Analysis

  • max time kernel
    148s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 05:08

General

  • Target

    88a21c6abe4f4aa83970dd7531821ff7.exe

  • Size

    706KB

  • MD5

    88a21c6abe4f4aa83970dd7531821ff7

  • SHA1

    b5dc951995804ba10594866002a8cb0e015f7dde

  • SHA256

    41f03deaab7c0a911e2073ab00c3110b704bd5f64c8fc103c50ecf7be6874d1a

  • SHA512

    78f05caf5cbc9c400fad6fafd37f576fb5059f9016b162efa3956d6194168fa709effa7e1d3d7f40bf97a6a3e83b3a521caa9f717d3a3f6bf485b2764a1ba824

  • SSDEEP

    12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGspXmr+nYSwpdD1BaQ:gpQ/6trYlvYPK+lqD73TeGspXm9yQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88a21c6abe4f4aa83970dd7531821ff7.exe
    "C:\Users\Admin\AppData\Local\Temp\88a21c6abe4f4aa83970dd7531821ff7.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\ScrBlaze.scr
      "C:\Windows\ScrBlaze.scr" /S
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    7b0c931c9e5f4ae3b486907b8e65fe09

    SHA1

    abb761d0fe5318119a8a21204b56840a83c12584

    SHA256

    d21cfbea4d9bae6d62238f6c73b0c9d2b85ca549cd6c404d013e9f859d1e4fd8

    SHA512

    2f9a996f02606e5a0c8a288045644b43b45401f1bfd7dcc8593fde95573d77ac83b466af1d3b019f6ae444304f7c564a4685f751a68cb04d8f014d7001409c32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_E8C9186ED5BC2F64FC58A60C8F09BA16

    Filesize

    472B

    MD5

    94d94d501572aad958c8df92efd489b2

    SHA1

    fcd1aeba69e632c61e058418cec5fe1c53094c0b

    SHA256

    37e6327438daa7d175dcb22567308f1e6839f801c4ac264e6d125d3e91682fde

    SHA512

    95bff85865a2d3dc38ee26256f4c742f7bd424a6e2f3d3c87d0dfa6b816fca124634cea315e37858cb16743506c058290f1f949333a26b2d74d8d0ddcd2e8c44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    ac89a852c2aaa3d389b2d2dd312ad367

    SHA1

    8f421dd6493c61dbda6b839e2debb7b50a20c930

    SHA256

    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

    SHA512

    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_39B83AB13ED8E512BB8030E3672AA4B8

    Filesize

    472B

    MD5

    d8615a5a76bcd918858797e85e70d066

    SHA1

    20c6ea1886b974faa1d79e24537f1e4db3f5c059

    SHA256

    549ac44ac6ea11dc0bab9aeeb71974223270c8ec27b8ee5301ad400446d3ce9d

    SHA512

    25559b451268d2dc7a5b7705d84107e878fa7d859e15198169bbbdd78fca9c103821a47e7d13a1720f040673bbb27fee72b98e56eb5c6489984543162dcad8ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    a6fd9b7318c63541feb1b47927e34fad

    SHA1

    0385c2cd5e3227695279825398a8cd4567195a77

    SHA256

    e90a136f475c95b9bb5671cfcd203a5189c8873336dd23d3159d6b90d66a5525

    SHA512

    c03bef5bc255db496c8f872f8df87c1f4f6aa59953265f0c53d92931509470b1c593083117dc94c3e05042655d7bf7b4551b6653f2900cb1aec06ad9bfa637a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2f81ca24e6767140b6805a734c3a636

    SHA1

    fe6a8c0821920a3bc33ec4f86fed49f90d7b43a0

    SHA256

    b9b62cd238b78567815876c026c82ca61515556edd68c80cd50da4fb80622d72

    SHA512

    c88fac549e5cbcc92238237d2f8f2653b4c7079c316a005784f8e5fa5577864f4baedf64529cbdd5ea1709483de1f6250191c04c38e14cf7bfb1c8c5c2c76f04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_E8C9186ED5BC2F64FC58A60C8F09BA16

    Filesize

    410B

    MD5

    86c2a3d2f6b5e7a938c216b1d3588f7d

    SHA1

    7e5c968661dee343208dcfd89ab7789753547d41

    SHA256

    a1338c0c8d5e1ca18280bc0970af0c53746f6819dfbb4066ef0affda32d56ae1

    SHA512

    ccb55fd5ddb3199d2966ca867a73d0dbf0344ed30f779c080d785cafd09477a34553f3ea8d6c11dd8016ca986f967c1236c1495f4360812c4607178f9a031b23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    acb15e7fe304d813f4d74535d3a67d4a

    SHA1

    b1dfda729fd9008c2cef47009c75b9f80ecef196

    SHA256

    92443a845bee2526d0f14e9fec0cb7986eabf0a2ae8987b1f6107ec17dc3e7b2

    SHA512

    9452f7838f6783bd37bd0d4d9ddeb4b33fd480e146b73df12176bfc8eb624f6e61a02835627660a28c64972ab2bd27d24c32c193f7bd99bb763c8052c0f99835

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d26abc3bc7437782020449b76d4725de

    SHA1

    d80e8e945fcdce0ddddc9ab51180e29ebc159ee3

    SHA256

    4779fd19ca54122151df3a751292eadc380237fdfa19af5cd625f5d46d004d67

    SHA512

    ec51ef80b86eb106f995703b828cf855b5e521f592a8773e1e6f452bec347c3510e09788f0cda3df82c17b50f979795d4252a8088d894c99019bc8038a5db411

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_39B83AB13ED8E512BB8030E3672AA4B8

    Filesize

    402B

    MD5

    014dfec1e5bc09a3eb414a59cedd349b

    SHA1

    d096b9172d2af38978373c2852c2780eddf3a747

    SHA256

    13a2f73ce4a68b2309786861d452bad5c0aeec0a4daa92897ae65f64a964bfe6

    SHA512

    ab353d6a236e0a2029ef80514653aa83e786c4b2abf56e34ecf176fdc1e2dac94d64922a290d058d3d7f51f68123e36f5d894118bdfde0fbd73e7868240b0d75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0AJAQVZA\css[1].css

    Filesize

    181B

    MD5

    2185e243008e7e21de1e91008e151338

    SHA1

    84edabccc8bb842762c91b5c0bf8952b98f93608

    SHA256

    24d65ce5cfaf00f3a3b267848cbd3c5dda4562b0b48020991dfeb283d4de38cb

    SHA512

    4679aa54508e988a0893085205c596ce631fa66139bf514b8cca0ccf3f01df9e73ec7e47017975e35a464289b73421a7fbdb3aefa42d112ef6e20fe404eef7a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0AJAQVZA\firefox[1].png

    Filesize

    9KB

    MD5

    7f980569ce347d0d4b8c669944946846

    SHA1

    80a8187549645547b407f81e468d4db0b6635266

    SHA256

    39f9942adc112194b8ae13ba1088794b6cb6e83bd05a4ed8ce87b53155d0e2f7

    SHA512

    17993496f11678c9680978c969accfa33b6ae650ba2b2c3327c45435d187b74e736e1489f625adf7255441baa61b65af2b5640417b38eefd541abff598b793c9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0RP7HI\css[1].css

    Filesize

    312B

    MD5

    3ef01f3fc6cb57c3e0cfe4bdef583664

    SHA1

    16211cb89f3ac90889d518414c0fa2a19b7b4395

    SHA256

    e90da73c667938c2223b994b02d36fab3e28dc3ab70bc22bfb8a0c119fd9b59f

    SHA512

    c74d0495089d7430c34591eecd059db5f1e104d739a7f846b27b5d84423db0ec7141594df30e62083f6582770c18baf645422003fa74f435b5d5ef6e7ec14c92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0RP7HI\edgium[1].png

    Filesize

    6KB

    MD5

    01010c21bdf1fc1d7f859071c4227529

    SHA1

    cd297bf459f24e417a7bf07800d6cf0e41dd36bc

    SHA256

    6fb31acdaf443a97183562571d52ce47dd44c1a8dcb4087338d77ea2617b286e

    SHA512

    8418d5ac3987ee8b6a7491167b0f90d0742e09f12fceb1e305923e60c78628d494fcd0fee64f8a6b5f6884796360e1e3ec1459dc754bbfb874504f9db5b56135

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ATTRQC5O\opera[1].png

    Filesize

    2KB

    MD5

    5cb98952519cb0dd822d622dbecaef70

    SHA1

    2849670ba8c4e2130d906a94875b3f99c57d78e1

    SHA256

    02f95fbdb68f232bffd4f2c0fdd033d6c83b829c610cddccc0b1d43e2274e6a7

    SHA512

    5f29b7459fbd01e16dbd196e4bcddf109af017cccf31337abe1cec6cc5a84711fc2cd34ad7a35d9432a9d7e42ca23d7f6c9d4315396429d7b8e48b9491696afc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ATTRQC5O\yt_logo_rgb_light[1].png

    Filesize

    8KB

    MD5

    d654f892f287a28026cd4d4df56c29c8

    SHA1

    98779a55fe32a66ebec8338c838395d265e45013

    SHA256

    fc6f5d8f32f13d5855840234dc1bff5c91c35318ee2192d99b13eb3572f0bca8

    SHA512

    3668902aeaf792ad73ba51e0a4caaa520ebc38177791dfac9a9b28026c3bde99e721bf54d626f266a19cfd045a6d2dc8c8e70e53a2c5ee524c6f2736bb0ce409

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRTDXBHL\chrome[1].png

    Filesize

    6KB

    MD5

    ac10b50494982bc75d03bd2d94e382f6

    SHA1

    6c10df97f511816243ba82265c1e345fe40b95e6

    SHA256

    846a9b551e74f824fd7ace3439a319b0c0803449e8caec9f16e2666e38a80efd

    SHA512

    b6666b540aef6c9c221fe6da29f3e0d897929f7b6612c27630be4a33ae2f5d593bc7c1ee44166ce9f08c72e8608f57d66dd5763b17fec7c1fb92fc4d5c6dd278

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRTDXBHL\dinosaur[1].png

    Filesize

    57KB

    MD5

    bdda3ffd41c3527ad053e4afb8cd9e1e

    SHA1

    0ad1bb7ce8d8a4dc8ac2a28e1c5155980edfab9b

    SHA256

    1a9251dc3b3c064cfc5e2b90b6c7dc3c225f7017066db2b77e49dae90a94a399

    SHA512

    4dc21ef447b54d0e17ccd88db5597171047112ce1f3f228527e6df079ce2a43a463a3a1e4255828b12f802d70a68dbe40b791852134be71c74de97718b2f1d5f

  • C:\Users\Admin\AppData\Local\Temp\Tar1C48.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NYLVUMO2.txt

    Filesize

    363B

    MD5

    1a70ea1476e9a71aba2519eb0ca76782

    SHA1

    b325d128e900a8b0e097b015e452d7017912c57d

    SHA256

    7d2ff1a1293d585d9ea3ab197fee62a97498f7aeb9aea998c783b810909019b5

    SHA512

    028d58190ee906085ab8ef94bf0cea7e2172e8f90e3a47a64f527103eb2ea6533e18b385f2b535f91f7895dced945a1399cea96cef22a376fb68d5c6ab75db14

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PKU0YLM1.txt

    Filesize

    74B

    MD5

    02f41d2100ef50afdf7c8c8bfa98ca72

    SHA1

    be1f27f1bc6b66fb2d87fc28f2725a9e2caf3acb

    SHA256

    7b43a8df0054351ea2a81c9e2af24f46f43cc8cde040a1e4654e4210b8cd7a7d

    SHA512

    e086dda3a4771c50e904fdcc08b3529ebb5af38af9c38b48a72e3daa3e784a1908753d1cba3b2f0b56e6107b108067085ab1f1e0f9a099f281d717b6a199d445

  • C:\Windows\ScrBlaze.scr

    Filesize

    706KB

    MD5

    88a21c6abe4f4aa83970dd7531821ff7

    SHA1

    b5dc951995804ba10594866002a8cb0e015f7dde

    SHA256

    41f03deaab7c0a911e2073ab00c3110b704bd5f64c8fc103c50ecf7be6874d1a

    SHA512

    78f05caf5cbc9c400fad6fafd37f576fb5059f9016b162efa3956d6194168fa709effa7e1d3d7f40bf97a6a3e83b3a521caa9f717d3a3f6bf485b2764a1ba824

  • C:\Windows\s18273659

    Filesize

    893B

    MD5

    2232afd80e969319a4d759ede5889ee7

    SHA1

    70343447715dd1888c3aa37e87992d860c2768bc

    SHA256

    42503503d85b46075ba69eb170457ab0a05ffc39ead3f1c0ab0d55c287a57d2e

    SHA512

    0fa08fee837d254b3252635e8f3bf42af78db7f25e05be1a68fbfd79cc5115a3832942c802596bb925728b80cf165ec3fb82488c581bac67ff3013818b5b8f6f

  • C:\Windows\s18273659

    Filesize

    968B

    MD5

    b02e3b3710a443ce697e9deb4479d3b6

    SHA1

    11f647383234f32023cb46508080a1ea6f6770b2

    SHA256

    b85834d2cba8759527f47c1fc9e1d0ad7a13836e381f5448b11f1cd4f035c35a

    SHA512

    86cc6c2f8ba3794337f0522452788eeee17df1d8de1491aca6cc69a467f4a3d54b5f6564102af04425cb41cff255e17e2736cccc244f8c2f0a37b71d94407acb

  • memory/1276-0-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1276-79-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-78-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1328-89-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-84-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-85-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1328-86-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-87-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-88-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-83-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-155-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-156-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-157-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-158-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-159-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-160-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-163-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1328-164-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB