Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 02:35

General

  • Target

    7bebfc732b2fd9295c93a1a843d02043.exe

  • Size

    168KB

  • MD5

    7bebfc732b2fd9295c93a1a843d02043

  • SHA1

    19a1a0cfabef55d3362b8c82e8f36482c477fea2

  • SHA256

    238317018f3c43e2a4bba5e1c5de7c0a8461444affafa3530985be6769d40aa9

  • SHA512

    81763dd29dc62ac8116167963d0e12baf4a4d69d44c43745174663a1458ecaf703291f71fc5bb476f2917d04c4264bfc818d26eef4d671983259cebe8301b0f2

  • SSDEEP

    3072:Jym3I7VpdizShu3NRYEEaH1qwRKWoV7pOBJ/ttHMb9CdZ/bux:H3epdizuu3NRbEaHXrq7kJlub9wyx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bebfc732b2fd9295c93a1a843d02043.exe
    "C:\Users\Admin\AppData\Local\Temp\7bebfc732b2fd9295c93a1a843d02043.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\7bebfc732b2fd9295c93a1a843d02043.exe
      C:\Users\Admin\AppData\Local\Temp\7bebfc732b2fd9295c93a1a843d02043.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\7bebfc732b2fd9295c93a1a843d02043.exe
        "C:\Users\Admin\AppData\Local\Temp\7bebfc732b2fd9295c93a1a843d02043.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Users\Admin\AppData\Roaming\Ndiiiv.exe
          "C:\Users\Admin\AppData\Roaming\Ndiiiv.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Users\Admin\AppData\Roaming\Ndiiiv.exe
            C:\Users\Admin\AppData\Roaming\Ndiiiv.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Users\Admin\AppData\Roaming\Ndiiiv.exe
              "C:\Users\Admin\AppData\Roaming\Ndiiiv.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2944
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2600
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2616
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c1d5fa197053bac9884f02a75a53dc6

    SHA1

    8bce5627298386e59d2c9c69efdfcdbd941a4582

    SHA256

    eccfc093cb30cf894de9499cabb3b15187009d3333cc0873a552f410cb20a244

    SHA512

    defedb5840e3ddfe76b57909d2054ad9ce1068ed639543a88e859edaf5c54190872e265bb3aab49745bb41aa82c8a1b8e8ca11578caf53ac884b794a2998456b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    160279bb9b4d950aa4f558a05c376473

    SHA1

    5ebe87bfcea595222abddf631139ca2245d3907d

    SHA256

    6f5f94a09a6118011aa436f7fc43cba559a64ae5e78d723632c4b9f762c05ea8

    SHA512

    e59d2d522b920f685e4b52ef5cbac5b735c54f69947681b8874078917e538ad2665c97fb799574b6aaa05414d59b44be92ae5d69f828dd41b10dff30395d09ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2063af3d55b3b8046f9ff11dd5cbdbb6

    SHA1

    8d3e40f00624f55d961a1587d72f2bd8c3537693

    SHA256

    5fc05c425cb53c13fe1e1d102f68e53731b9c1175a2d746a2861cfd7d0e66767

    SHA512

    b94d071c428dd7eab4f3b063736be15bf6af921489f707b7457c8e85cfecfca0564bef4182679f1e67b61b4fe8461eaff2cbd4dc3d3a6f4f826d8d564d4ed61b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f256cec96b04a3344f499dc7beec179d

    SHA1

    debeec111b0dad4b71e06528e9d1142dc4f9016a

    SHA256

    577af573bd6565e35e618eda7fe7f5b603f654cb275a8ee720b97a46a3af03b0

    SHA512

    55bb975602e370ac6c334c7c17ef3a45aad91a0a192c19bae8f90c831229deaa1a8835e88253e5007822b401f1c8ea0b4fac2b2ace57d0f8cb72fbb09a5bf378

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f254e344536c6874aed3a8f8b066a56e

    SHA1

    1b6fd7b6b93215bf71aa30d2802019fa2202e984

    SHA256

    7e8c5cc8ea1e3729a46ed63865beabcae598737d351e4a0aa53155f31e9ac418

    SHA512

    b44b4736ed1778d96013c05bf2deff5f3d75c1853b4c1c3ed65da3f54e589d72a6f4d4a142c61e9671a3f2877a4fcef858c1f232b60d3726bae3079c20bd5900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5244287eba436f9f602a298f0b0c95d

    SHA1

    82f2276f1ff27a7555e5b0a776244dd9f7a11ce4

    SHA256

    466da84db260fa35026b8cbc9bc19883a5671e53a8b5a6a8b99bf478f84267b4

    SHA512

    1928812bab98641014c641df8673956e54f69ef244510f85f615e4e1c4b47ff318481d446b07b1f4110ef06e7725f1c934aa76f91dc62167b04e0eb974ef3a08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    354bc5fce13c734bcd48ff2110a21777

    SHA1

    be45be007328a95edc7066a1b5a48488310fd7a5

    SHA256

    a088082d64603a661cea664ec78db936c3fdb6a1bfefe5facab7e6d0a42dc28d

    SHA512

    cdadf3e3579475d3f873d3ce86aff12473811acb8f40b66b867fe2c4133fb462194f7d3ed9c4031091b0c7f7e6194fde847f1a541dd4c1d45ef17bf23c7d1816

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75ff8092d904c97917d18bae5ca36b0b

    SHA1

    cc483c093ceaa849302a43145cf5e1eec5b930f4

    SHA256

    c91be1898094cfd2d148af703504a834f7b96ff54f57df4f60e0652ab1991fd2

    SHA512

    c28b7f5077414d522ecdc8cad1a210ec1c3965e19fa8ae41e0194b6b393662e1313f1af29874bc0a633e38ef949b9db7b87fd9e149fa28e6b78ab212e95508b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96a8959b32590884999df2caba75d5f8

    SHA1

    5ad12b7a8e6fef388ee1442f27f044d2d14cc8c6

    SHA256

    0fcb381262f5d5d1dc5649f43bef63a13b39316525ea8637393c55f2efa49460

    SHA512

    84efac9954e7268b08fefc7ab938e9ec2e84b8d0ac427fbdc3e1190502735c46477ba1faf80f2c8c79a22f684d6224097885c5f2b2ad9b3d08be527aab7ac818

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3da992eb3541371c636607a166a02d15

    SHA1

    07ae821935f89750a3354879279eefaa3d1f3ab6

    SHA256

    0edfdb8481e22c8bbaab5d646965ebd83b24a180fa7e73238c42d3fc55d796be

    SHA512

    3bbe633b5695883bbedddbb8fadc6915dcd87cbe692e496bee30e9df67d25015fed4cf5dec62cb6c3219e2cdb619949bc4772bb932f522d2cd364ae3082218df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c711b6f78eb47161c5f91fb8b0f456d

    SHA1

    414af99ce131e87bc2939089c7ebb2cf74b1ae5d

    SHA256

    f22a1813bba8d8f8e0a056cd2680b3993ed9c2ac05b86d514fa1831ba811757a

    SHA512

    3729eae63b5139b7dc0884f53d12c3382fd045c2515acf310152a787b1f238ea2269dfecbae3d1b14e067e55bb3aef0917cf0d2cdf6e61bddf6d860b1481854a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    959f0905c5f067c616ddd9a7af9eda6f

    SHA1

    84308e821f2fd9c9d7b088fbe49f0885ff0829af

    SHA256

    c88f80d18f16fb229c177b9ed11d9be6af9087d5ba51ce84b0c708a2b1db9f5e

    SHA512

    939f7f361b327c3d476897b4838d0554b7f6c4edbbc3fc6326a1241a9a95aa5489d9c2402e7b4226dc49535fa1a3d239584af831763d50e87f2d50f5db00417f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a00a988d4ddbb1faf2a6332c1247888

    SHA1

    1f71ded5a1affda9014c127babe2e9d147673ac7

    SHA256

    c965e4137278315949a2bd464bd7fd8820e2fc18545f3b2eb6581b2836d084a6

    SHA512

    bc151d2113a3f63bd62ec01e61b3913902a52c9ad99a93effab68c9adc1c118e4121731e45540cf102dccf56c16679b899ba931e6dfba92b81b2293a3ae0cfff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b87c1d491a160d53ff8f3734a1ef00a

    SHA1

    57e583d5284b87cfc88d52a4ee4f5f78b721db4c

    SHA256

    29c3e45f1892d64ccbb53511cb619a6440000b69148b1a0f977ef759e3b35711

    SHA512

    acf5c83a931a30aaa072a58fd0154c295b62d315cabfe17d5a4985d83baf8ef9d1df78f528450436c79c68a155f8d43acf55963c2252c9d8f7aa970373e5e75f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c990c41c0b14de5dced734a63d63be90

    SHA1

    38d5141fad71fd4183a3e6d507c65fc7bd40945b

    SHA256

    4f583ea7d5f22e2625911b047dda8e03c6d6e71ee378430c3c66061a52bad942

    SHA512

    92b1705605d111b023bb54cbdff489ea915eb927b381068941109dc4d0a1c8bc7a36a04f3e75faeb5048d60641c190db341f4b7e26eb132977adb8be65e5cfbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2335445a268703da6d81885ae6e445ea

    SHA1

    c3e186372ea8602ab82c0c40bd82c4905ec71bcd

    SHA256

    3f2440a5c4431ada747914e28b7a524f29717bce82f93031a14b869756da6cc9

    SHA512

    2d9d4584eb6dec07e0bbb420832aa71e506954b1e0809567bb8a76fc4c54763c9e94da0c029d549d24326d22ba96bee7e22f7ed71b1490790d5abaf61f1d74c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa3d205f503164d8a68a8dc4e2092c1c

    SHA1

    790b19b983cdfd10c48f2bcf2f20696be32dc037

    SHA256

    41ad897a45f7f483b4a31f15c23c47369513b8470b70e98be94ab378662a9e93

    SHA512

    686a9dc1425a616f09aeeb1217e0d0a2c560f4ea9334ab27849c2a2db7fd897d52a96dc74fdd7ef88f9c1ac256a9232ab5f789f79e35207c17e881e6e663b51c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3e7a7dbd04e784ad7e7ffa4772a3c77

    SHA1

    452d64008b2d113aded249bf19f1383efdba7235

    SHA256

    bd889eedaaf00e115fe6944bd96e8e7f103d3db40d8b7df6ccdea6e45f166de5

    SHA512

    98b639c5eb59fccf29870363000f338d1b0d90e63f9eca5a1beaa5ed804ee91e17f2c5272578badaada03355ceefd6f45103badca17b12412f475817163b7662

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c62ada7714bbb05646cd59d8330ac896

    SHA1

    2f692866fb002af7f7db45372bfdb91bc343d2c0

    SHA256

    ea1828eb191da28e5f1015aac9885d5c418239255bf6e15aa999aae5d62e513a

    SHA512

    e8fd51fcbb80c2c28d3177b303cd47e384160ecf2304b8c2d0d6ee203fb67cc606c722195ec978f56d64945b84fe1b3c32110e850310b8001e5121185fe9543f

  • C:\Users\Admin\AppData\Local\Temp\Cab5D21.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5DC0.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Roaming\Ndiiiv.exe

    Filesize

    168KB

    MD5

    7bebfc732b2fd9295c93a1a843d02043

    SHA1

    19a1a0cfabef55d3362b8c82e8f36482c477fea2

    SHA256

    238317018f3c43e2a4bba5e1c5de7c0a8461444affafa3530985be6769d40aa9

    SHA512

    81763dd29dc62ac8116167963d0e12baf4a4d69d44c43745174663a1458ecaf703291f71fc5bb476f2917d04c4264bfc818d26eef4d671983259cebe8301b0f2

  • memory/2196-4-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2196-5-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2196-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2692-43-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2936-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2944-57-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2944-58-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB