Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 08:02

General

  • Target

    88fc9afbf2ce70f9b9b3055f2bf15727.exe

  • Size

    5KB

  • MD5

    88fc9afbf2ce70f9b9b3055f2bf15727

  • SHA1

    3b2af13a2d00f07ec0c098f679db249ecf8c3372

  • SHA256

    9e79b00a152f610e6ceef27e43316621740b946557065c162bcd1e338db8b581

  • SHA512

    111da5f4c53980390ac52facfc71c0a5bd4e60afdbaf9c58252fce2e03e52f59652f2289683040aa81138f3d837c45b11b967bea626cb28b2c8c87990097856e

  • SSDEEP

    48:ZvtTaoUSQ//HL9bIzIZcYFpurFBXVONM8KHHAH7dhNAMoBAX:Z132nHLq8SauXXVIwn47hcK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry class 5 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88fc9afbf2ce70f9b9b3055f2bf15727.exe
    "C:\Users\Admin\AppData\Local\Temp\88fc9afbf2ce70f9b9b3055f2bf15727.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\regedit.exe
      regedit -S c:\temp1.reg
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Runs .reg file with regedit
      PID:1036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" %1
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2636
    • C:\Windows\SysWOW64\regedit.exe
      regedit -S c:\temp2.reg
      2⤵
      • Modifies registry class
      • Runs .reg file with regedit
      PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\temp2.bat
      2⤵
        PID:2552
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\temp1.bat
        2⤵
        • Deletes itself
        PID:2512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      65a1e4acd3399edd01ed19e27a31bd0d

      SHA1

      47cad8d30a39c03c26429c61ed34fa782a0bada9

      SHA256

      351eed173bf755937117057de45adfc89553f0a20515b28a3bd54cadb15b2ed4

      SHA512

      72140bb201bcfa78b8318d580743f1403340c03eb22ef44ac19e74c5c9bdf8a918d15eaec4371665f42919dcd4eebecc607bbdbb143390958788c9a607595c27

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      728f8fba931033ffa90e6893cdf853b4

      SHA1

      55f0df874b38b9759c841c0124de0c31360e214a

      SHA256

      2a3b7a349a5a9a6d1e3d97f9f674a4b29dfbe82206dd86359452ed2018c64648

      SHA512

      10bab9f1a58e6af18894a292f54b62873f3bf0fe548a39634d2525ffbeba4d00d7383f4e4bbb7a52ce33c189dcbffd73a32f7ec29361d242606a3cdad4897132

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      17bab1439ab9db2b30ddeb0d9b8f6153

      SHA1

      e8e1dc2cfe596ee36a2d687d2768215808d2a5ec

      SHA256

      29435518c8819b7364b2caad0fca905903f7cf1600252b51abd4e3bb834093ac

      SHA512

      826e877bc96150e18dfab98ac8da525ef6cca15adca1c4abe378dd26474d646d7ee6366218fd8b2c9c6b92836fcaefc6573287b7015ced5177534e1b35335147

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ff1160d972af0bd88d90d495f0e6a76e

      SHA1

      ae135db89333a96d5c585a75df440d0abafab2cf

      SHA256

      f2284e5c0f20466e5696441aa270d081bc0101ec195dd5f6c1545261980ec9dc

      SHA512

      1a015db7261cc35e8c99eba60a9b0b1c1524e94de284723538e15a1b418c7eb2a762028e611528ae080e3bdf853392010f97b244dd7411291cf36e181d38fe68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0a2fc18c4d729de9a0e3586125eab7fd

      SHA1

      598f5c3d9b5844c2b7951d2506f0be2c1e9c96fe

      SHA256

      dd0ce6d684f9dc02f3912f1c3642904fe261cea55e2b4cdb56bc3b6c21a1554b

      SHA512

      d6be24e4346b76b589d0562aceac17754a94217e55e091a8a85faf574a7d32dd0849f7cfdc28e2a7c87c3d249efbac670b465bd1382156d906831be21a6a217f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      85af73c1a3f71ea6fa5c5e8509d85277

      SHA1

      35cd1750d12f012dc7a14ad0ae096cec536c63a0

      SHA256

      96516292410f2cc993d52402c7e0e534464210aaf181d6a37ba6a82516d1150d

      SHA512

      38417fb5de7e17ef40be22488bf46fcf8ce9c2b8f5b2fb787e2881a65717aca8f88ebfed035abf0cfb25b83d736144698bdd0c0deb609a31f90a459704421bba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      45b1d8bb65a5ce28f59699973811ccb2

      SHA1

      f46dbd29da4caa7150b746d42ec48c018a2bc99a

      SHA256

      b9929a1fc99c6f30a3b5f9e6f7d09e38cd0d33110dd37f08a547cc70a8cc7a86

      SHA512

      b865dbcc45853d6cfd49ff4ee5e330ff5cd3c33549d0c6967643bc3ec191a503e0a0216ed33ed3d3d053c016795363653fde0ef9c5cced18252ba3acd0a93679

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      72fa08542415ccc18cde891f31a3c0a9

      SHA1

      971985afd494562478ddc9866d566744d52a7803

      SHA256

      5c3fae5979e63793d227fb97f063ec4d61371f1de995bf6209a8bc2abb299ddf

      SHA512

      2b8cb889c5d77841811861872492c18ed568fffd2d40098a9e369a2d12b8811a5c810ce1323e3f004d012af58232c1a74080478e61c63fb55fad90ab5261b35f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      60db9aa1b34a5e408133adb0f0c6efa5

      SHA1

      639039013c3d53f5f4ae7d915acec2a459a4f89a

      SHA256

      edf4e74db540441128b2d7df140ca641820375a626288b4116175be1da48484a

      SHA512

      67ed9d73082f79acdccd4e93477b2630b1475629724effa8d00e81063c3b7fa1db94ebdfb28c6981401b73f96da67856e58e4fa6448162409073fc46797e5237

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5b5307683d35273ecb4f8f684d3c2195

      SHA1

      4bf3481e49ca3b2e70830587e65a113a1276df70

      SHA256

      b945f55e355c1caffc825722cc5d557bb38be5023faa1cf40bdf24f02b2f2ac7

      SHA512

      22a0deff912e058accd12d57095597fd064335a127b8e40e066f682e1ba44044353f9f61ef2bd46cca1e977b6f5812ddd902aeec313a9f1c06908b3f44e3ecdc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a143b93b4a14b9226c57ae4f9425ae90

      SHA1

      bdeccef68353003eea9ded54dc7249bf14da8635

      SHA256

      f7b45a8bc2078aea3a32bccd84eeb2d4329f60ed1a50540026f01301999fecd9

      SHA512

      f08e516b8cd61ffcbee4891d022e3316cff6ef9d04caddad913c5dafe9bc4a568c116c9b28e05ca07b6693a88697d0be8c450b413780a4e9b1c45c51e5c168fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      116725f280a12f336429c24de69a68a4

      SHA1

      f6bff4841d0df15c4b322c48fecde367594c183b

      SHA256

      825de26a74002210b926d68239c30153f13c3af241b2952b6f61523b8e4f132b

      SHA512

      44ca9b85e672f3a4c0b9b05d35b2abf1aa503dc1e4d1f5f6db1a5e180c551b817a59c7e7e313de3d54b78cf7a439350efe9eeb92e32c53c6599c788e8f8404c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      acd8c7a1cb0db632438662d4200347f5

      SHA1

      01a3243e4d0d647ae71617c934f42e6a16d9cfd5

      SHA256

      ceafb4ac9a56b6de8bd0c3f89bbf11d5459f46cfae89457c3a8da41a33d18e3c

      SHA512

      8a83491b8b80e20a4641cb9ba510aa58e748992862d190a228f296fdfa2b9537ea6c349345faa4dad22e994c9373030fa56f67e78b748181fe71c8da4954fbe9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4ebc1b162795dd5adb256c908abc766b

      SHA1

      926cec8dea6e0ac588828855da31f8569493db76

      SHA256

      f8347ddf23f3059d6cfe87ea4ab6dbdace19aa2571c00e4533bee092c9338ea8

      SHA512

      153c3dda737ea68d5f4eb1815f8d8ea34b21b2f8ca7d24a2feeffec5d0def6b6e9ede88253c5202787e760ba77de335cd46d5c0cbfae2ab708010fec2ce60957

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      505bc4d0676cb9065a76c92be9919118

      SHA1

      400fe0ede3b2e354e50966270841a563733e9652

      SHA256

      3699cb2bfbcce6ad0a7ea3806393ed178a3a4c718a7ae731a353bb249cf424ba

      SHA512

      2dca7b7aef00076ea62817c70427ace5562dcd6380256bcd379502ea88cd6e7bbb319b03e8fb013dcdb8ec3d8f1c29c109c81affba15bf2c5c507d217c72bc01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      71e5d6a3ce54234259f453ad7c715e8a

      SHA1

      3e2ef77b9588c3b38284e06c5068ed96bb52dd0c

      SHA256

      a3ab1ab4b85f61cb9a32d1d3eb9a918869eee9a8ffd38241434be9f79b6d4628

      SHA512

      9d4df935082b27b0bc134c4d4f7dbdfc7c41e198f148058061b7237df845466f043b6ce92d07f86048ef3de30f853aa47e4bb735943bdc2c120f3ce93c15840f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ebe68df94f699ed3481870444fde6172

      SHA1

      7f6ae6b23c4d4457341943d3dda20f5ea2a1e4c3

      SHA256

      0959258c1b40822c2e8674fe81f6f1d1e34b5c82132f0f6a5a94b8cf634d4363

      SHA512

      977ea240989e6401e666597e97433d27d61d1310744c5ec12ec50550d06363519c2b48c4c825a8190d7c1710f5f0848aeed491e11e1813c5e03abb8f8ceb05d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      70daba6a5fff9f30d714e614bec0c8dc

      SHA1

      852285df6a3b67b03db443ed129a6f2b667c3343

      SHA256

      445a728e7e7d989ee766d8fab87abf1db4054067db86e18d080717fab67df07d

      SHA512

      567eec10458d38a75d7f9db7ee84a1ed56e3084b413943e8a747b0d97aa0af4820a9e0371b2490f03110b67551a6745b8cf9e16db6b36456e2aba7a059fa4da4

    • C:\Users\Admin\AppData\Local\Temp\Cab67EA.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar686A.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\temp1.bat

      Filesize

      196B

      MD5

      f9d03e7273985febb2e1d4152d7edea5

      SHA1

      cc9548e31d4f924d7350138975b18001241b68bf

      SHA256

      481efba00f8d421c9ad23249ad6052e2831b01da6d7058fc1fd6f19b2faea28c

      SHA512

      7977eadd94bc8a88fa237961542831e3b9f497992fe414d6f81ac4960a06d3a9449130ece49058792b8f5af48cd03b98f88ba1bd65e7e5fe1c450a2e164d0774

    • C:\temp2.bat

      Filesize

      84B

      MD5

      b9975d30ddbd098a754312e16f744ec6

      SHA1

      9d41e8816bf8f8aa48356c99af46e64947a0d2ef

      SHA256

      6e4f3dd8bf9469f50bd04878da2bb005a9df85192a5c7428b4477cecbfd4747c

      SHA512

      5bdca7782ebe7a2d919c7c096d0b2e9927c68044a5ca802ce7a43e6d4d62fda7b5d7620a1154e640c9946def1b13539a948a58bf13697f897748dc66e3406c02

    • \??\c:\sysdump.dll

      Filesize

      4KB

      MD5

      0f5a93076c263c6bd7dfcaa6ce495b40

      SHA1

      679a41c69e1496aac73db8fd8655a52faa4a82ee

      SHA256

      140e42773f64358720b593129a59d9209a4749185c1f347483b051bc36007d3a

      SHA512

      b0e2d40d67323e27ce129c0eb2eff3ff5cf49271382f0cd01053047a7b00136f0cf15e2349355ed53e92e9a5f608c85d79c41d594683c9a2719de24de7a55568

    • \??\c:\temp1.reg

      Filesize

      435B

      MD5

      492eb2c8ff983e87c95ca5a704c6f5b8

      SHA1

      8677a4e0d606a526b1c90f180116dea7a6bcb0de

      SHA256

      9f0388e16d77a4560acfe712ab8a8c6a171c5d369c4134cd3af9bec658bbd431

      SHA512

      ded2c5fa380fcfaa346dcb33a0775cc476ee7f152b0b54ed34b3e97958e200f1f9f01ed546adc2241d2462cfaf39e9e273eaba04cb2efcfbf7085ba9251acd6e

    • \??\c:\temp2.reg

      Filesize

      128B

      MD5

      6fdc273e79d8888a813c762aa55edc39

      SHA1

      a3e72c4eaf143697e3c1a29c8b1c223c121e1d58

      SHA256

      e0eb2406ae229d4df0d3ff5bb8f9bd907aa947b51fdbb6bed1a3238852849f6c

      SHA512

      370125ded5b43b67cfc8f28363086fc9b2c85c6fe53ab1e5e00281cf87292650b2abe7bf9420631ca405f4c7e213bed00c53432329cc5f7d6d1f615a02a1f253

    • memory/1708-2-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB

    • memory/1708-20-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB