260ae509c8d41782fb93dfcf3a8b799ee72

    SHA256

    c0e4d0928aec64b0949d9178e9381a63546ad8e379453f63bd7a55d2eed080c0

    SHA512

    9d80f7219f3bf1bd5f94658ca0e685909e42c353bfbbdf0cfa9ae1c944c00e272b79342308c49436f9764f43b50c49382a48753365210fffaf5a6ca67c8fe491

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b896837f64732cc4d8aabf0759eb19a

    SHA1

    2394e9397528b28d8032e2ae3c711e976d877581

    SHA256

    0e5f4bca1367aeb3a0c1a63b9356a510f1a1a5cda1d84c4b9a965868e5ddad0c

    SHA512

    ef8ff85cfa9939c2dc5c9ad1e1f6ff5365c73aab336d28f03fb944e3a2c19199ee1a700ad0b1b27f6221648736105e4e55e5b3c7568200a5ceb5a4f5d6e9578f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae8f1f7594d17917353a1eaf9f590213

    SHA1

    9528b6e3e23e204036cedab8a979f0a88561f78b

    SHA256

    003b69255c3e9f2a2ae17fac51079fa57dd33a41059c713d20ff699b1879aa24

    SHA512

    d4e27bf3a3bc269ed409c4d66143f54cef89b95586433f9d43c58874edf6a148983a1c28cac8931ea831a5a061dcbc0e0b75aca1e8afaeee6dcdcb1f4878bc12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c8791f33e91b539ed535c306cf8ab5b

    SHA1

    9b856544762363002bbcb4fb21ac89329b3e6207

    SHA256

    12be8cf8260e96d09578b47a698e5b64247f7feb56ec94ae2302664a538e378a

    SHA512

    a55af105154fc006937d9d3443159021661d7d3d076ee9b463897350a0efb0d8fe2b9730aecf306e01d290678137fac2069a3880775b39a8d2e438f5a6ec3e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c8768f37dfad1d1b7126daa40d5c5a5

    SHA1

    03a7a422554b98b2dcae43f617ece1a702f1c3da

    SHA256

    03d1c4256f2a3feec30e8e9b9fff68bc61577879c381a12b1b77d518dae17696

    SHA512

    0340461726b0197a61139c9e8265fb76ae77d514a29ba2c1932d66a01d96fbf9adc45b41247cc8080b8d62fd7512a193650442d5a84132cfdcb5d8fd52d9763f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5191beb916dd41ef8255e0acb971bff

    SHA1

    7be6abc2fc7c00590ad59c33c7574c30db3efa72

    SHA256

    8d8b5e453c2df095ba9ba4def61beb1c38ae645d0ef463588dfbcfd89da65f86

    SHA512

    833004e667f18c796f85e19423708e1c208df7c155dcd36f1cf5c3e440e063ec8eeaed9dce8e090258b8c8761de5aa1eb1a70929d78fb9c5462fc441760a4410

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5779e0b5831b2610c51495f9ca70456d

    SHA1

    8b10f33db358a72b357ff9b60235ac8481f23c36

    SHA256

    9da318d85b6c3edbbc137f058d381b9a34c092fc4cde2a58d9553e641a6044d5

    SHA512

    0b735d6ce1966546a6029e93501b61593bb8c61dfd4210de82ef2968073e03c193c1a1d74768afd037fc3ff797af804677fb2707aee5bc36fc474ebb15f9275f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98aed59cf659790017f0d2f30b65659c

    SHA1

    e2a54672fc6768f813259bda1a0e260c4ec33073

    SHA256

    655f67273614bc159f0c46756bf1706a09b8a03cc06f666e44f7b37bc17025b4

    SHA512

    6ec1b95c76078ba1e5a19431cd6ae2ac673faa68e0de174b07a728866b0c3a52b3c33d277a30cbd705e8fcff82645dd39112bb0c22588d0dede65588e32accfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ade6f25e220d8cc84bb122dc413ac41

    SHA1

    f19f3a897cdda971f07885b8c4ccc774712cfffc

    SHA256

    f9cf6bd0451481ca0afebe2de80c9294034881099e65c40b1ba6604ec6c74f4f

    SHA512

    956b0f6b97f64381dbd2e2ac179d0b144c01ca9967aefb6530017185417262c56135ea6058d9ef94c7022cf6dd1aa19c29d73b826ce84c941965d26088d3f2db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    764dbdb88a62981e4f6d821981a1e23b

    SHA1

    5db344941e69b651d05a25d0ece485b939a479d5

    SHA256

    174acd80fe77e3fa509c32d569af30f8168d6219a7e37172dc035fa8cecdd5fc

    SHA512

    56614a51871077002b5d40213ab77d9af612f5ebbe30f31361da05d8a6d2581dd42c9cceef77749a551f959896fc30adc2521ee7cd101a62abf971f739629e89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84c0ab6983664d6db3aebe59025597bf

    SHA1

    fed26ca47e16588f5b16fb70a9db7c5534f97f8c

    SHA256

    6b415da8301c2abf27e8b42bbc3856a9cac76ee9dbf3780daef35fb8bf19ae22

    SHA512

    d6d1631a9839509b2127ab250e288258f2ea8c1c431ffe17f847e3f2c59c0df33d4c2c68bf6af5272437220394c8391d9b4c1288268c241d5c243078a78c28b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19aa2edcb706901576c82db6a57b5e32

    SHA1

    dc3ace34d3e5f6af7280ad2ccab12890f990b3f8

    SHA256

    c1bd2dc5d856b35a0337dfe4add42bf7d849e3973bdbc133832942130378b2c6

    SHA512

    2f3e9dc3b65e416beb4f55475e505f5fef57c67a7c6d6aa94d170c99446386c3a87f38daf2df8fc40d31f46d6b3471c57d4c75d1586337f8bb1fd50cd0a14958

  • C:\Users\Admin\AppData\Local\Temp\Cab4A9A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4B1A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/856-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/856-6-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-24-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-19-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/856-18-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-17-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-23-0x0000000000350000-0x000000000039F000-memory.dmp

    Filesize

    316KB

  • memory/856-1-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-3-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-10-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-14-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/856-8-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1040-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1040-4-0x0000000010E40000-0x0000000010E7A000-memory.dmp

    Filesize

    232KB

  • memory/1040-16-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB