Analysis

  • max time kernel
    138s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 00:02

General

  • Target

    880365068d8f95218d82551fc7e02961.exe

  • Size

    176KB

  • MD5

    880365068d8f95218d82551fc7e02961

  • SHA1

    4a6bfed49e69a2b8e8d8c4317a17358bae4c5e8c

  • SHA256

    e4bfd376352e36ccb75f536bb20cf88a12766436284aae99ed98c0f91a80c0c8

  • SHA512

    a7832f680acd9d4b2ef2696f7f7bc473c7a77e1ae50abdda401803b1090f479fa7603bef30545abd4dc60dbcc7aba6c1a749694f39691bc75e766ccd0921f4fd

  • SSDEEP

    3072:6C8VCaeoJ4rJe7+hQE4l+Xzl4qeVXKl4S8oMqvsHiCJT73C5+UAUV+r1soutrMJ7:6C8VPJoeyC+Dl4qCXKl4SvkCCEoS6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\880365068d8f95218d82551fc7e02961.exe
    "C:\Users\Admin\AppData\Local\Temp\880365068d8f95218d82551fc7e02961.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\880365068d8f95218d82551fc7e02961.exe
      C:\Users\Admin\AppData\Local\Temp\880365068d8f95218d82551fc7e02961.exe
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\SysWOW64\Windefend.exe
        "C:\Windows\system32\Windefend.exe" rem "C:\Users\Admin\AppData\Local\Temp\880365068d8f95218d82551fc7e02961.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\SysWOW64\Windefend.exe
          C:\Windows\SysWOW64\Windefend.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2712

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    436f445d9c56f1fa9bfa58867b9440da

    SHA1

    6f9ba0a50a2c5cb28b5b136af5670dd8e3ba3c33

    SHA256

    f5af8b844ea5aabae5c00cb30f8293764d16e3d47b80d0a6f89ed434ce30538a

    SHA512

    4d893c1d395bf515e5d5e7c17fa2de2cb91f2ecac6a23273eb8b558236664cf737e9e01c68c2f4d0b752f39fdca2fb3338ad4f708e644071445ef9497c2da1b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a921d4a0ee1b8bb5848b936f85760d22

    SHA1

    25ff16055dc1b69322665d6bd17e220d90c47dd9

    SHA256

    9bbb663c3f5a25bc922b5fcb4f08e46e608faccd7a9794f060352f4a481fb836

    SHA512

    df93779d0dd1dedeb91f101051451954545530483bb8b07ae7086aeed6c12d431f207973e505c1634f08dbd480ce5104422629eb7f84bcdbf77b2b00997aecdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    77615469c6a6a9188b1d97820260ae9d

    SHA1

    0c1c5b9cb25381b2381107eff43c744918b4e287

    SHA256

    a622eacd5f8f25b7e7f1813c40c23fd1325b54a7faca3ad96bb6a76f676a1f28

    SHA512

    1d62cefbe6d4540a0872afed5d03cd3913ca1509d25717ce0771de8d8fc9260375f7f67e57304593fa73251d5d1ee4316721c7233a366a3883413431749558a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2ab8ef98612741a23cbfae7fc7c4e163

    SHA1

    25a3176bfcc1f50aceba5902fb479fe58a3ca36e

    SHA256

    7a059f941734cde938e2f182a06c2186025e6caa3063afab61577b34a66d3da5

    SHA512

    d51194ca0b943bb603fcc3a4d53850a682b3687c387d92fd2f8dfd15a5fc893e5ce6ccd48642e6bd5f2cf56737cf8143cf9fb521c6501ec54e44eed6c235e593

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b22efe522ca7513ccc62871064bce019

    SHA1

    2cff08085063ecbfffcf0ddb5fb9fbb07166d03e

    SHA256

    8388eb1176ae90c764586f2a89b8e08351554b59d933bddb3b69a0a9c722539f

    SHA512

    94ef771ef13773bc3801213da333747d0aabf01d8b2e2f4e9bf1b8af851ab8a710842eecc3c8e0ea4e80070b6c9ca3152e7066a23c443287f45e20f706148a63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    312258ffb14f08e1dab5ab6fadb124cb

    SHA1

    825df17f3a70f911e69d5a0133b0081dcd11f4ef

    SHA256

    e51cb73bbc4bbb7550f42a5ed2af6cbda36aadca2d1b527947d94ad77175f9c0

    SHA512

    6ec89b934ea95d7b40be5331f70458c492ecdb03641c00b3a1f58d27c595cfae56df068faaa4013f7810a859d7bfad430063a35d370760968f15dce0610f4ce5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a9ce8f0957b8acc128ceb2cf34d0e63e

    SHA1

    ba5daf7a2faa2751ecc2ebaf96b0e2fb3ef744d5

    SHA256

    77a168115be513f4dccde8c8bd733db76b2fb5af20c4dcf87ac60a5bc88ed3a2

    SHA512

    be5f0017d636177cf52643bde87a35ad4fef0e91e46b63965c37b87077c9cf96ecf8168a9960857b422c38eab7521641ed764c8a538092242189406e383e8329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4b1cb922a9dc194e74fa90cd2d8d5a74

    SHA1

    36b80edacabe33f9f9e58be9928b57efb6158f66

    SHA256

    6ca66b323456c5bb6e13557481ca3c87fe1d0267280cf0fc27d8b35ef7baad10

    SHA512

    df5a01d8afbcec0dbc376d35a03e52b5163b090855d0f24f262bb2a7c6b6478e2596d7c849f54e0964edf6bad6e6d0b09cd61c0ec4a6bd50d7c72de224c80dfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    800691dbe0408d0f16dbb584be07b7fb

    SHA1

    eab8eb949742c9c4aef78fa537e68201059b31c3

    SHA256

    482addfd284270668914ae59924cecab8fbea64e60a16a5a25a879ae69853879

    SHA512

    e72221af71bb09d2b41f52de69cee57263b58f54cf36a0e306cb11737448a6fb90decef67f05fb1c7c9bc6698d4de6500aab45628b966fd48d97bc620edd26fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    602e586e185bd57b6be986425ff7490f

    SHA1

    2b1c6bb7eb11698c50674c098369b0f0af635da2

    SHA256

    880c5551cb02db6ac277e2b9878eb26361635aa325a74ebdf3426fe787a88bf4

    SHA512

    981b291b391b37346baadda9d99d19562d3f6eacab5c75842e942d1d9a6643e89dbc1e1d1cd1d1bca8102f76091e8296a9c513313d261814f8ca0a5b387130b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6ef9e357922d9416651c40052635ab23

    SHA1

    c4a088ea4de400825603b1ebfc9a50d7b3c290bd

    SHA256

    f11e71b3ea03760d93a18c539d5543697598296ad0efc4ebb3dcc0f388415d98

    SHA512

    19d27747afbb15a7a863a3890ea0d88766a272367be28c5bd56f26b7c4db62fe8e8975efafc0decabe92025e69ead3f797bc1694b0bf9d86ecf040d23797461a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e546599dc28656297e5f9845f97a7c2c

    SHA1

    256472a82d31a410ee5f59c704d168cc0529b60d

    SHA256

    b17f947d7f22eac2f3c6017e8dee95e49212096a61febd0e4f7f1829860dbe60

    SHA512

    6efa8ac4ddde80eb66dc175afa5b9832982181a2f4974d97acc5636cb6c23b8224f467c8651e0fa694267cd888c6876a6b5a56be860ec4b9731067219da5a6d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e0edeeddd1da621bb052c45579747fd6

    SHA1

    e283e36713d1ec896da923a32b84f6a13b4ebbf2

    SHA256

    5d1b5363b6fff7f8ea6931a936aaedd541579d815aa434f86a9fb27955ee05b4

    SHA512

    16dedb11f8467c03397415fc95a69748388f9ddad55aacf3d1575eb36fc97645a7853db263842776aa0c32f4e8df751dd632a3028adb053d3077426d5b57fbad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4458a3bbd7a4325dc19ee8d58c6ed842

    SHA1

    370a67c1631d87528ae9052ea5f576e9843672aa

    SHA256

    2cda79e93d1bd16b2ab8b0a3fd2c35c7b0f49d83bb7d05df476088ddf3b67438

    SHA512

    0b25bdacda94d7812cf7d4b6138b17fa0751e41b353fdc14d91d7a9e9ca228615c9b48981b8b082d93d6d7d60ac6211adbb95036abb34d4562d7f5c0ef84a7cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7d0722d1181162aa299af58597e1ae06

    SHA1

    eeffe96c540af6bfb4c819ed8b52cfc8f3ac6ed4

    SHA256

    ce73739d6be69733cbaae36c019edb86e0aa8f27f9005194ab5dcc2a4731814d

    SHA512

    8f04c2eb4c7c84eea7f35c6b00ef02d0f6095526ab9f7bf7f8005caac1df24b0eaede1bdf7421e0160b055e7670d99a5342fb3382aca81dc965e441b5c624795

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    faa84f5ff597a0eba3d955a4799716fd

    SHA1

    ca95c21d3b0995f5b29653edce1e5978d7dc146b

    SHA256

    f34db7415216c3d4c6025197a31341a557c841b6086e81a2cd590967876839b7

    SHA512

    c5b6df434ccdd86b1421a486f9b797129ad890393a10926614aaf61a0c4194f214c0a0192d9c5eb777848e1d8644b43873ea86c6d93aed5a2cea3f6005828182

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cf5d1fb2fecf1888e8ada4e36dc4d1ca

    SHA1

    f80103769feca56e24e6a55f314ce3ed45f194a6

    SHA256

    c3c7a1fdde63794bf21570bdf9d16830def849501701d4fc8faf0507a5d47857

    SHA512

    b5621acbed9fda6d2392b3a7ee5bbf5cbd3e768249e8ab26261cf598597911e96c567d591bdb7747dbe69ad098641882b148b9ddb226bf787872cea535f2d7d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7bc092fe3cdac39b367dca62611fef88

    SHA1

    e95f37fbcebf668a9d3dcf1a9c260b9b8fe7cf9b

    SHA256

    94e288c6489d3cfbbc79c1abf12857402c69446e8544b50fe8c98963ec76ce76

    SHA512

    655ec96dfd25b5bd044e8a78e9e5a71062a4a85979df2be1c36dc3d0c4bdafa22b8feeb4d86091ca0fae68e0f5dc39883f5379f83f32744c397650438d3eda60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3be8fd6632ccebfd765f8e3495122973

    SHA1

    81fa4b6e8600862e9951f12298ec6228710d5ba1

    SHA256

    b0464ad941b0999e7240e2d46bf3ff56d55860bc54aa4ae4884f86b3c6822246

    SHA512

    1058e3485cc2743d0d88adbf24e5e5f2d55ddf8f3c638ad44f2cd7de0e8eb58bb6e8e18552f23a4c78ae895f0f1c4f8a36dc0f39f4bee21976b0a6940ca909b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    292dbd85d5db976474dd443cf3939e51

    SHA1

    cdcc5772ab0bc755c85df1d00962b02504a84b99

    SHA256

    9fae181b453d1fdb82840852e0e5d4820da1b75d5f0b93d559fa0e14ac418d8c

    SHA512

    d47821d93e763dd66d84c58e8038671dbb68fd5ff3165455fb03ecdc940d09ed926806aa4162bc5422b1c3e46e345d4758661eb56784b93afbe6f6b013ddafc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    91faa7a37ac5582b7ba7897ba156b0ce

    SHA1

    d8f00d30a08a8164a960b3f1f7dfdd04fbc49950

    SHA256

    7560ac27333770401592d0ce4091d4417b2b74272a154dd9dbe6bd5140a2cbb6

    SHA512

    de3ab6fc120531ae83b641b56c69af43a7fdf42a73f199c167951a38d14b4c27875c6aac20f40fa8b7c538e8ce793d05c1d63f6a63bedd924a0d71b546ad6db1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    29d9b6b4d5fcc7657e99fe262957792e

    SHA1

    3611ab537158c0972d3b1fa97eff0d7c8cc1f572

    SHA256

    8600ca7e318dbdacf6d78600f7553cc3d11820c68ac17bb446f039c113544505

    SHA512

    a8e8d9914f391e295c1e4f1534b55bf4a722d666b5bd227f2aae59c0e1e9ad0485ec02f391a649e3c48740411555b94d8c8050ea7a74b5d08b600c40a99cc59f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7443d3d64f9b3804b85626a6215dcfe8

    SHA1

    3d3cf7e40f522095d8196ddbbeef8470e7b8d906

    SHA256

    76fb51668d4af05d14e1e03e7c4cd120b6f09ff6ab71a5b1e3fe017e5cb19dcc

    SHA512

    8106fa0231b3cacf53ae61c060c9ab0fee7e89bc126f63af8edae8548c8ea74e8ab6e2a1b5d15074803d6bab9760d4467d5ae25776b669b518055ad13c3eebd1

  • C:\Users\Admin\AppData\Local\Temp\Cab6BB1.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6C21.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Windows\SysWOW64\Windefend.exe
    Filesize

    176KB

    MD5

    880365068d8f95218d82551fc7e02961

    SHA1

    4a6bfed49e69a2b8e8d8c4317a17358bae4c5e8c

    SHA256

    e4bfd376352e36ccb75f536bb20cf88a12766436284aae99ed98c0f91a80c0c8

    SHA512

    a7832f680acd9d4b2ef2696f7f7bc473c7a77e1ae50abdda401803b1090f479fa7603bef30545abd4dc60dbcc7aba6c1a749694f39691bc75e766ccd0921f4fd

  • memory/2072-22-0x00000000025C0000-0x0000000002751000-memory.dmp
    Filesize

    1.6MB

  • memory/2072-3-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/2072-5-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/2072-8-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/2072-11-0x00000000025C0000-0x0000000002751000-memory.dmp
    Filesize

    1.6MB

  • memory/2304-20-0x0000000000400000-0x0000000000591000-memory.dmp
    Filesize

    1.6MB

  • memory/2304-27-0x0000000000400000-0x0000000000591000-memory.dmp
    Filesize

    1.6MB

  • memory/2500-0-0x0000000000400000-0x0000000000591000-memory.dmp
    Filesize

    1.6MB

  • memory/2500-6-0x0000000000400000-0x0000000000591000-memory.dmp
    Filesize

    1.6MB

  • memory/2756-31-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/2756-33-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB