Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 18:54

General

  • Target

    644a3d4f4f25e0dbfbe7051ce6d9925f5bacbbe9d1d5c7758f363a8a95db2a61.exe

  • Size

    1.9MB

  • MD5

    7614ef8ef94d82bf0d84ab69f297b22d

  • SHA1

    659be389e19e13b30710a5476f962e9873d531fd

  • SHA256

    644a3d4f4f25e0dbfbe7051ce6d9925f5bacbbe9d1d5c7758f363a8a95db2a61

  • SHA512

    9584a5e967fa5c208eca353e70d256c335da762d18f877da50754b0ca984ba00bd2c57acf97e1938c43adf425e2b94e095ee5997f969daf3d6ca47b489909803

  • SSDEEP

    49152:WKyOgjiu9lrRaHgT/ihLkJyOjvwBvCOdftpnkjXS5crReOj7SwgKMu:3o4HguQJyOjAvCOdj/lOjL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\644a3d4f4f25e0dbfbe7051ce6d9925f5bacbbe9d1d5c7758f363a8a95db2a61.exe
    "C:\Users\Admin\AppData\Local\Temp\644a3d4f4f25e0dbfbe7051ce6d9925f5bacbbe9d1d5c7758f363a8a95db2a61.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start https://login.authentic8.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://login.authentic8.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d91a8b4f5672db96db86ef3e59481d5e

    SHA1

    f17f3d489f9639e5aeed90b04961bd3c7ccd5f1b

    SHA256

    ddde5a37cce76e4bf9878ea62dbb72d1835cc25e9cb4f6b1403c6872036d7cd5

    SHA512

    6197576c675df94b1044546d80099a3c6c0071e7c55457a25eb77b4c2868c05e0957c20d1bd3144761bea5b355d158629708cbd01c04fae567619483e6297303

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13820acb556fef12f5ead6ab2de1dda1

    SHA1

    2802e9c6ad8c72026e9b2c8411e24dc8d3a6060d

    SHA256

    b2cc90a307193b04ce02d66af92cd2441aec0e3f552c53b8b6e8a228b009e6d8

    SHA512

    581532b664b1832a43df7725fd680997ae1b9e758c0bd7c3ec6d6dcd0d4f2a22060331031afd78dbcc16864fedb3c232edf0e2a4ab4ddddbc3e11e40c38c34f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    452657b84a31fdb0bbde59ee5ea49c5e

    SHA1

    fe380069a834432ac3657a573c33379e2beff404

    SHA256

    7bdb40fe1455fb683166e307521cba48d87cfdd9a57b961e8d614d740ce4ab43

    SHA512

    9d6afcf1aff0b994a14c9290972a6f37c6c61ae3079cccdd6087769c66dec9183973cc27c7a21dd96f041db1eb7f19b89752c2919eb5eee6e56778eb29726e54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00fe455867526bbe945ce3c8c77b1d8c

    SHA1

    5d571664e5f68c9e75ae319c36bf15020045a373

    SHA256

    f91d0f66872e38a7f6aa48a180c5b5465e0b66435966cc96a64d16531cbf4c8c

    SHA512

    5ec54d620f58c87481d69b66a16d2c1f21941e4c89920ab0b628fede713bb2b7568fe1c886395e32416c002579547dd0f054929184fcaf13ac58191b3a5f6305

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e0e0d44efebbeb17d909a02615e9c9a

    SHA1

    f793976942dc5e06519d18e1f64903987211d0d7

    SHA256

    b29e5560c3d6b9eca03676b0d5b5e9aca762c158b3033ee72fc61a0e6f39dc1f

    SHA512

    aaadfc244bf5fb4f84479f67743ef538038160343238538b91b15de69771d9e35ce08dde00ea7f7c3261e1a2e4a4e297295149e38c4a5647b916e7ed54163bd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3ba2f8ab550bdde1892a365d3a27f67

    SHA1

    b518c201692468e53b0f0add4e236a98ad4c2622

    SHA256

    e97a01b4d182ad4adbf23b97e079455c8fd5c5699f5775c34f243d11f4a12cd8

    SHA512

    827a649dba18bb34b317a1fd08c4b49cbc6eb273527c8d5d3077b16edae8d2228531bdec851d09c833b5dfdd8a838282ffd8fe0de30a0a23fc905a6f0f8f7152

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    136e04a25bdf9c30dbfd7e8f6996a4d8

    SHA1

    85ab729ffd42f6c4e864e2d170525f8b6fe8cb92

    SHA256

    29fc692f49566b9e8b8e99e7c208160640aaece1b790a03f7d525d775d40cd7e

    SHA512

    f05ef112496fb6038dd5fb6f21a8efd4ea7e4fc25ac0f6d29459402ce33c8c956c1e2819a74ade5348e24f9627489a8e8c4bb07b3d16f096ebbaed151f6bce8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d76c2b1a773ca659bde7261a54a6b53a

    SHA1

    8b5dea6ae1bcb193e843e911ca7e270aee50d9e1

    SHA256

    9478b1192d71519246d80ca1cdf45a5627aa96af309d0d7bcc917fdbded135bd

    SHA512

    12684380f1410c23b5a62121eb43741729453fda8c9e03198595131540b5748300f560895d72b9287ec9899cbabe3b7e100582792bffedd294a4f10c66cd87df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1209947da72f9d93dcc5f3b751941d65

    SHA1

    24ef911b23c045916c459f8ca67dbbb0318a4eae

    SHA256

    2e5fdb5ecf4fde3cd35bff973324c7164e54f84ac62992ea1f584ae93498f9c7

    SHA512

    a75e95725eea7d3fb2506779bdfa6e392429e781594b4bca508444be7547894ec40aad8057d8b5f5b20d1470e59ed6a5598890193f1648419c1af68d444ce6d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    522d9a827cdac956bae7db2a07b0f59e

    SHA1

    01ff35d3fa867c7f6d1d369656dd421253b8ee58

    SHA256

    8c1866f028e35e8aa32a15f08ac14c8a51724e373d21046da271d22b1b456f6b

    SHA512

    6074275bd2d154c431cb3d5c288b0088ff62b1106541e422b7f3c08c83add8b6dd076316483e5824a2300916f4d2103ea60fdce4ebf734c51d606109609f428b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53833f32de305000484b46b524556583

    SHA1

    804bac873e8ca6c2cc84365dd26d05d2a656552b

    SHA256

    dbb22ffcbccc8eb3c68dc0212f70e2f6da7f450f03512c4d5b0e59a9885faa8e

    SHA512

    ecefa88578197c88f4d0f2e309ce56466a0299db559c61bc306b96025a713705bad752cb3fff2dbaeb889d56e0d6900786a714a8bd61ac729d839726f130a20b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7718bf55204042f9299f02a562d0fefa

    SHA1

    66a501e3e06155208e394cfcd15348c0411cbd3b

    SHA256

    f8ec98c63ed82435bc987ab7ede434d1978a8c0113f184fa9a91826c35f89ceb

    SHA512

    54b8a6351aa39ce0e7b53475d82ccc367627f3a4bcb82bbefa7962eb5d87ef125c00217e569236b04dfb6168945ccc82c69c74f0167519b0e66265ea0549e902

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e49a6b16be92b3a728d0e18780186acb

    SHA1

    4302ed22fa14d11b3eabd03a2ab8e1ec0882c333

    SHA256

    e1c6c45e5ff9a82212e1dad56003a37338a253103ce2d6635d93e04387651827

    SHA512

    99656cb47cf4f5b3a11966abd3d31379da48db8cfadc0b81634c93a9e8968abd694cee413e74ac120bed607658026ea1259d70ce2ff0eda24925e0554a1f0814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e723e4520efa85c12e91a28ea193d15b

    SHA1

    ddcd8008c57c8d2b44662add3229a21a52830c12

    SHA256

    9029f03da3c2e719f879e8715f76b33bd96fdf26e89396b078e94a1143bdcf14

    SHA512

    d8d099a8f503f2f01eb64915c7e6321d50326eeef963abb386b22ae39718c8c0fac95b92f0869d80bed575d940d8a5843c0ba031ce3f94de10cd2fbf1f5cf7bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fe29443528c5fb66907698a985c8ccc

    SHA1

    8566b48947567809a500b346fccd78e1193a397d

    SHA256

    9da0adce40edba167847302f483c58f55b0f88c2bf1230bfe58e4c42cde83743

    SHA512

    80ea1231295045a674bd64f64eeae8c2835c430affa70c0580307416879815d40c26ced4f44e8eed8eb0ff69b9a8f11236c8bea2e1ba31140ce9e7964185ad70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d037d3ebfa105c36bd296daccc2552ad

    SHA1

    152039c96f0c37041caecf0d10ba7b7a8a092d14

    SHA256

    014623ccf7760e6927296dd3c5f0f607177826847a46a4c44100b717871359f6

    SHA512

    1413964170f563ba2b117569141f234cf8209078d2606fa1f0d20910625ee1a472a8272732ad4e002e308c81de94e2f65a66349120556145995bacd229b71ed1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d0fa2989cc4badb6120eabfbb298e47

    SHA1

    935badc1aa2ad7928f5a20f85c12cb8ebf6156bc

    SHA256

    7fbe1d8656351d3d165ab75383cf54b71850d22cee67bbe1b878df0d480294ee

    SHA512

    b4676160501dc08b3d7a937ed79e2d105fe8c9e0ca4429a5f4243d95b9b291ff72d4daa50df86b01a3ba7f67850805cf7b266b370953c655e48a02a6764fddd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7561b23e838d6e8641d67df1f0033929

    SHA1

    a196c3230095740dffd477703c1abf16ec02c054

    SHA256

    cbb32b2bc15fa7e4b5bc3e72861e1d1a0b699563482663a7e7b73772e7b2b81f

    SHA512

    48166a3c8b7465824d3e558f75091f038ec7cb6abbcf7bbfad0d00c37e86885d1a12545fdf1bdcf3a8d7454273ffcd6aabd35be94401a3619ee877ea3ac7abeb

  • C:\Users\Admin\AppData\Local\Temp\Cab9CBF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9DBC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06