Analysis

  • max time kernel
    137s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 22:28

General

  • Target

    VirusShare-006df5e8b5a0fd87c1fa32103cce8cab.exe

  • Size

    1.3MB

  • MD5

    006df5e8b5a0fd87c1fa32103cce8cab

  • SHA1

    d377908fd9e5dfe6fe297f204b01d6565a7475b8

  • SHA256

    b5ba9725a503b5d0c6b59c554911b946d80d5bba3c6dbbf0d5622a8983753c3f

  • SHA512

    2fe7ddc29a92e32731c97797c36791af9d201f1e3033d7afa3253970d96a2567f062757fff05742c787ce595ec4715b5dcc0970a3b19c3b9550f5d94f2955d01

  • SSDEEP

    24576:Z/rA2+ijQ5HAQvvc3ZEoKK07WLdgblzMW4dDbDDa7/:Z/bjoPk7rWGgblzMW0DbCr

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:5780482 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2924
  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
    1⤵
      PID:472
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:516
    • C:\Windows\svcr.exe
      "C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\VirusShare-006df5e8b5a0fd87c1fa32103cce8cab.exe"
      1⤵
      • Modifies Installed Components in the registry
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2752
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
    • C:\Users\Admin\AppData\Local\Temp\VirusShare-006df5e8b5a0fd87c1fa32103cce8cab.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare-006df5e8b5a0fd87c1fa32103cce8cab.exe"
      1⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d4193a45fab0cefc060dbe98d2b753fd

      SHA1

      5da9fe220db9875d085cc078939580594b1674c0

      SHA256

      1e64b8347bb0f9fdf865a1c183bb223efc74e74c5c546ded00d115e4757be32d

      SHA512

      58599f2a43014fc17be30e2ee9b438c5b189843cbd13c222aee3e39204e1bdd31142f2c8b1e9c02f2a585166ff5e86e9a95fb55d610e9b27cbdda81aa99ecaf7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      11d9998136c02195055a30608709beb5

      SHA1

      9d42df94b799b37ed7dc4ee8ea045b5319cf9a49

      SHA256

      4a6402c798958a1863c53f3ac9f47221efbafa97f717b3912674990692c65cbf

      SHA512

      f6e42501a9fd7e4f71a00a1194048857e5a78731269021c3ab0c780c1b301324f52ef7eae10f1c98c2db63a3f93857b87c7026734d155904525765d2fdc9e086

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c4aa340edf05f7f760a4bcb0a9d0e59b

      SHA1

      b17484b2b4b7787efd37a4ff7a440b3f7be7d629

      SHA256

      3e44d9d77e9ddc5049d7a7fe802c5a88a12bd6e568cf24abc9e328ab79006c11

      SHA512

      e459ec369a73742e696fffb1a16414545b131ab143cde63eee58473560b0eab77b33740e203080a29cb3d396e899d4e16caf99b368fcbfb86eaf940fca4e8c49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b947f300d0ecd3e599cd4dbd47a7c9a0

      SHA1

      0fe8fed1ee79eb6034cd7be00b192ae035d9e28c

      SHA256

      793f0038c27837813c4a2b9d30b7948617210aaff57729577e63fa58ff82d684

      SHA512

      c04ee4b93c29fba1d180882ff48ba9781bf85e1e4700a12b2f84e8901a0e085c8efca03eb1e5d763e9f6354b960c5ba264134015e4ae3855afec7f41db043d59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      057e450489d19e54be20eb48c652b2c6

      SHA1

      95aedab90e4cd03536e850713b32267da18ea42f

      SHA256

      9aabffc6dac71ea9f4cfdd3cb6dff8429b8168ae13aeab47449691f6e0e7224d

      SHA512

      e0d690f58ca5346eff27663e521463c406629372be08d7d540748ae5c4b8057f14e47637404c686f3d060ad7376ff254340e243086f5941b2fa30e1eac25480a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d3d5432d666cbcafb3f96de4368e7587

      SHA1

      004222e4d0bc3c1f9096016e1e3b4662bb0b09f7

      SHA256

      d3c52b9df3c84b0912c9b6a6bf613a261bc8e04861b57fd4695ec39f1a434b3a

      SHA512

      7793e81c7895b656fc8106d372f35eb83b8b21520d03497a1d2f9845c323660ab706a2f10a8d086c0d4415d3e6b51c15891760a8c86b0bdf332d858ddc873c9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      74e6497ca1f0fc4e32d34981d2c74563

      SHA1

      53814687c39c016b29f688485f596197da1c9a5b

      SHA256

      3e5dc6bae2a75ec51b65b467b1d98413822b8bd55cb1e469b7fdf461e26bd6e0

      SHA512

      8c3dc342ae3ffd274b19496373943ce113fedc0234ded04d7cb04b3712fd0b734a2009bf0343714f6e5b4870e9cbca6dcd0db934307630448a6c0019479a0755

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      04880e872c934d761bc9a34321aa0984

      SHA1

      17fab3e71ff06a3b0e1a53b87b5e8f1d884af3f1

      SHA256

      f4b3c5fbc16734b180bf9efb505b81c6ddbd3a5b2a1fcb4e9b9c540d64f3aef0

      SHA512

      3bbcb806f2a1c9091604a52f0e7bd70bee704e09583f5b540a9be6b75c8ac17c28f2a268679824b7eb59688948fdff6223ae0743941d00682ccec0b09d7b6b28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4a1cee087188c9e680ae5e4b54d1d991

      SHA1

      ebf3f9900f3250b1da22e373f6bdca5461a2739a

      SHA256

      f05a9bf4634565f4435a66b6b0818447c0e920ac4419dd9f4b8b547920d4f1b2

      SHA512

      b8fa783e27c43c0838db68ccf5957a3b414838df237a9cb99e75224d39f235d619c135127c529c9b8873c1b737a73977b4148df58a58dc445482bfc8e15c24d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      86dfd03e6e241137a5379a8432bdf0e2

      SHA1

      cbb9eb978f3eec88cd4e701dc57d804784aec9a8

      SHA256

      a0895dc2d9d28863ceae13bf77a508a62e540dc05678bdd34abfc4b33d1fee2e

      SHA512

      622d710329f728ad9d35497bf46cf08eab3b62d51d7ec60682774d8f176ebc15ddf17ea1f518d374a5236efd6962fc562fe5e905a0480809ee55d3dd1fac36f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7ff3ad83ba9008466781b24ebe29f384

      SHA1

      3cca001d5edc13ecf74e2de8cfbd82a546df48a9

      SHA256

      363dccca1fb872bd55d52528d5d3de49f4a8c9d6043f6b701320f738859e1886

      SHA512

      127e7ed3d1afd3ba3ab0287255bf0816d5fe020458164f0348439029004372143a3d5a20c51ee12c6f6cf6295131a1b64a705ec10728e1cb9eebf2af144c8327

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8606d71467af7f71b1bdd542100f3335

      SHA1

      fe344406ae20a1af173e312e72b802e0d0851652

      SHA256

      944e2cfda9c4a33325b3079043e4dab067f0518288c46093780020db1dacbd9c

      SHA512

      2e1baa5c2ed386078f8c0784e7619e52e80f5499b1d78c3e8efa0f19115863ff0873029740f276e77c83f8a7cea641287b231b775aaeb13cf5b5eeae97fdb3d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bef24264807d41bc1bc6cf30ff082135

      SHA1

      62abd7845ba183a1d8d4b9dfa7d610e47ee75bc7

      SHA256

      3e74557a0f38cb21d911c694bbdbafce0629613d1579f1807c9cd6e29b3a8bc3

      SHA512

      4525bf6067de24d24be1345f77fb3150b7aca314ddd9085150346a223b52c43fe5d47f01c28e190dbdff293684bd0b1b2f9c6d5abfa23cca21a07563cd22cffb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02a251031d9703765b03efe7a8ec6c63

      SHA1

      089b415d985471a97a5370a8c3557ff27e910929

      SHA256

      1d811c954bfce4caf58edeb2994c6a9f1ab0a8ddd63dfd32b787e12885d7c883

      SHA512

      7c07a61c726d65769e1ae68f69202ac60ee43edd6c5c9f7f1472cccd6759f19c1b0507c06ea7fd4220d97669f3da3c1c4b3c8a5931fda8aec2401d2fa46a000c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      198675789ac31170468426be954d1e8f

      SHA1

      bed791b2dd682f072ce9d2379f46c3351fcff14c

      SHA256

      2a9d2ff7952f157584b7d51a866584827b11cbac09102c688741dc8b9176d2fe

      SHA512

      753317c24cda771b50e495b4832bf8aa626adc9635f8dfbcb5d97f029babcc7560855946f6f49aee9df484b59b19736f62be5b8c1998b2cc0377fb29b4770dba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b36f4d3d983e2969043736318f6b5259

      SHA1

      bf1d90c0d0e9da52f296581c964bdcdd38a4366c

      SHA256

      8bfee299b4064e2895f15fe572aa2ba2d2cf8b016f85600b34e317ac9f2cca45

      SHA512

      92d67d8ff8a977859652d20554edf8a257816bf1f10c99420a40e63222845fb3f24cc9aa3689491af78ea63cb6fa5b534bad8c2a7a15a8980663c8732e66af10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      013b604d85506b90dfb708e848d2ad4c

      SHA1

      f9538046c82fd6a6319f9faaec51bbba7f505989

      SHA256

      231e3eb68c52a909b4da4c2783b9f1e787440ee716cda357a9599c8db73ca010

      SHA512

      6990bfb430061aa70f8ec5d4696a675def2458f972cfc3b9430c549b66a1426b23428418092ef3e006ca72ee1a9bc8688ec50980a92ff85d8f3de1f57560a305

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d6d7f89dcdd668d9bf071c5b7667cb27

      SHA1

      c438c9656726222ab94968e56b8434525bf5ff98

      SHA256

      55a59780f11b313a55dcd29771d934cc333349df1a7c033fbfcfc637970a1df8

      SHA512

      900fc6601e9dab9bcfcb1bf50d01eb099e62ba179274734508f639c2e0d18646fc0109922ecc3592124a1349b7376301265af8afbeae55227d10d9bd7aa37eda

    • C:\Users\Admin\AppData\Local\Temp\Cab7724.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar77D5.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\svcr.exe

      Filesize

      1.3MB

      MD5

      006df5e8b5a0fd87c1fa32103cce8cab

      SHA1

      d377908fd9e5dfe6fe297f204b01d6565a7475b8

      SHA256

      b5ba9725a503b5d0c6b59c554911b946d80d5bba3c6dbbf0d5622a8983753c3f

      SHA512

      2fe7ddc29a92e32731c97797c36791af9d201f1e3033d7afa3253970d96a2567f062757fff05742c787ce595ec4715b5dcc0970a3b19c3b9550f5d94f2955d01

    • memory/2744-14-0x0000000000400000-0x0000000000555000-memory.dmp

      Filesize

      1.3MB

    • memory/2744-23-0x0000000000400000-0x0000000000555000-memory.dmp

      Filesize

      1.3MB

    • memory/2744-16-0x0000000010410000-0x000000001042E000-memory.dmp

      Filesize

      120KB

    • memory/2744-12-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2856-11-0x0000000000400000-0x0000000000555000-memory.dmp

      Filesize

      1.3MB

    • memory/2856-2-0x0000000000400000-0x0000000000555000-memory.dmp

      Filesize

      1.3MB

    • memory/2856-1-0x0000000000310000-0x00000000003F5000-memory.dmp

      Filesize

      916KB

    • memory/2856-0-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB