Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 21:44

General

  • Target

    87bc2729c6e19d607ff239febe9221c3.exe

  • Size

    675KB

  • MD5

    87bc2729c6e19d607ff239febe9221c3

  • SHA1

    c7b7b77b92ff295987459d9f094a2b7b7afd5358

  • SHA256

    0a54bc1441b3e28339e7eddbeebfe0be92395eb585e35aae2a05ffb6e5e52612

  • SHA512

    22c23af9363415a291c889224607106ce89dc21a1ebed94ed503c54d025cab4eba16bae0f90f6f36f33e4481c427d4a6282c6dbd7b3d7891d8b5bb156d843fe1

  • SSDEEP

    12288:kJ0p6T06/rm6agttTknjkxCdDLAvzV77tKj85JI9YwqN:km6H/SSjMyvzV9KgbUY5

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87bc2729c6e19d607ff239febe9221c3.exe
    "C:\Users\Admin\AppData\Local\Temp\87bc2729c6e19d607ff239febe9221c3.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    4b5a0732cae31e232228ef3a93ed82b6

    SHA1

    4f6fc888d59ffdf34d2e0b4e6fec5cc9d7191a82

    SHA256

    fbc2080641adf64d1e4d3275eb8aa0c8176cc467a0161f1e9eaf321a9acd0227

    SHA512

    2b4abca4ab812dea7026c3ce2df12e5507a4505c36fc5b7a7c4fb6d5739e688f3f334267b0fdda9e11009d64ef16a3f0f38ea10925085e842083aa9930f89b2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b0e8c14094bf749046b78dbb9f48542

    SHA1

    c366425bf0c7c72198b17079d6745f8fde658f61

    SHA256

    c9b31d4804ef89d90bab98125093c9e18fa13f098a2e358cfbc2cf94671440f8

    SHA512

    051ca0e93a85014eff32b66a7f6fe730feb09c0d4132b7daa1d7a0c91a159ebf462e3e2a6f4d6869d27de913e2e534ea83facd259026c82f48604d515dc97482

  • C:\Users\Admin\AppData\Local\Temp\Cab44FD.tmp

    Filesize

    14KB

    MD5

    4fffd8b2ccedfef6614c0c97d3b0f09d

    SHA1

    74e85a97b65ca1f9ffb0d5e0771c8d0a6b9b4a0f

    SHA256

    87a2bf02d5ada328f61e19399d8cf22a4f75f3fa2c14aafbd88236cad254f434

    SHA512

    3c7f02e79e568a94c671e5f173016d6c8dbd1520d1e88b7e655b97ff6374afe7b50bf604c6cfba11bcb46853efdde695592c41f9304f4895e8d4139dc2baa7e6

  • C:\Users\Admin\AppData\Local\Temp\Tar45BC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2212-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2212-151-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/2212-153-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB