Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2024 06:07

General

  • Target

    81aa05ab45e06efb51d79d4f83e43b80.exe

  • Size

    162KB

  • MD5

    81aa05ab45e06efb51d79d4f83e43b80

  • SHA1

    949645fb5252cab46004dfa1f8a27c7b439f0c04

  • SHA256

    73718442f7fb1a5c241aa2573194fdc51bf514aa1758dc35b550a3fa71cfd0b2

  • SHA512

    0721f4691b2a6b0336e01f8f2ae0ddc8b2e245db56b4fb04d83bf16f4f3f8df561d1306d06ff8fa1a9bdf83839205b592d7026a5cac66ca9db77064e9cd7c5cf

  • SSDEEP

    3072:REyXoN1VwNS1Jorf5qAHi6M0Lu/OIoZUlqhkZfsAS8dmFJ/geIOXBdFr8qq0Zv8:rXoN1SR3FLcNlu0Ef8ODIKB410C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81aa05ab45e06efb51d79d4f83e43b80.exe
    "C:\Users\Admin\AppData\Local\Temp\81aa05ab45e06efb51d79d4f83e43b80.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\81aa05ab45e06efb51d79d4f83e43b80.exe
      "C:\Users\Admin\AppData\Local\Temp\81aa05ab45e06efb51d79d4f83e43b80.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Users\Admin\AppData\Local\Temp\81aa05ab45e06efb51d79d4f83e43b80.exe
        "C:\Users\Admin\AppData\Local\Temp\81aa05ab45e06efb51d79d4f83e43b80.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Users\Admin\AppData\Roaming\Kaeoey.exe
          "C:\Users\Admin\AppData\Roaming\Kaeoey.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Roaming\Kaeoey.exe
            "C:\Users\Admin\AppData\Roaming\Kaeoey.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Users\Admin\AppData\Roaming\Kaeoey.exe
              "C:\Users\Admin\AppData\Roaming\Kaeoey.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2568
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2776
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2524
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb672912354eeb9199db1250d1824b6b

    SHA1

    dad6433ed1f2cec2c5aa53790b9afa92b42f621a

    SHA256

    cb360d8dc3b998ef30968653aa647e367c5a93acf0bb276aba4e886c36ef7cfe

    SHA512

    5526039d8ff4c193d707a92d45530444d924965a8e2616898c595ef644bf4e573398340601f27db2e9d3ff4193dbd21527cc2750585c679450bdc78f1c143549

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d86589b90e6a5ca872ebb1e731a578ba

    SHA1

    22eadab542eea3c65581206d0ab9b4c3593e4d91

    SHA256

    b6e8fe80b859f322d3d9d6e96358a1a661307a18d18d36d4d4ad1a19434aeac7

    SHA512

    aa35062735c233c7283b8579df843032eb349f54f87146b21792264f31c06604a3aeb27fd0358c6c8132929cfb2012ef031cf9b11b3a581c8de357e1ef51a5c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34655ab6eaab4688f1d3295f214f4e80

    SHA1

    d40b8fd29cd00a37e467076d2ddcf3a48541b0a2

    SHA256

    74552578b1840952dbaee13af5e7ddbf62aab0ef041552007becff6a12549653

    SHA512

    37f639b42d59fdf8a5ecc5f66551045c7fe594b1fec427415250b7e5c6092d79659797e3d553279f6ee8921572f7889f5a7b1ac396269ee866c677f11369c34b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b1913e1ee978ebf8124977ad2269b02

    SHA1

    beb18651cefbca8eb0a262788abca15eb3130fb2

    SHA256

    fbaa633aca077c39272273220584a9fec737fa13175233c13024c4e4ae3a415a

    SHA512

    917e68688c8969e0868550ce4fefae9dae7f680c4688262537b8c3ea351d1a4b6d0382196fba9948d7ce54ef3b57eef70bc09109a0398e92fbd4f826fce5dad9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eed5a5beff9efc3382c40cae900d79fd

    SHA1

    f8f012afad77b1ef25e846c337354baca9890e7a

    SHA256

    61e3261095e9b76c3b640a4327793165e0f7c6270ba4dd2b6575c700dac42c9b

    SHA512

    b9f5262b1f892f9b66299628961189acecf97a905cb6b9055339497b765c64fb3deb853ae1caa28ab9e7ff5750d774a425611e587ff302d431cd83f70a638d26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bb1b5630185b99e9123cdc71c54e6e6

    SHA1

    572f11d94583848974c5782b036db148b4881a9f

    SHA256

    bf71237de1d727c7abe08e24ba6450f330d134c0f6e377a20deccb7f37f8fb10

    SHA512

    7f1f1c45b820d732279605459cb4e7437a7e75497dcf2afc29191b22e241c076fbd5b9e847f3e44a27dc5b84a686982ca4171c739eba37be24bfcb9c83bbac6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b92d485d95c3a4e169e8376e683cc05c

    SHA1

    3fade75e486d1210f95bea20289ba88c466a5c59

    SHA256

    f41574d5b5d3153cebf97e3c8403c54856a903ae3661c7556289cafa14625ecb

    SHA512

    cbff0a9484f2497847de8835b71cc2f905c480d3c3c4b52506a9a2e4ce70a0d003ff7f5866656196f0d9086a38493ab5a51fed8a0b684c6ac291dff8c8089dd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4ee2e209088aa988acd83957023f160

    SHA1

    de16167b9b5f41a9595d0eab11e57bc384269000

    SHA256

    0a5b34ac753ac6b9331c261c29f01a521428821b55d60a56f0b8ac40b0f1a883

    SHA512

    557ca2809e3870498dc2b43e592b6f14f2e7884b4d61817fd5e4f7550c2593bf90640e2d5e2e342cb7d89caecf0dc414241ead05ee3eafe291756e14ba8cdcbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f494f8d982b8c301bad35d3c3080d9a1

    SHA1

    550e0de22eed9cbbdf8d89fb4f36d4a34dfe6b2b

    SHA256

    71fd9302bd8ecb66e3a697b6c696acbaa85747b927d79af321e9b7ffe51b0f4e

    SHA512

    2d5b2c3e66b3e06b054e2f762b3fb7856f3a0422973b48edad1997963fa40f659dd6a3f15a38a3f4d6479cd8a07092d4ac32f308539d84ab28d453e1bed43afd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1a22f9dfbcb418269da2b9ac01d3faf

    SHA1

    ae7cc97259a14f6fd5e74830faf6c8df02830e5f

    SHA256

    a49ac8d7c4c0727473deca7c2f5cd23bc10ab79cb92ff94138bf884a3accdd11

    SHA512

    4b3642786dc23924faf4f73ce05380c12646df7c62f2d54c0bd8f83b93a8ec74ce51a1ff9739e5471ec90efa557578303dbe6465c8e72714a78ff1bad6ff625a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e53b7794e7bf9d669287f396f56ae6bf

    SHA1

    ab88742f443be0b202a3e38fe9ddad64a16cc68b

    SHA256

    67561355116ade24f5c7e5f6ef28a7fbab36733c65c085b18758b54cc15f44e2

    SHA512

    931de4c5408f3cd957366d8e085fafe2a83cf164683ab0b3434cd47ab15746dad2f53d111cbafc730ac63d01b22e01d07205b01cb6e8e98695c4cdb187d62770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    710c9d0a241148ccea8140722bf0aa60

    SHA1

    451d3fb1655cd08a474508c217856f957133672d

    SHA256

    821a28a30a45e5a841e5aac49e9af9afcd567f523332cfeb306eded60f932d5a

    SHA512

    b1f1e9830820027f359a5baa2a386cd1a7555ca11db72be7b76fb6059b8215f0bb08cb372e9fe4d2b9acf1b233173e137ba978bf2d49395af447499bc636c863

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a741a0811cabf86600e06dee3b6762a8

    SHA1

    4dd121534e404a5e5ddaca51bd73e885d70be932

    SHA256

    2ef5323a82fc1c77eb9cd57546b668ef77086a4d5c5980f4ccaf13a203b1ffca

    SHA512

    976e030b8f43467cc05df32869e223a2db82686def266f5f36b58f495b5269eafc82df74c03a2c196beb88a877bfdda219f948e022dfe935832fa2f843bb42fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de619c9dbc2a4e8fd3961cfc01542186

    SHA1

    914582c96a3cc3f2bb773829da2bff50fa4c8161

    SHA256

    e23c5e00bf0df640fc3744066a6e010d0ae154ab58054b7169e7cadf9958a6db

    SHA512

    5c8d9918ee264be9da0fbacef18e5b6bbfc99e24ee5b7e51ff89e739014cea75937cf834c53fceb3245e25dc6e9a97901fd4743dc135efcf468665f7ffcd9536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97bffb9a637d0994644a8f94a40bef46

    SHA1

    7e6d96fac361a65a89a410135d198569c430f82f

    SHA256

    c77a9902b24468497bb55b395b9cfe8e7cbf0f5e0723fbe8c93106f74e8f7abd

    SHA512

    3810811c7e2de9eabf6626a6a8bafb9181833b47c00c67b3030141419adf4ebdf425e24af2ae4ba2fe6bb5abfb3a3e3915ee8ac73abe0e5eca7b6c4a1e88fdc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    256ad9d60b453778cfe19e8499440f94

    SHA1

    b4c270b390e4d038dee9d1538788ad76892e9510

    SHA256

    2fd9a8eb976bf23f140f88d4ef142582dac74d9bcdd51632de43df608a791236

    SHA512

    2fb0e7a191a2b2f8939bdc3004d1c99aa13243ad7cd6cfbba457e809cdad1403a75b38be2ff43ef7e7b16e522720686220de66291ac788200c645bace0adaa58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4711da8a757b3308b41ac02f23999d3e

    SHA1

    9aa0246a1ed6cf534086b583750218fa4bf29c6f

    SHA256

    b11ddf024aa64bb221ecf46ebedec22e42295659ff12c4c136a92e431dc22bc4

    SHA512

    11b2811120ce4bc55037ab1810b81eb71dc165e7407dea59b9e33fbf3be436481114bbdcbfbc7cdded3bebb571477c74cceb2db7c925a19b92eae4bb49f38b15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    802bc54e9ccb335fbdcf2f86b4627b02

    SHA1

    9189461ebccf8052d2127fa0bbcd84de014045d4

    SHA256

    be84b2ad4cbcfaeba407489241ec4363aeb723d8a7da98d499a4a918c47f94e6

    SHA512

    f06d91c13cc05d3cf3cf711a752420558cbb8a193cd3d9c9df20f0745104780e82d1d84db673f4f3a6f062625ce91efd841e070145e58b3ef8563ba246b3bd5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59c3181cbf9e1502e21c13f61525dce1

    SHA1

    670749b6ab5a94dc9252e0c8c2b23a975c543b07

    SHA256

    ccfa56142ebc8f2ff78dcf412ead8a55fd2c571cb4405a1e39e2779442ede8b1

    SHA512

    6bfee04965b13f1775423e6eee7f1399c4321e1d871e721f975dbe8af491a3a3efacf4c90c0b257bc9960db26b46ec06c4e9979903841c20a1e72857e8012f34

  • C:\Users\Admin\AppData\Local\Temp\Cab5821.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar58B1.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\Kaeoey.exe

    Filesize

    156KB

    MD5

    bd785947ed3b8b39b85870e20b4e59f7

    SHA1

    375e894dbfb1889ae146d8879e38943938fe68a6

    SHA256

    6705441bc067dac8c56387893ca94f9ba72d839a358a642b038bf29d967bebca

    SHA512

    254b1a42a330f63854fa25e2d2e1ddafbb1bb32e731b039cdb2f78afb2f776095d27b730cdbc72f290166df03834f4eb1f60c73e75a4f22dd06c38a3a231ab92

  • \Users\Admin\AppData\Local\Temp\Ekg7afHe415gIxsl6af.tmp

    Filesize

    3KB

    MD5

    10a714b195635d9dea52883188903080

    SHA1

    488b06541880da79a4594bd1535cb2319dcdf262

    SHA256

    f49075fc33b842978a08a923dd2411f7dfbac0169e732b3fe44a2a1e07e22a00

    SHA512

    877945f6e2e43c3663ebd7abb534becd70af2b7ff84e3ea93cce14db90edaed1e7dd50b5f8f59c855285cb8add27aa791a8ea2299544599e2d8b922badb2a047

  • \Users\Admin\AppData\Roaming\Kaeoey.exe

    Filesize

    162KB

    MD5

    81aa05ab45e06efb51d79d4f83e43b80

    SHA1

    949645fb5252cab46004dfa1f8a27c7b439f0c04

    SHA256

    73718442f7fb1a5c241aa2573194fdc51bf514aa1758dc35b550a3fa71cfd0b2

    SHA512

    0721f4691b2a6b0336e01f8f2ae0ddc8b2e245db56b4fb04d83bf16f4f3f8df561d1306d06ff8fa1a9bdf83839205b592d7026a5cac66ca9db77064e9cd7c5cf

  • memory/2060-18-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-11-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2060-15-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-17-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-7-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-5-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2060-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2568-92-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2568-86-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-45-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-33-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-30-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-32-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2736-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB