Analysis

  • max time kernel
    119s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 09:39

General

  • Target

    868fbad52b106fe08c2153d1f270b507.exe

  • Size

    140KB

  • MD5

    868fbad52b106fe08c2153d1f270b507

  • SHA1

    5505e684dc2805cc9fdddb430169a812cb01538f

  • SHA256

    f5ce49c19ae742a69d61c107520407883f975a1a7584639609c892217081e4a6

  • SHA512

    be374828690db11ed918d5f08566b3c5c74685bc75d061697381fe467f7c9ad1e677e102bea6a520a4c292a82370356bc8bbfa9ebc86ab5ab15632ba35edbfae

  • SSDEEP

    3072:V/na9TiG/v3Grddu0UmnEut7C8TrLtUJnIiMO88:V/aTl/v3eTu0UmEutu8/LtnO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507.exe
    "C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507.exe
      "C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Roaming\Irrrrz.exe
        "C:\Users\Admin\AppData\Roaming\Irrrrz.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Users\Admin\AppData\Roaming\Irrrrz.exe
          "C:\Users\Admin\AppData\Roaming\Irrrrz.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2568
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1376

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    46f1614b15b79292805f7012dfd0055f

    SHA1

    6a94940ea24e6dff0c8c92d3ca5f2e3d2d8ed25b

    SHA256

    b7eade35f4ca5229d1e62d63cb34fa19072f62a53d9e16b6e689452621129a47

    SHA512

    6ce402fef6e149773e1b26fc9bfb53b17587456d6a089a8cc09097be1e2e1fdc1892623229627dcfe215d3861157bc4c5427566ec5978d370c207d658ca2bc57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aae2b508624ac71dff1e14e96d05c7e0

    SHA1

    4826c9b855d0c6fae348b5288b9ecb26b3a015df

    SHA256

    ceb385960132c24856571235b27d301030db0332926beededf82a64d1f939fa5

    SHA512

    604793bf00b0a23b6c3ffcd490f8330ea76a968d108cdda53be7bb15aaea1f912fdbb27b66133ed5a631140d5ef4183916adf4d4109626b427a38ca2bef38754

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a1e056642458ef3c7e6f40ec4e28371b

    SHA1

    0a2175ab14d1676d37ff0046333eac804a91e4e0

    SHA256

    d3eb411fb595af2af85924f732c58e5b9d9d3b9d09abc395f31ce60775502d72

    SHA512

    9e7d7c1cae8a8624303c6353f55c82039d605740eb20b2df27ad0086bdc2795b4f9b42d9406abc93411c24e609ef3644caa8e5905f4143a2ec29f050c399583c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cd5695bebf4f72457a9a615eb288d951

    SHA1

    f414adf245fe2d3c31fe1a3e302a5367ee7b97fd

    SHA256

    06efd9a8691f3b6ce0858b70229db1ddc9a34084b365f6a8b843364c158afc4b

    SHA512

    b64595f5d46081e3139fd4d078f051f909cf5cb4642c7a6f3f5af2b8a416aa602bd8801f0b0caaa2221bdc7ab5167d5accb05563e878c3a5b1cad6a7fd0d1b9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a4928727cbb905d177943f91058ad982

    SHA1

    498829ee4c20138a73181aa0cd385a592d33bb1e

    SHA256

    c63fb89cdc82a0d806a38093dd72702764cf35a6b1b7b1d4beaa62696d96da1b

    SHA512

    12376385edd0f4feddf2e463ad6133c21d75fdbbc864001e02602a53cff4073e127af4e46a309023f36446af3c425c5409bfdff249668f20d593a44a9ba6932e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    095118cc36184220ce28f1c962e946b7

    SHA1

    dc43bf74db6af06b4c4a844dd329f5cec7a3a521

    SHA256

    042159e4b004be79965e1496d04123a567ed93d3a7cb1af5722828b08ab5e9e3

    SHA512

    55dc338c66c1a522409918693a397123fd179cb3fd3c6c4a063141c1a634d3ed58211a5bfd2e32996bc52c9d5b49e5d79cf69794461bd0ca8057988f8ddeacb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bc741161bce98b89115834bfa597c1f9

    SHA1

    55e8df57049713c916825a3e23fcac72df6b8c8e

    SHA256

    5f64eccee5e5ed49c62a954434a1562ebc9e4edaa252f7eb4bd6f4f27cb2d5b9

    SHA512

    1dffbe70b995c4daaa9b276a58e9214d24f4e75668b75d15ffe3d0a2d5e2179c9c282fabe5480d76ab8b064a7c1b10cb0e9619cd8599cbe22dac37ccc664f703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    633d4a59bbff7f9ee4d22df9f3b43653

    SHA1

    97e34b7e2eaa2780eb2794b6bbcdea2209efbed4

    SHA256

    43667fc86abc3ab351bf7bd100c65f8e1f4636e7c22f172b7f8ecd18989dc4dc

    SHA512

    aa8c75c91584816e3ff021795dc18f49cefcbe63f2d3e199dd6618edb419d2aeaa08254476243500b3cb9f39e90987d7defc4efad86f8dc5982d59894c984e03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    83fb74c75912d8d931f82c2d6a3b68e8

    SHA1

    283159ec915ff045c74c15337c920991908b36cb

    SHA256

    8f96d28c133d1ce78bb0e62a5a78764cb0377bb8ed9a656fed49747891c911e3

    SHA512

    362c00b8c53b6cb942337c2531333202a15634aacc0d78660bad6b03067e14c14ee5d72da783e4701bb4a2cbca2c99c089d3a8c17550a93730da4dac8ed1b071

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7d283208d211839d21af841fde98cd08

    SHA1

    3033993cba96b62790aed7488b11b11534a6e67e

    SHA256

    75ab682f689b0f9e01d9a6b1b42c1584b82eb06f1068941b0e40d33fe695436a

    SHA512

    397b444a7703030445eb0cbb3e1cd8c6eba92ec6410dafdc9cb325a0e18f2550f64a0760c1dc157a9f8a8d5c70cc84ac8171495f83cd5bae3c4eb8544d525d40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8df3277f3f975458f37a198cd7a61f52

    SHA1

    159e3d3a81d9d96feb80dbd29f5a7fa91752894f

    SHA256

    1cc656f40d38b70fcb9c9acc6193cda1d28400d7c75c2017e9f3f4076beaf9aa

    SHA512

    a28e22ff51e65e91aa20d7c7c9f7f8949052e0bc040d55da5ef12021617cddfd076c8e8bd7691dcc2138130c1e7e864dd9e55c2bcb076964e5b12ecbc281cc15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ea1fb847c61ec466c6ec1f1e8107e462

    SHA1

    ffc0fe15959233f05e6d15fe7ef9746b4daa3197

    SHA256

    6c1ed43fa2dc43052a0043754f2e1cdf49eb8755061fbd6cf8f79b2f38c6ad73

    SHA512

    021567711cf6a7f52dd945ce50a1039688a69ae50298975f38bbe588cebc590a889b8c9f1ed365f7ca1c00b162e8549f4e3837a050277c0de50635f310d62f13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b6be9fe5acb3e44365fd68d321485b8c

    SHA1

    575a68511d3b228681b21cf5242da46f446a856a

    SHA256

    a0d592f2f77ba1ea6d9f242ffd648c64b8973dee49fe38b20ea914a1ee809ff2

    SHA512

    1b21c7bf6e7d2a97c87aa0a5a48652bc9c2526700c288a6fd05907c29950619742ba61862d4ef6591871f6f02d1badd16cb98c822865f7c51f553b58e7ab1082

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8974c7523da182f6cd589f430bdf1b5e

    SHA1

    3acb142dd4443be32d90d205caa80381bfb72ec6

    SHA256

    7ed7b4d0aca4863d2414489772f5efc6904c6bd61b81af255061ff1504be2cea

    SHA512

    cd62c4c95532b29df7eedfa7151310a7b960c4181e43f53515d2d65338f1ecb8ebd29f001ef78a637bd608b02f83535ca4ab86419fbf687e2c1eb48e01b6dfc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    20e6658778b020bc235266b40b6daa90

    SHA1

    ce63aca137d57d2f74bd5de9225d493c775d20f3

    SHA256

    b4aa47e7cc68b128e7b5276ff07632ae309b2215df89d0e827b4ca59434b9ffd

    SHA512

    7b4dfb2f1dd3c9ae2fc99df5e1cec773f74b76f2a387f99a8d9fa06346bd24ac4e50898deab3c727753f30466f651d4c62ccf13e9caedbaa6e55ea72e168f8bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    061f2331905770361990db6daa320c4d

    SHA1

    ed3e1b42e10e3942eb0ac02067b0738879b6c300

    SHA256

    b3740b573f655ba470d0cacddf2548128e3a0f7f6605d8672fd5dd13b14d1989

    SHA512

    d3fcfd795cf887dfdc874961be40d286acc20af04ff1e77415e96c29a172d79547c8bdf0fda5e1ceb97ad57d59f2906c0c9396ac6cf25dd9d08cce6af0bccbcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bd07e9d325bb072aca50ca724350d1b4

    SHA1

    d9c6e0f3e3f5a9766f7ce9790a5c6dd8e8c400ae

    SHA256

    0993e6ff1e0ef90ccfb71d6e96ddf102ceea9c918cd68e018209727beed88bad

    SHA512

    0827209d55493bc7f82077a603df48b96f65c437b942abf52ac06baa664ae8a039563533659b3eb903b8fc15edfeaa5c7147037b9f409c8cc86a4bfc35f20585

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ed7da9453862a3668a2c654b1cb81e52

    SHA1

    738286418fae80267be81bfc84d25bee76c5d8bb

    SHA256

    76b9c7b001280a3cbb05e0adcc9de96a758af84abdcd8ee4c20074069b80c4af

    SHA512

    016e003a9ac4cfff5ab6f77ba2b6627123eaac6b151c5769117dafc50cd49788ea561cae6aa9825f3a1086b207ecb7eef4d83b70165fdd52bebfe4eb208b81f1

  • C:\Users\Admin\AppData\Local\Temp\Cab9762.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar99B6.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Roaming\Irrrrz.exe
    Filesize

    140KB

    MD5

    868fbad52b106fe08c2153d1f270b507

    SHA1

    5505e684dc2805cc9fdddb430169a812cb01538f

    SHA256

    f5ce49c19ae742a69d61c107520407883f975a1a7584639609c892217081e4a6

    SHA512

    be374828690db11ed918d5f08566b3c5c74685bc75d061697381fe467f7c9ad1e677e102bea6a520a4c292a82370356bc8bbfa9ebc86ab5ab15632ba35edbfae

  • memory/1736-8-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-16-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-2-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-4-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-13-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-6-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-10-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-15-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-25-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/1736-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2040-1-0x00000000001B0000-0x00000000001B8000-memory.dmp
    Filesize

    32KB

  • memory/2040-0-0x00000000001B0000-0x00000000001B8000-memory.dmp
    Filesize

    32KB

  • memory/2696-47-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2696-48-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2816-29-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/2816-28-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB