Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-02-2024 07:59

General

  • Target

    ae13c83a003844b0f728b83c349f8e78.exe

  • Size

    83KB

  • MD5

    ae13c83a003844b0f728b83c349f8e78

  • SHA1

    5ff0879e8853480d419865427a2869eb9c429272

  • SHA256

    ead2d82a3105bf213c4b139c17d5cb20fc2893b3e83c870dbc2e0b9d5661ab3e

  • SHA512

    b821392dcc684680fdb5189320f669c7820acfa3bb57e11ff759c30233bc31ea269f3cae9e6fa57acd1a9fe8e53f886a54b492078d0e96d201d7ccf0f904d77b

  • SSDEEP

    1536:3RDK6eMzlJ0IKcCw35jEjOHKBE3ymYLuXcwY23WU134cP0MsBll5UwKNNIuP:F5e/U35WGKe3ydLuXcw73WIBG35Uwy

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae13c83a003844b0f728b83c349f8e78.exe
    "C:\Users\Admin\AppData\Local\Temp\ae13c83a003844b0f728b83c349f8e78.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Windows\system32\winsys16_061209.dll hitpop
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\program files\internet explorer\iexplore.exe
        "C:\program files\internet explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2508
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\myDelm.bat
      2⤵
      • Deletes itself
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    05bf96842158ef0d57e7c252dfb067f6

    SHA1

    97c31ee9aed7f2714c939d45b64b060cd30f6847

    SHA256

    7c5717c7a648fff4082cc22b7e75df196f3653f1a41b5154faa56795b2de6107

    SHA512

    84866f0b0bb4bf4e32d6b43ed5c272306f2aa6e15285bf61fab6af0cda43c9cd8fe0ba7753308cfba1d504b9764a6d018de8cfbdd181207011c14e76b98286ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    04086e7d709024eb481929b5906c89dd

    SHA1

    efafd9a08569cbd2f181b73262691c4643023842

    SHA256

    2d02f154500fccae386694e718f5b2c9037ffc3fb647c604409ce0d7813e6737

    SHA512

    b35b5b9abb2677ff210c872e2011377e7eb83f480af3bb01fd14152b5f70c2d50c638a1c3dacf42401424ff62efb68bc1786270df36bd0d6e5f38553454edf48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    321b3534a5750b930cbe2bb4915430cc

    SHA1

    e4df7cc342846a7f186eb8af9692b4fa0ad9a424

    SHA256

    76dde396f220631d2031c7c91cd908cb7a05403653f09de1e5c8b3b63f2c2c3f

    SHA512

    b3ff7228179d4b77e61d4fce2fdd01a8553183d5c269d81c6462833648fa2214ad1c46f944de8db1f8c35ed29910e21dae563edeadd129fd9c13ee6e6caef0ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8881823fd0bf987154e479b2895be535

    SHA1

    c11f06958fac5bb0c6a8d328c06e8d271722f07d

    SHA256

    a1a1d34c9261be6fea2f09b49fadee8bad7bf2b3def9a199ca3e2240b87fa12c

    SHA512

    d0f879b960ec4cd06226800bfecf91d66a31b55b7cc36e5b96c8147cc78fb68207118dbcdf5bda1ff754851ae16a45646a0155dab45d34513e52c9fd7f13af67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aa9e82e7718e50bbced176d60433c373

    SHA1

    9a96021dd485d01353decc2aaa70701fb1050a5e

    SHA256

    709f63563c4591368793f7bf5dffbe699a745b59c56bf5955d0c98584b1c8e0c

    SHA512

    3c2c57870e8b05132daec051d72c969442847a25690071c3bf1a390ab1c9cdacf0a8a9875d4e772ecf63c8ef56663a32b3c08294bc4ae2153a8bd716b91eba7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    48194aeab4a351b8c03d52de48d32964

    SHA1

    6fd3b6ac249679f846ca7e418b9e880b58a9dd3f

    SHA256

    d4857a51d68bd72a261271b6519cb775579a3d7dc09064b84aade6aabe59a3ab

    SHA512

    8d8ab6357ea5591a0c0b51f028519b8b894f8d761235583ae4c6e5cfede2b7ad0e914403688f38633575dde2150292615fcbacda48b4527fc56b4c25df1dba9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    14703e5d40fcdaf9a7f259a20f9f1dbd

    SHA1

    45784a0f82d64ac88728cf29cc8c1f3f5ca7cad3

    SHA256

    6ac24d9c854cfb3857d9aff82faf2b509ad975bc0b07eb2dd8afd8f5e2e4f327

    SHA512

    d097cefec1e85cbcaf61b27c600e033be63affb33351cff9ccd2c1eeed60f40470ab6694ad6e5eefb9e2ae66de94c9d6220488e53b4f9789fbd44344b6599bf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    85547b9d2369515b728617c83de8427f

    SHA1

    eee85fa0febdc8d7731b66042fed54361f46f474

    SHA256

    78fcb1be1b96025e25ef74d9d2d8143dc31db29261044c80c48096d46e9c53db

    SHA512

    fadd76363549f58d7d81a2dbdcabf1ee0de816fc2b05e2cbd5291ae4a86bec702ac452d6a1e6e0dacf7fec07ba62944089553d8a32661fa60afddea1fa8f34d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2b8fc1ea99953d38b068f0582082e43e

    SHA1

    7339f7dda92f7ed5650f9bb07a790d83059d659b

    SHA256

    acae7e13e41ada3e1581ce7301767e2eccf24c66386c36023b967326cdbee9a4

    SHA512

    36da93a51c9e17bcbf4f8fb109d7a2fe6f566db173ef4bd837aec258d8f5b8ffd6b52abfb157db50283b75abf2276bde10c29b9d637ad9da2bb1e71f5070af6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e1e0c12506d0335541dc8ea05cb445b6

    SHA1

    9d3a84cef63291b60e4f6bb2cad50527dc4fbfa2

    SHA256

    d262d91438d9eab35dd734ddf6e885210d186bae5de1a301652238b62de7afc5

    SHA512

    36b11eaf772d1719f4bf579bbe81774bf2cc97b3e47c1cbdd1aa821fedf281352755cc28da02da6d04530f5a99348b84e22d8701252b5ce17d669fcfbc9b018e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ff00f1031dbfe32167ac0bcb92cec0b7

    SHA1

    6d2a6c644b376142ad77f0790306ca61c71a416f

    SHA256

    1db712ad3b2ce06b856f4872e1fb8fb5f909f2fb01efda1fd036e2fec9929359

    SHA512

    ba3dcaccd974ac8c048310859279e909a0e86f3173ffd08599169ead955f07e657c75ebca246f2633b73ca91c411079acee2b34f71fa302ecc85843d76cf4a27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fa0564d94877e9965d28bf3f83ea80df

    SHA1

    dba11071b3c6857b74eb38b2eb5a62de3de4058a

    SHA256

    ce100cf6b7a50ed264ed4e3c1ee434723c4b7c522935a79d5108541c1c2de0c3

    SHA512

    a1760836bedae2ce8b89dd9e6aea2ed5e89ac8324e5b0475bf5a1ee8819175811f571a5a8d1fe28445c64ae02409c325d287687de4eab4432b4790821b43358e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    896818709de0b35f6cd31ceaac3ed98c

    SHA1

    ab423e2cc0b12415e96db28d9cd4eeff1a71394f

    SHA256

    4e26aa81aacdcca17e5f4235ac1697135a190f7507a0778c80b350f4f080aca5

    SHA512

    ce03b8cf2c0ca1a59d109328d97e1e1096239b1521bee0d6e4ed18d2eda1d781ccb102e32c1214529d7d846c25d59e09548131234f01308e54a6750c1387199c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    dc33dfcff5de3b650c507f2d48f1ac5d

    SHA1

    2547c1706b04dd02d02f5b24ba0d23050f849f4c

    SHA256

    e2f245db08f8592ef56474d63ff62285980d256cb859f07ee8b4429e617014bd

    SHA512

    a7574178713cf1c7de11c8d4cdc0fb383a2073636f2eb34b3ab50d1f99fcd10698e5a124008ea80d0b9cdee3acb8976506affc0c0e65983c9c8090b6b15d0767

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    339f6f6f00344f7265e801b423c79213

    SHA1

    68bed05d9a45a4bedeed0003d97a3bf1b15db2ea

    SHA256

    993a462f57a4953dc2eb08528464e6351a0376168bb14ec34b3a2c6bb66ac282

    SHA512

    3668745f927f1c20b356138738adbeebbde51dd8d8ba7ce7a57eded8f90017eca9b9ffcf0ec24a1d8b3806c6a3dc87cc2df5ef9fefe3587f7caaa80e55c01617

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a9aae4cacf6e8199d1526a7c7512d0dc

    SHA1

    2dffe183b957c1653bb72cb92a78dbf42e506a53

    SHA256

    2d1edad807519094ffe5d8e0ea71d1bb421d6881818071e27b86e755a4d69024

    SHA512

    59498e92ad65830859803e842abda5c0bfadf6f45c9c3c29426132ae7081017146f68b315a787ff3a5699da5272f311a8564568875c15689d332785831f0de27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6df1658ba2cb7db0cedd8305cef1b54d

    SHA1

    96205231fd9731293034d97373e11fc5ff47cbaf

    SHA256

    200386aa961f40edf9d1f97061bcdf4b7f25a2cec160b4b4dade7d109699dd31

    SHA512

    0e78cbeed0cd70b8f90c454d037f59f3739bc0c0da4723d13e7360a6f4272b0ee53e1f42c7fe3472d2341892060f1671c3eb8c7bbb0345827556531cbf48aaef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f3dfae3b65fbcdb41cb3691b84e1e21d

    SHA1

    ff357f498905b480a1067050973ed97501ae7aab

    SHA256

    8ecff75a88e3ca9c67fa8e173525e5dd0e19be2dffcb62153e56a9665cafc229

    SHA512

    e2b7ccacda80b42cfc2fa25796fb0c74ef68bae6e9b4860125a68a7954c878382bfef45c8ec4dd63f94921664de1d1871dfb5384646e8865920a280356cfcbfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cf564ebf48fccefdbcf4b2a2fc9bcc57

    SHA1

    9239420223deaa3795966bf616d1b7c2ba36196e

    SHA256

    103b78a21cd2864a944927d7583788a939ebeed194400d7df255ef0f86592c21

    SHA512

    6c4405ac16e8e15c7de89411c557cd5f0c85893a3d2cbaa2a3582126f1031a4c9d551906575694ebdf03e1babc910d4d947913dacbbc71958b51995870716cb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e90d26466cafacd245b015294f48c81a

    SHA1

    6f1bd0927857fcfcd4523c07ba1011e6272a2d72

    SHA256

    174de5a5ac876098179f6c2bd5b21592918932e045125c75acd3487a60245aa3

    SHA512

    2251ce363e3782e9dbc56960de146d0439b9f6a575133ef94b9270ff6bb30023b41c7f23d2ca4835bdda4023cf908013919046be358b230b72443e987d9acc81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aacd5820e57a0527e23f71c804f98759

    SHA1

    cfdd3cf30efb0742038f30411816e7f95bd5a64c

    SHA256

    759cb80b542600e88b960c3007ce0dbb6170160fe5805490a0554adf42a11483

    SHA512

    f239bb85e857eca0fbc7543b716a014cdb665b47f192edb63d96514e38e27d403f4f12a5196978936391f53e07bf70085dee30b2ba923f0f6d5e6d224c8964b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    af76fbbba1d3aaaaf286bc292216a129

    SHA1

    fec33deffbfbc800c16a40868f35a954ef3263ed

    SHA256

    3bf7dcb14668e76612524be27b71eb35834eb1bcd2ef42149d25b3a39cee1d3d

    SHA512

    b3c57974dff99fb1d81c50ee091f63a98eda9830a0d2eefa57122e365658d9112b566e5714a5efadf09d464c0bae7bbae034c16c1395f4605cf0864e527661dc

  • C:\Users\Admin\AppData\Local\Temp\Cab9781.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9853.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • C:\Windows\winsys.ini

    Filesize

    336B

    MD5

    7c35f50e6a44479b14b711bfee99b548

    SHA1

    be252bdd0d654dcfca0f9987aa2afc46bf0967cc

    SHA256

    034c2fcba1df98f95d3844c400624971cabe6934288c2e7616de7a2b81774af5

    SHA512

    9197cbf66be3ca2c797abef753c40a41a8fc0a62d323e4b88b64d921eb0649e9ff4173f8ebca09666dc2649b0c92551d59728c7c6efd88cce927a7dc3c6bc41f

  • C:\Windows\winsys.ini

    Filesize

    342B

    MD5

    28cc2de2baa2b0bf3b4d603b80c9fdb5

    SHA1

    af4db0688860acde134d5255570fd1511bbecb3d

    SHA256

    18462aeca62c7c6c82421a620c45f569c64393af20f2984eb21ed59a73e2eaed

    SHA512

    a96eebc4c684631c61cfedaa0b059b9efe047e39cd1fb243278d24bf85eb2257886327d2554199c697d2c61d134b6c7f3ec6af28e269c2bdde34e781ba8cc540

  • C:\myDelm.bat

    Filesize

    184B

    MD5

    36991bde79917cd7a6a1677b11eb0fc4

    SHA1

    fcf0de6b8bc4a2a0af973e8c8e2585f1e73b6e98

    SHA256

    061171ae24a75bf62ba80c933f109cb536edeea6003a87ce566b53c686a3ba16

    SHA512

    2b4c5517034a80e6a469309906dea78c2e7b4c8ecd82a7ae51278af238348f891addd2a6d17dd3498f073c0a65f24f505b2405668ddacdce533fe3e5c6b1a5fc

  • \Windows\SysWOW64\winsys16_061209.dll

    Filesize

    27KB

    MD5

    87c8a432a2acff863638710a654b5b24

    SHA1

    fd177060707dbeb75145beb5274c46e4a2ab4c7b

    SHA256

    6921dc479e4568634f75783cebc5ad00db299aac7e5fe9a7f3eff91d9dee2bbf

    SHA512

    d8beae4da665b3dceb164165b2cf2b1f6714962f283d52ec4a5527b9c7ec855757c7f25a4c7d5e933c3b9464567cbe1471ccc469c5f3f6c22a317b910e52ce6b

  • memory/2440-522-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-521-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-519-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-520-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-523-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-518-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1004-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1005-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1006-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1007-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1008-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1009-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2440-1010-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB