Analysis

  • max time kernel
    65s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 04:19

General

  • Target

    963b37b4582bc3f36021b801338a8363.exe

  • Size

    14KB

  • MD5

    963b37b4582bc3f36021b801338a8363

  • SHA1

    285000b5160ba424e8f084c37a7df99f6e9833a1

  • SHA256

    06fc1779292668a9d5aa606e5d3c06390bbbffccf24023be28a522e182ccf36a

  • SHA512

    63134930f805f80af94cf8220d609359c0ab6fa015ad1370eb32c2936fa8ba40c5aed253d788d961c945423ac64521249835f43f12100b78038ba0b059cb54f4

  • SSDEEP

    384:+7Jn8r3JUv0YLq14ukfaX1tJNNnU/s7U4:QJn6ZUv0RkSX1b+WL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\963b37b4582bc3f36021b801338a8363.exe
    "C:\Users\Admin\AppData\Local\Temp\963b37b4582bc3f36021b801338a8363.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://a.doginhispen.com/149/in/htmlg2058670254.html?cid=51094673&aid=10381&time=2058670254&fw=0&v=149&m=0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08b227c5f776cdf9940c9a9ca2825ae5

    SHA1

    9cb39ed9be81629abd0f4c259bc8e89e5fa787fc

    SHA256

    ce6a50dc9cd4f42e85ee103c0cf533154703a01b6f7fd47d8fe19685568dfcfa

    SHA512

    0b406bab93bd3ad22a824872a772a43611ee73384bf8e0a7950475a9a5a7b543147dbe8600d73d9e529a50bfcecc8df4150afe4cf90c4a6dea7c194b901f4731

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8d1b4c770d025dcb35bcd2e8b716a06

    SHA1

    e12fe67ae8a3a19f281d3360b1e1fa1bde725bb1

    SHA256

    47574d6b94d075dfd5223f3a1c73a061399b793f824f787fb70d9e287d06f06f

    SHA512

    a6ebda7143a814fda60985228de5f6b4fdecf51a0a18d0eada9f43e40407f89aa262ac7e803b1a1d207f9f1e706c67a7f07c5159483397ce86fee0dc72ba00e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ce90f14b7d795b46e79f4154c768ecc

    SHA1

    e51e9504f3b566d7923fd5ea254ac05bf2fca59a

    SHA256

    fca44b3bae772879140a0784b870620b2656b99292556b75ddf8c68842918c3f

    SHA512

    cbe55972fc2fd41a4676bb2295acdcf5e0daf8b0da14e7033c73dd0303a1229dbeb3506e5b13e489219797181ac073fda6dfd159e4a93b2abe3ceb9a30d25f6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1fe8a739bf6f0406bcff461fe54ef70

    SHA1

    765a2748dc6bb088f1243fdf87a6109839e2c639

    SHA256

    ca707c16616ef4a56dac7389e8160c2ba629474aaca713440b0097a30c9c98c2

    SHA512

    6c4b57601365335026aae389fd4aa0f70a773085f0ede83fc48e38fc3b0622b04f5e0ddba24432fe34f77857e4c0985e00724b6454e39eff8ebc796d8cd5da8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c44d27231cc2474bce2dafb7f45946b

    SHA1

    876cba5ab1b5e8121d8d16a3d6439c93dc24367f

    SHA256

    91802f195ca25f5e27c8839bdc5aa14cacb74090c6d0a20aaa3d0f7efcf057a6

    SHA512

    d26b2ade4c78417c4c575eac29fc56a15003fbd430b38bc094d6f06e99537bed1055e2cbfde4ed76157214d62977ac9919585cf351ef7254c37e659916a1aded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ffe8bc873d4a9d67fa0b6347cdde6f9

    SHA1

    788d7a8ce0ca38e4b2dd5d6cc75df03ab1f8d8cf

    SHA256

    c0e5bbbb6664b751499b77da74b9ff7dc05d8b48de97b143d299933f6d005493

    SHA512

    6963e40b497fa71302e871d9bb2048e818442d8d68c4d1800589d50dcc0efad76c7fdc76a65d722ba4a1ebc3f76adc7bb07d4ed7ce104d36a05773e79e2928c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    697eb79961e78f49d2d9c3483081dd1e

    SHA1

    0e8d9440ecfbb9028fad22860b09242028a14d50

    SHA256

    44f5f5110fc6919fde4b2cce61e51f9436ae39d1ec3790dd081030ef803c9fe3

    SHA512

    6c6bdcfad17ac7a6b7e43097bb59523d00507b2ff53d1beb8cdc23ce974985d0a220ecaf81e356f16270b4b4866d0b0df4833553cab4272d3c83e90d757a9599

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68050798699b5428db540cb2fa178ecd

    SHA1

    c4a02a69559fcf84e0dd20ceadc6d857a6739237

    SHA256

    dfc2164383a7675f0f3902fb74b2df472f2d775b3754b832dacfe4a5594a1d8d

    SHA512

    6768f5ef104bfa3439a385c618cad426095274892c848b76e298bc111c15176ef86cef49378b39e1a1130fa7ee9c995c186acf111ad0b9817dffce1e4ae2ec61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    199e7d94e837cae808963a6f5b40bfeb

    SHA1

    dbbb8c0e1ab77c02e4d2a0bd895eeb79908d1497

    SHA256

    32032eadafd9f7f3225a6315160314f4d6452a43f45c4c666ef6a251456d6032

    SHA512

    aae405b0e55180e11c113de2142730ee4a456892f41336dd5b3e8c4fc9c97f93be4b808f51dac90feccbb42760fd18af1b52f9799e0dd45e32d81df0e6d74693

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53f66d532e47f624838c03b0b8792220

    SHA1

    ebef7e7f6d731a636ae9006e8d077ce1b36cf27c

    SHA256

    7c7632e9310996ed8f9fc486104f18c66fd5e1df5afbc9134c5753ab98d8ae98

    SHA512

    615311a7378a38192700f153df53e55102d1162a7030b0d9d153d76fa287bd7a46605a89fb24677fc034671ac18a911be73340cd32ced26f873fd8246a0682a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adeea03842502748087f10e0b27ad4a7

    SHA1

    e92cecda9b102ef3aea9d4ed7d3fe7c6c5d710fc

    SHA256

    276e3de4a6b689c2bff87942b277a91ff0ba4ed4b97cc3b47c58a9d0f41dfad6

    SHA512

    45fbd796108611779691bf3ff2cc8359b7a15ce3efecf1dfadbb2ec58830afad09011cf60cb970184ffb453d8d6fcb5d929ab8c42071a36cbb9890600a0263bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a7463f8f2aa8166e407b8dac9948abf

    SHA1

    276f81f35b1796fceb785a2697617e036c2ab7c2

    SHA256

    478096e2511f75b15db8f2b80c42c3e476247b37417386809d9dc1d167f8d60b

    SHA512

    eac8b0695c5a2ed78dddc8365d1183f92cf1e9d93f25b30188925f9e9b05015ee854a464ce7cf3efe4b0c56db2a7375e6dc9e74d8ad0d14a68650943716743d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b85ddca61918d4bcc4292d7717dc154c

    SHA1

    cd4a98cb37846ed14d94f48e0314277aea8538f2

    SHA256

    d6e2fbc188980012801d00a17d88807efa87646720cae251862781a6dadaff03

    SHA512

    f885182ded8ccf8ebacbfc1f54b2d071c0a91ed05ee40e4204bc86c27a86d0b4990370ad70d97598a92d951f2684e15fb54be1d7bc5789f7365d6ad9d2f1111c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7b9e83e8ce46d7d8644d11e2ae3df4b

    SHA1

    4b4cbc8e3fcce2951d31804c79c4f4a8a6b1e4b6

    SHA256

    5ff33f3709bb5acc2f360b5be35f946bff4d1a148444c79b1238567a027997ad

    SHA512

    950de24d3cba494c99bb96c2cf83deb9054f68a69a26bdcc1b1af7e1f11f4d0e6a61cbd11d64fb91f07e0c72e619ff9dad8afb99ebed8332d99201e070462f66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5797740f6ac8ac5102c06152273cf937

    SHA1

    9643b044e112a0cf1f5fe43be7838bcb5aea3508

    SHA256

    dc3f6e2848178d90c7776fcdfa15a68707c9d9d348d472ed2eeccf354da60cff

    SHA512

    c8b9b797845e7d3d0e1fa3bd2b337e3507e67026e8c44198bb4f62fe7fefdd6d969feb96b077ccabb8a47f9d7c52047cfcd2fbebe8b1c30a094477aa79d402de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c2595632c808985a1d193496677b91a

    SHA1

    8b03d6cdb074ee26d33c324d72c7a6eb49cafaae

    SHA256

    39eb5e356903f2b7079fbb1d04d61478989c4831256b750c31577148a06d762c

    SHA512

    749de90bf347ec5c3745d446842c004b28b1005d95dda4950e42a2bfb61b0c8dde830ea79f186501e5c41d5817d3bf7d18239451eb317961bee580c5954c37d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c266984e4bf97fb3b2e019d459d764ba

    SHA1

    aa7bab0b07e6bff072c5e81242ecd014a0ea091e

    SHA256

    3912007affde14eb8db7d22e629f3abc9a6574da1a638a523e8a48cb6f08c115

    SHA512

    23aba39f0181e782840ec69fd25c6e6c54da0f66b3c77f6cd71f4a868bc6b305575f29d84deba1221762421b1a5d6ecce56d6bb12078385cb23610ab6f21cbc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bd14e3b2797a475a9c1feb47a55028d

    SHA1

    2bf13141186616f6b26f9f8dbe05a6b0bb295a74

    SHA256

    aae40d131e49b90db0fac91f7f5ce03222b8f3f1ffffec2182d8bf7233ca2005

    SHA512

    961d815282ca03765fe011f78ce26eab6417d06663f863fbe26432e7cc9a2a7d856a9a1d4c934db7658a5df599d9650f9ae512da3ab329250b61f14aa91a3271

  • C:\Users\Admin\AppData\Local\Temp\Cab3841.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar38E4.tmp

    Filesize

    34KB

    MD5

    edcb10e9e6e0c28247d301079826192f

    SHA1

    a3d7285901bd960f93d917f31584d39ab2edcc3d

    SHA256

    3e41df82f4e9c8af988ae4eebc30009c2b9d11a3f01905c4ab24fe29e236455a

    SHA512

    c7d1e38eacd06fa2ca0321f85583a5e87618d8b9d96865605225432ce6256644feed8009cb360178ba2288408d8977667fac4e83de27a925918518649c601fb3