Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 03:35

General

  • Target

    8e1cb59d9b4995f148f0750e19d7364d.exe

  • Size

    67KB

  • MD5

    8e1cb59d9b4995f148f0750e19d7364d

  • SHA1

    1ecfc110d5e1d682cfada01fbcc73ff02cb151eb

  • SHA256

    b9f4ad753c98772c744cf6fd019cc2a6bd16dbe2bb14ae9eda2e22f447b17d56

  • SHA512

    9bef0c1300c610865fc048220064cf939b56c982c777aa61fa9e84026be431ea25c5b5da1a79e1899a90cfa4486614c5f9df521de5640dd9905fa7d31d370062

  • SSDEEP

    768:9xeureunneuIytcStnb6Xn9UgucR4XZjwttI9Nuz6Ff9LJW1XYApsCR6GJ4Dsxul:BcSZbtaRIZOIj7F9LYXfnxkU0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e1cb59d9b4995f148f0750e19d7364d.exe
    "C:\Users\Admin\AppData\Local\Temp\8e1cb59d9b4995f148f0750e19d7364d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.newvirtualcards.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2700
    • C:\Windows\juschrd.scr
      C:\Windows\juschrd.scr
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    a23a324fd9037062a9d36fa7be7beedf

    SHA1

    a42558f618e96d49c6fe38429e534c93abeac45d

    SHA256

    8bbab60f1e661d0554c06d698135145735886879136a89b9406d8daf52102609

    SHA512

    a34bfd7a0b00675956990e4875c5642cb22279e1dc2d4e702f7a6392c20bf90161fd2be36440188e6ee0a11e8bcbc71abc49b2c92a4e773cca80eb46fcbdd8ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a296252af363689b723f12ab6cc7080b

    SHA1

    d1e8cb9775da18948ff642dd21d1e453e2c2dade

    SHA256

    b68cc99de258a35f6f1b4bfa375c63ae377ec6e287bfda13149365894f60cf0f

    SHA512

    52b58475989ea2ec8cc213f308c2cbb36c1ee2f16e4c5a76b47bc6431820cdcfeb3c9760c239e2e7373236aeb7620cac22ba25df9c1fc7517168b57251a58fed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56d2e6cc9723d8668f0c566970a603c0

    SHA1

    2b2d43ddf486cdb4d1e7d17b8d3e84acc6c2219f

    SHA256

    2f70f344c511e419efd342c80afa108b8bdace62c77548415be850a78b142538

    SHA512

    79a0e71a727e2d5cefa0e71ef43c35380222504aa2f994471b9eabdfa6ea130f3a4c4cca0f12ec4353a4309f59f931a02d5f9386f164ac3fadf83e5432116fc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47a0f1d77fc33d409cfcc524862cfdac

    SHA1

    7e4b1af562f5dffc804f1cc09533819241ea4960

    SHA256

    d326c28825a86b4c6837095e26ff8e389e2d749dce5eda11ebc48af176f1dae8

    SHA512

    c4d453d774c5f812895d5e80d8e11b1d47260e8b8fefaaefcb13382cd26e33d7dc31e2027737de7fd782cadb3b905ea787f05329de00e5e5f8269aa9aebe5f45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dd2642f5ed5dadb26725a1b2afe3d05

    SHA1

    d7a8a393e948b77035cddac0cbf4649f5798298b

    SHA256

    8652fff88b28d27c3e808785cd3840bd126d50270c1efe54865393aca697d7af

    SHA512

    c7e93d4c18aa2bb6a78a19a00fe43e857ba56cf2b23cce831ea2bad065806904a20da01585499ca9f4e983ea88a3512a2959c786945aa8829e6dda0f6e5a3264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b052ae5093f6d5b597d37126ce0158c

    SHA1

    ed8f41382ac0a0b2eb4a3dc7ccb3efd8e2df7cbf

    SHA256

    0b9c370fa664402710e5d24674526fd91df3ec04b8a7e5e1f7867e0fddab9085

    SHA512

    8129271282e2eb9ba0c591a89bc60dbaa1dc8070d4714530848ab69513131f96b3f38a1a3879be45ba1417b781242c4f8fe40aaa93ee41333bb9aff87ef8aeb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    489c6cd9d338770a3fb40d7cde62d95a

    SHA1

    905920c0ef5c1e0f5389ca64e3f89e00ff195760

    SHA256

    6e14230ec5b50ca4308d6294d2831f3e1a7cfb59709dd9e4a86fc7f824bf4183

    SHA512

    32ea124d18ef7068e93ba4f34f1386dcfe77149998bad582125cf02dffe4115a864825e4bebbb58e5febbbdafdab8d008d9c466fb4682f0f312b2e27a31abfab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1d5e1a0959a8ee6709fe0752be810c3

    SHA1

    8e26c9cdfec6a11310d2dc3c5b11ba74024ed9d5

    SHA256

    42081ce804759a4329c5474f3de7a8d146da08af405aec3b0e414c436081afdc

    SHA512

    b972721abf6bbab477223c8257bd278a6d80170b1e997e9ec31747fa3a5c49cab3aaec64cb822ec1f3929424e0a6a150956a2876115dae5ad077f1ca63ba8c2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09645f6931e0d901954ef0835d75d94c

    SHA1

    03e78857eb371a0a5d12286aa4cd569810d5a206

    SHA256

    aa024dca96e5f468f10095c80cb7abf950f0f7ce83c1575856b27a4a4c104570

    SHA512

    a7275004ee469317060d6f5705d9039556f61f0504b9b4ff439bf780501d167d0d157520b05a363788b378303fe3dd93514868d0945d3e888ff968d5cfb00b5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fab5973a059d8ba328d8384008a07b22

    SHA1

    3f0debb6a670ecb6438513f00a4b163668514ee2

    SHA256

    f9391b56662f8b12dca2cc272920d843cd14ce1125230c99d3528b4ed4e73f62

    SHA512

    e4841a1d8edddd34f33a0ddd742c5376a55a5b213ce78caee926d2edc2485a7ba0237ff5c7e9a49efe671b8f437e3b46eb7a4b37f495c6114293a49a08a41035

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8213f3f9b02c40729eb5002e0168036

    SHA1

    b17801f74305424e708db1795fc53ea6a61b6d6b

    SHA256

    48c737ce1112abbf058e8d285c14aa921f31dd14b246f641d82da107feac3bfa

    SHA512

    ca7467fe43bd1b78b3a519a8b83df1b3c2ef70fad4f58d2698757ee0c9b0c71eeb5583f8eaf7228928ee80b0f9e3b13323af09cd7a9bfedcca5293f532d8cd50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32cf2665e9e37220e6b8831058e1d0ec

    SHA1

    e5697d1e19442807b1d234f263bd56396edfb35c

    SHA256

    3459257a19d59c9a5223a85e3df06a9b562a251b6a41fb6926cacb2bfebbec4c

    SHA512

    6aacb3e390af6644c9c3950306fa59b6f1d319ff6e4819f6e08906c943b7f91ee616158e0ae53b33b5afd7a8df6d557fe8e8ba5effa72e5891abd03eaf597a3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87e241a37c9443465d95d9c25ae91c0c

    SHA1

    d422db2e3ff2212920c6a4228ca6910f958907e2

    SHA256

    58aac41ec00142208edafaa119493280ad2207147c03e6cfacfdec4d6be012ea

    SHA512

    b2337f88f8659f63824a6537111fa2a117ee7c7f1eeab54fcb7b4318f60aeee3fb149a21b514ccfc0715d2fc53a6761c897f4d3ea28463773437c9658b700c5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e244c6141b68472e8f57fd4f5be01a79

    SHA1

    4a9c975a5523033a3d1d4e475647f5cd394d1026

    SHA256

    d7da6d5282f2909b822b9855479bf07d2be8cb91e571638be88ff434c06d8ffe

    SHA512

    d51d6462b92358510492e06537e49b4f09bbad6a451b8454d5899a769aba30fc60ccc5bc036aed98ab3f727fd973687445a5ea82d6851f5dd484b7bf2c73a12f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    937d3dbee36d0c466a15050f2c75378e

    SHA1

    4ccf4c190f929973a1e5dd46a2285303449e09ae

    SHA256

    3bb9e9e26079019d9e48aa0d382aa0af78d97d8babe37784d68884567bc7f1b7

    SHA512

    c0817099b18191a2e314296dc1e8c9e63ec2189b86da4de39b6ed68e57f3a86c682f42cef26ae622caad9d12879143c777c2ffc3cfadbef16188ca10a8c8764d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04df8360df50b0d2f8d4fbd0fdd7c441

    SHA1

    afb90959fc32904b035979be5be76e07f7a545b9

    SHA256

    c1e2e611212486fa3971e3d442f16a734adfef940dd4fe43157643cffb51bcf0

    SHA512

    c9700d6890ea0103d1c0de1a63d31ff1a078f1a480a82bfae9e0e61660c6fba79690af41f83fae8a3888303e7acf992d732d347df5e1584a341de3c882f83b25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d504b69d862fc13be3d1d7c00afcd76

    SHA1

    3805d1f356836b8e0a8cb06b1222416e9548baf4

    SHA256

    920b6de7411adec4c82c56fb6b1d3856efd291c34266fd9e4508324af7e0a6b3

    SHA512

    6db86acf8ef3e8bef806379646ef1185681cfc901f47570b6bb97d75f1e5f13da902f5998c2492d20b153cddb655a8b428e9d0a8ba4c1d3847d834b24afbc579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8e8e5252518694f9cb836b45a1ca32dd

    SHA1

    d21bb94f7d6713eec5df9651726bcc11084f624d

    SHA256

    42262bc84749b2f67c5cc4143334f13d1cd6795a79c2af6c05f3a5008a516acc

    SHA512

    2b88dae8375d106acc19cd40a65a7b083aadbc4478d46e68a5607be7e94c9c68bd930880a72f1fd34ebf9a297906e5f2fe883e145af10ee1fa2d7ab5787ed269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80dab29902d3743e818fe598003a1397

    SHA1

    d9f39c09f22e0982dbe8ea902c1163e7fe78dd7b

    SHA256

    4b9110f7b6d8b6c93cee238bedc579b818c2aacfcb755cadcdd320c25acc27f3

    SHA512

    decd2e9bcf81687856b0947de5a9851a83d36aaba1fc35006efeb0648be332eda82350ff01142ac84421173cc96cb0a75aac2d27e9f32b642d836a7681ac10e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39c8578bf14056f250a2ade2cb81f984

    SHA1

    c591c8fda0912f316ddea2cbf66db19b749c9f87

    SHA256

    e0b211c397f0db751810c1c19dd2bac569883cf700f65b854f81a1fd449bfca3

    SHA512

    c800eda98adef81778c9b68a10b553877c6f32344591c47d889b38b164e09c2f147d442a8c3c9c5c387d26ff9096390f6d923a52ec7d0695626cb0d28b4fb5e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3cc3e5252bde2d6dbd098316a0219c8

    SHA1

    ac1779d7bda2c60ecc4729d9d794e0921481ef8a

    SHA256

    c91a3b315ee3e23f376e4bc1d13fba8d5051f4feda8088c9e4fcdf9e13e9e66f

    SHA512

    faff75fb71e4dea4398303cd02b232c304175e0ec06154f9841f1bda08e9797dc8dc048ea1f5dd1cc878cb43cd838116f39a975cc2242081dddda18f2d26e875

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    92a055982bd63513323209bd3490ee97

    SHA1

    628a1108f1c2fd1112e891e120be1d669c352f2d

    SHA256

    e3a14c7e454b2b61b53f881e81426120f15fb1bff8451313ce81b8477acb0bb8

    SHA512

    6a9e9d63127cad5cb72ad5d1d1de21fbc8c311cebdd4a8d7d696ecec38d4c5b7e038f6dc0ea6f8dc5194bd84d3dce5919c718cacc5dc1a6745aead5c6e64ed00

  • C:\Users\Admin\AppData\Local\Temp\Cab4607.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4752.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Windows\juschrd.scr

    Filesize

    67KB

    MD5

    8e1cb59d9b4995f148f0750e19d7364d

    SHA1

    1ecfc110d5e1d682cfada01fbcc73ff02cb151eb

    SHA256

    b9f4ad753c98772c744cf6fd019cc2a6bd16dbe2bb14ae9eda2e22f447b17d56

    SHA512

    9bef0c1300c610865fc048220064cf939b56c982c777aa61fa9e84026be431ea25c5b5da1a79e1899a90cfa4486614c5f9df521de5640dd9905fa7d31d370062

  • memory/1532-7-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2532-0-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB