Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2024 05:45

General

  • Target

    ab24c06a28dab42dd3e50e55e1abfceb.exe

  • Size

    639KB

  • MD5

    ab24c06a28dab42dd3e50e55e1abfceb

  • SHA1

    1dae20c37e99ef3095c1db96ced0e926648b6e88

  • SHA256

    bbe20f8870e2022cf5de2b44a8232be81cba0410a205e9f349d90b4ece86a5ba

  • SHA512

    f3708151ce2efa05221f6b3b18ec6ac57ceab688dd36d47e30602ee7987313dd07d97c297f1d47fc63d0378684f4ecc7c0c7808f68fc41423ae1a1394b6b2186

  • SSDEEP

    12288:PKTqa+UNh+NDfehc7kxociXH1WDQ7CXHARZdmZYOw:PKuNU0eh1xacMUAdmZYT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab24c06a28dab42dd3e50e55e1abfceb.exe
    "C:\Users\Admin\AppData\Local\Temp\ab24c06a28dab42dd3e50e55e1abfceb.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.kukankan.com/index3.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3020
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.kukankan.com/index3.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19f121c0cad4beea734b8a340ec6ae9c

    SHA1

    e57f069e34c45402697c85a51e3bb760bea7c7e4

    SHA256

    afecc9ee5f7eb1d9b7f4e77123447f0a18626c58327d2c186aab168407d2e538

    SHA512

    31669bc92ea935dad5d401666a1320ce131c03d604ba657b56c731597486e217e1f8871f6c41c8b1f412334385087f6a61c66db6141862a50978a87f1af76884

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81a33cace5d0983b65436004b4f6ad7a

    SHA1

    363eda7794a155885c80518bd43cec89f43b2fb8

    SHA256

    35e2814531138f1eced3728c03db4378e28562335271f9c98251d266ceb1a391

    SHA512

    26a13d89af1bd25aa5bf5631f5ea3ace9f0c3274402a3f69816a6583e32cab195555d9bb86e05f79ba679f86dd0de916a7a0b3b3f947b8b4cb8d4389b248d79b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc307738b2e7ef7db6d68e52f44199f2

    SHA1

    293ac4c55b3932ea85a32d33a615c9f5bbc4f6ea

    SHA256

    f1a91e03ce7a9bb5edbd683dff181a6dfb76532f7982512a66d88d72a1b54651

    SHA512

    a5d1cdbcd8f545d3d00224d19534c8687243830044d48aaba2f4c9e3299861b0183c74e462d438e086a7744262c0ea66119b9e94b316001b92f2825bdeb1ba6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    000d2ecc89a6d666da7a3f3ef585e447

    SHA1

    29d7b2faf559577aca628d532d91055e2ad26970

    SHA256

    50c4b2066a0d201996733e096ea5e638940ac1227260ca9c288c6c5ad966cd32

    SHA512

    bd1b620205b5b16568de232272fbde74139127ccf6820f2f76d98a931c97bb1a6661fd825dbc4f8777875472f505c2dd12add9a0c99d469fcbe710c1b3b83828

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bbf1581643ea0c8013e495a20eb8e0c1

    SHA1

    826acb98c33ab2ec18aa1840e052505b5829d63d

    SHA256

    3583de5d7073fbf20882baf953a6c0bc0bea38234778f2cdf9ec9175b3ae317e

    SHA512

    8cca2b486cb0564290ed6c4c967a961fca1dcb3448be75e0241f4ef1a10e1d28d2db8dd91a7b9f282f504a1952b9d0f7c4c676eee4aa0516bae9f530bf5172f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    995225931d8b728cf4a3fc6b627143be

    SHA1

    42894f61e44c7cc737af2015506aeec154dfd227

    SHA256

    40b94a5ca9f7a0ac38a98d774385b0393819f96e4c7770c295a5a17d0b1ad7c2

    SHA512

    2b84c3bc6851dace002d1375c8996d8fdb0fe91c80c8851e7d6bdd12295e76f6c0b21e956141452526422a6d60e936e81fccaf5c093c6a9f83333d1f15880373

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db353d2aadd9e5d78e26e47abadc339c

    SHA1

    86ea5aa59103e1aff6b4bb871d2e39457e74eaa7

    SHA256

    65d813e1f13baeec7029d1ac6f1b478a435d8248ce4153510b043de95646aeb0

    SHA512

    e862a6657b3a856e147ca83f158c47d6526de5bf6b3be2d86e8acf5057e6710cc97aa26b626386eaa345f90799304085fbe83d6794d42bd54201887c2c11863d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a8749f6b97a08b945b396ec7b7c3f1f

    SHA1

    9be137519b6db5924f0df62a7581b0b0464648d5

    SHA256

    c95bb10d8349dc8dc10a94c8bc1feb72927f395f3ea461a9c253d1bfd49b0675

    SHA512

    f895ed7e198cdfd14e80c49b268583d7d13693527d86f23c854f0f0f1734e9f9a87fcd5bfcf34d86f5585dc6bd6429b2d7985f4696f66bba428894cb0e9fd537

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e21162fd63e3ef8382376e30587254f7

    SHA1

    c153839c2c60bd2cc4a8ccce0682716442ddb016

    SHA256

    aa8bfccf1e8db3ed1ef38235099e04ece6a2bdb14fe3d39d3673a0472943d303

    SHA512

    3e53f794ce77859876eb271e17dc0f62d1bddf6012f0b3cd0e60763749a46aa501db8d5130ad01b4e64b56bc23ef592586332a4da6d84598d4c675cbcfd1f9db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f2e803f571d1c56a7ac89608532a485

    SHA1

    dcdd4850e451dd6e23bf05c33ff91be4c525902f

    SHA256

    c8d1adb5b72473bf92819cb98e84eaf3be41908200ebcec2225b434c7155a6cd

    SHA512

    14869c39603d2df552411a8de5a2319cd1c346bc01680bfb7394f56b5f36e705908e9614d77df169299e4b0840ad368fdf49fc636b8bb5de945d6fc61d130c4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8581fd760c1ce44e395ed4d5f869c85f

    SHA1

    d3ebffdbc6e183e93a45dd5f0921ed7f9bdbe811

    SHA256

    a636cb5074924ab85d76a70e2123b63a00f0c1c955962eea7155e18e55c8d65f

    SHA512

    866ed8008c841b0b4b7572d4a0cf191625d7b71096096ac497f9d1c2ec7c1990a5d7d6cbf0eb4a7636438bf4e7d0ebf9011fbceceeb77d73e818548469796a8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44bb4fbd0c9e89dd05a2a12cc0d7b8fa

    SHA1

    29523c31bce8cd50ab60eccaf62a20c67dd5ac39

    SHA256

    9c171aadaa71340779fb0c89477661ce033df7d4309c4501435211fb7a23ffaf

    SHA512

    a7500fb46594d49e8388faa247c604b3e5305d916d96c1b28dea1fce9463ab111ecb71d9d94d2e5feaffb54c551a5c2420e916a98898705c05fcab89bf470168

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acad422a0f30c57eec82ed7615228198

    SHA1

    2fbd48a6b3a39891001c0b501e1b51d70f4cdd9a

    SHA256

    cc96b971a4fab257843f676c01a8073019124802707070454ed81d421aca9066

    SHA512

    d2c0651887fe27ad83350ebed924b2a7308a2330eb9f2a437cda752ccb5d67d304387539ab0084f2923c373b0ecf930161a59255b1ce6835387dbd4dc8dcd3a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46ae4a57eca26f499ffb3f5af7c61b2a

    SHA1

    8a383ef4ab858c7c8f016f6ebac2b3d5c7a497ad

    SHA256

    eb1fa39520c33e4b815a2ac43a30168e814f18fbf6c5b8c812c4df5c0da354b6

    SHA512

    31c8c07aee81fa9285705481ea1f13fda55b29562cb85214b0d27c9b437215a692d59808fb9aaea3126217c15d8f3745c0e688cc39abcf5c067e94b20eb3138d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f837d7da6bd34c380fe7b600d50f39ea

    SHA1

    bbe24f43f436b7e09fcdd72b2d5b4d616e58d60a

    SHA256

    15550034211c4e3cf41f95c2252fd3b9f0ef90815de89d8e04f800aaa67f9209

    SHA512

    c16b0b1341afab9ec7b770b7e1f8621289cee9167165b5846222ede7e6e757ec54b726027d3265291bb818344fdf1b4044604ea1cece6f35257d2a3ea32d6fd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    771195a6367dbc876842d449737948f7

    SHA1

    1f7d5ee64be3123e17e85a2d8dc9b46b33294ddb

    SHA256

    d89d8097f091b5af3d1a3cc4a8de642bf61fc2d144b554addec7e3095c6439d1

    SHA512

    28745a1397f68159574d7bc09192bb5eb40d5f849bb2cfbf1871e583ccd3339a64f3dc216e3ca5a5e8c399fcd061b5ac63f793e429a2eaea5175b4dedf6e9c9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c120eae19801bd2057ecaa4166d041b8

    SHA1

    1f0734274a89205913af221e56a03d63bc068cce

    SHA256

    ea3d72cabc56a22cdba3f109ae2894490a642408a5dbcea83cd459d816e725bb

    SHA512

    e50b29335e59afa637c8f695d50635e41d038bbb16ae1d09ac2885479b0c8c379f723df85013aa5bcc63b184eea9ba5603c5ec2f091325a3fa3d161b92cc3214

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24e5bfab333fe4588e2f872782d7747a

    SHA1

    50621baf7152913b8bbe1ef3a0ebcb6ef53b4a50

    SHA256

    e3de3ba358f060ed6678810986a732a6e207ca30355af895c7a25b753c784820

    SHA512

    e82be5d0986e2990b67d09485f74aab42af1ca1605c0f56d2011e90c62c15d55a8e62127e4b75a44c4f485850c8f0a9f357ce5bd7a4a7722c4a9135158d4c6d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a5e2385eca6cae9115fabfc4d6156d1

    SHA1

    f958f3f5ab8f059eea5cf5704589eb47382d60d8

    SHA256

    cb6a1acdb28b1c094759feee3d859fc8b487b90124acb51d14ce7113e9729b4a

    SHA512

    7f88b543bee7748fca4ce716124db6f92878af8e394a0deed4b6061d2c34b4f97897b1d7a397758c9fe026f6368733c6fdcf2d5a6b31cc3e6e6502d2915e1e5c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{88818AD1-D5FC-11EE-AD12-DE87C8C490F0}.dat

    Filesize

    5KB

    MD5

    afcb8d439331fae26d864e735879638f

    SHA1

    7d769a94c8da4e1266a07dfbf4d2e3af98851b17

    SHA256

    c6f9429aba64b7822b7ee43b04ca71eaaf254c089e5dbdd34fd496b1e77b11f2

    SHA512

    e72c2c0744fb3a1e6219cdbc75aaf9bc2cf6967e3afed317fe116ff79a53a3208a6f4249b7af7437c75ec0edc94afddb84a03f1cfe528e86a78ce11f619a7eca

  • C:\Users\Admin\AppData\Local\Temp\Cab2E61.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2F83.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/1728-0-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1728-487-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1728-486-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB