Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 05:37

General

  • Target

    989bfe4d7a6cb4611ee67408314ea268.exe

  • Size

    170KB

  • MD5

    989bfe4d7a6cb4611ee67408314ea268

  • SHA1

    ebe5f6704b13633ec40294aa801154d867b474c9

  • SHA256

    929aafc0d8a5e4d7e2fa7e398bdc1ad41951a1c0626146b2e80402987a80b6fa

  • SHA512

    edfbc7ef9e67bcd9a1066b4b41ff2551926c1d443c641dec5cfcb623d55ef88dc3b51fb2145884e91055c643afd410655f557cd585cf30bcc28d5428576e08f7

  • SSDEEP

    3072:4+j+V+sLCVpc/mMBhtQw6nfieLafITdQAiGcTcXSTjdTale+WDh:p0CVQ9qLaAT9iGgK4j1aURl

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\989bfe4d7a6cb4611ee67408314ea268.exe
    "C:\Users\Admin\AppData\Local\Temp\989bfe4d7a6cb4611ee67408314ea268.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\989bfe4d7a6cb4611ee67408314ea268.exe
      C:\Users\Admin\AppData\Local\Temp\989bfe4d7a6cb4611ee67408314ea268.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdf8adde6a3e223a3a55e3ed43d9dc28

    SHA1

    d4f05921c5ec1175208b73aed07e6fd9d57b4fd7

    SHA256

    afd512136f08377ed63ea64c64f289202c96273d330331cc47beda1331e455ee

    SHA512

    fc3af3f89c291b3ecccdd768e6cbaab32fd64725bd65387f9951ed07badcd6cf748eee13221edf5f6f2b23920d9c118ba8f3925b3f0aad95c2abde3c045ac9de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a755a3a4994fe0e190356531ac7638e6

    SHA1

    e8f6381c3ea1e7b88fcf137d58654cffda6f5d4c

    SHA256

    4bd0ea92cf665f50acfc02f52f15a1c0ae68bab19aa4a464175388ed121e6ab2

    SHA512

    c30efa007daecdcaf39d8d3a23d72ad03391061eb73cfc798505dc3b32918a5707686ceea998edcd00877955e502be7cb8a8f7df2ac476183f1e97dfc01d3aa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6499177380399c69129317a39df1d9b2

    SHA1

    17e83b363c20072be5d5c95520b36533c3f51c2e

    SHA256

    9ed253f7f54c98b4542cc91ac56ee5e5eb3b416192e892bed9cfb653243572e9

    SHA512

    748659508547dc2be4f714b0c8d773c4df96414aa403495b1244e286972828a056f10368241085f89a58c7070c47b0c101388eba5fa3541a4fb70520727d107b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0fd997985b44dc02895846310c242c7

    SHA1

    28b599590dbc25f927257ece763ba9cf66df6844

    SHA256

    de862cf97d35d6fe550e852b0ddb5a09889aa57f8997a64514e945996a2f8d1b

    SHA512

    8241e1159f532ef42f083b5095dcd8bbdd1315e87ee17e02dafcbfc4cd05535350db2251735230f80dbe1fe175b75f0c2e7589d0a14773f3f3c1ec284bd5af46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bfa9bc54ae958f94c2e8d4d63187026

    SHA1

    f646e26cf149614252d0c10a37dc76bcf6d88d3f

    SHA256

    37b661b6002898a4cc40b1f9d7a88ac51bd87d794766d446bd29fdd992298862

    SHA512

    7efc4787e805528cfd2f1c4de4f4033cc82027d7915d6177f76705cf5f6eedbd299d04d8a24b1d0e816dbcb81c40a95aa8376f6ac5904acf1799ae5d80583b6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13281232b6755f13bcfbd6941c167bfe

    SHA1

    05417e5175007c35545db6792340a379893a952c

    SHA256

    a8abd4c5a1ade86ba6bdbeab733cb0db4f18ed19213f4399d6a6c392a2bf52f6

    SHA512

    f7867bf8272c8affabc54e6cef676a1c860aedae20959075009808b4fc624f6747f0331a10d089b7d5065be6126f6169b5a224b6a7232349b79e330a33cd5b0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6933d4ddd4ea5ab726eb7e0c881e440

    SHA1

    f74044a9d90bbfdaa6d7fe4dd0f9299f078944d4

    SHA256

    3f83bc8d1f017a5e9412da4c2e41e02757e1b486d9fa4c5cb4c17e812ac4c023

    SHA512

    0738202a066aaceaff9201d980dca7a40cc9c02ed7fd03600c7f741b5bbca0d9dee2690acc7393093940e9e17c6a6b9b26d4dd7def66f05e4767483d037e4d42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1af1bfeff48506ef341997715e7d0cef

    SHA1

    3fea3b95752b566b924601b0a2f6eb785fddadfd

    SHA256

    46cdaf82c212bf63b9b27d2bdc56dafc4d1aa7cfba60e30a9be8afe97d7752cd

    SHA512

    9baf7cdee24a768e16d4b957c30835f0501afdb18a19347e9b5713c074c10fbd6394d58841f0f9d93938b438573b7e5bf191298b59f316e66e3d1335a1d65ba5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db1ec656caeb933bbe7c90cf775a5bb6

    SHA1

    e309d6e5fd95ffe4667858a2f821fb832252448e

    SHA256

    314c7873db41590e9b603657ed896bc198b8bebaf4aedbec83d3fe9bf4ee1b17

    SHA512

    901a7895b4af238fae06166fdea2e2aa2051706e1b921b4344f0460f459467070ad9b6b98781051777484e1641030d1fa81626a297a264e82aeac1fa030f3a4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1c1ce143ef71f8a9d9b189c24d65ea7

    SHA1

    57e0d13fff3573acd7a39663037b5727d9805c64

    SHA256

    659121c6e92557201715acd0e2af3b6ce53db9694d129cd7a4dd61c525162159

    SHA512

    a9774c7d9d3881fd588cdc44240f35cf24b68f370f685f5ee60b8f20bd737a8559aadcac060be04add8035fd3e0e58b295a6889a66bce9ffba7029e89373e8ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d89a34b60f5bfa1ffcf731d5aabc3fa0

    SHA1

    41be99234077f39021214e643f050e4d6ec15a01

    SHA256

    e84e850fd9dee46a6c07e7e846e47684b957d5c49be6dd05cf38ca34838c3e99

    SHA512

    16345558b096b11a01a47eaaae99818db99c0d093cba6f13b79b14ef5fdc4b7873b413da78cd3afc26dd2cfdcaa56c969d59373c332efa9fe11e4ac8bf430288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7be71d653b38db6c1ea486801f7af59

    SHA1

    2b785a174e93774c7185dcc18ec3c10852eeb97d

    SHA256

    dff68d6351fcd2395bcdc2212d61c1703459097882c2a8b0ef794a93de6f716e

    SHA512

    0eaca4f6226a2e1cb639b870fe59d01c8d150a095c8e28c76f6fba4572c968cd0c5abd4240ca6dd3fd96e7400b19f6d48cb900e194a56fd25f9200c7d6c80008

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75e4ccfdea1807f8418fd789614971f4

    SHA1

    406c9ef35aaf2d37c462e014afe6835c982f9ab8

    SHA256

    67f245c9fd540e832f6607a3fa4d9324b4325cefe5fa83df093af80f986797d5

    SHA512

    af7e50622ee3c6b89f2945531458c1c57a276c512580baa7ffe5d80aa750055125c2d4964697508ed8c281f9eed1816dc561c692decb10a2a2c854ec18fb565a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21338842b01f4014b5ce56677f959abe

    SHA1

    85373e932bef6feac99379f0db6d7f62005d3548

    SHA256

    2223d5ff6cc9703263bbd8ae71e92867a97f149cadcb2fd23a3096c8a3cd6498

    SHA512

    0a35355ca3f888cd462bdb935f674150c5ecb01869cc20474c58c5d30ef0b214c6791a1526213faab1e93a67572b92cb92d3e0adad18e5c910275e7afcade095

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0dfb016c02abd64545656df868d83eb

    SHA1

    b52aaa22e70b455d5faa48816ed90218a145aae3

    SHA256

    6ab85630de18fb4bea493ee3a81bcaf4a82bf522472a87ab8d27bdfb758478e3

    SHA512

    eb627769f52a38bfbafe1e951798e3fcbeabc417802b900b7775b880142fca2e1314a5d437605183c99ea43251bc044814ed3f4d233c5189a6366f099eeefcb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3fc7888085db8c8bb2c4354aa95cc55

    SHA1

    854c2bb75b7e29e80dbbf4388dccee041344fc77

    SHA256

    3fcfcd5a0c6f170247deeeb31e8d682d363e8efc4ef6381691b69ca9161c69b2

    SHA512

    464dc32bc478efe3aed88c0d491c6c6c580c450763e8c313effe07e6a04381acef24a40333dd213b8b71cfa9e2f82e46fb55c76e9e338d01017e341d8e079785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    119bb0838877fe441f0fbbf5436e37f0

    SHA1

    53d92a37888e7c5a2c775b20eb35df2c1e537c01

    SHA256

    89349d3b8da85d69605ef72b0aec45e0822844296f3ccc92cc39799ddcf735b7

    SHA512

    cf741f228d1c7f86b446c416204f32ef874c0a990d5a8efb5ba2f05ee4b541c6f38be1b3e8930c74a26d0bda1d53977c9e486010c930ccd582b46e5cad5628c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    917677ff73072078741c805e8b4036df

    SHA1

    729e361d2e836202699607aafd3aba8abf7bcb5c

    SHA256

    500086f7b86ab6fd4b73bfcd7d14fadfc95ebc9bbee7852b2c8cdd124279e621

    SHA512

    65caf7a258855b627437572a4b322c0b5a76ed321f8b57940a5cd2cafdc201051a5d7434b427a948440c026c69cb1fbbe312aa0d6c331d8556a5adc845a292d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c93856eaea3b3f98c2222840bc33e5d

    SHA1

    21dd6360afb9b2e8ab6d3833170632aa182f93ef

    SHA256

    a118abe0338efa70ff52eef4e981047041fa6813568b78590ae3aec6d3ae5e91

    SHA512

    e70414ae263a62019f7c84196a7a9babaf43ff74cc02d49e1667a6ff4cd451825239f1bba338a5c6dbf4a6a936c8e8ccc14743610434e41c9d8c69e9f5c420e2

  • C:\Users\Admin\AppData\Local\Temp\Cab4750.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar47EF.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2060-26-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-48-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-68-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-60-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-58-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-56-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-54-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-52-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-50-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-79-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-78-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2060-42-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-38-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-36-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-32-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-30-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-28-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-66-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-64-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-62-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-44-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-46-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-40-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-34-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-2-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2060-24-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-19-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-20-0x00000000773FF000-0x0000000077400000-memory.dmp

    Filesize

    4KB

  • memory/2060-22-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-18-0x00000000773FF000-0x0000000077400000-memory.dmp

    Filesize

    4KB

  • memory/2060-16-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-10-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-11-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-13-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-8-0x0000000000470000-0x00000000004BF000-memory.dmp

    Filesize

    316KB

  • memory/2060-6-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/2060-5-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2060-4-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB