Analysis

  • max time kernel
    119s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 16:28

General

  • Target

    c10f539c437a9b5af875c9b28a4c20bf.exe

  • Size

    155KB

  • MD5

    c10f539c437a9b5af875c9b28a4c20bf

  • SHA1

    da28325ce0ef2619609e46a2422ffe33160734a0

  • SHA256

    3da8f63181b11ac73f97ee558c24a4746413c9feecfd5e94bbff57432c3ba388

  • SHA512

    1af839964906244c363b05f8765c21fdf34325f598a3f6affe8fbeb6600c68b0722be45117a80dda86c8062e8b041f083aab10a9301dfc594544d2e81be6cfd4

  • SSDEEP

    3072:tYcoxqopZbH+xJkdwapf8V36y8ixffP+pgwEbJr62l8ECZL:tYDxqkZL8JkqapflLiVfEh0xxCZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf.exe
    "C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf.exe
      C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d5492e356faa496e67e34f0dce2262e

    SHA1

    79fc4905df67d0e235f10e0fc3b678603d9db386

    SHA256

    f67de4d5630f850902f2ecccc3ae8ca780c06245abc40082371325815559067a

    SHA512

    6cbf55d87824f94b859fbb54d3483f9c408c1c8373b80a3ddf141ea56779a26be907fc231b42887a543a98545e3d213db8f18ab05cc5727085b74b1606c5d520

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09c9a06a34e11bb3a42c71cc6a112fa3

    SHA1

    5c0daf801b942a22a989dd520df47bbc238739ca

    SHA256

    7b67ce48c254102c4d99fc3632dcd89adf5c725a71da0dfae6479bee328923ca

    SHA512

    6c4f5ea673ccf562a2b94cff26a07818c1e495ec84a4a7eea79bee15508f5b2daa3b3298fed0f474f9abb21dc949dfa1e99fde0714c0c9e44766a964f3ff144b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffaa0c46a383caf3a12c528fd83d42d1

    SHA1

    65683c8fd9a121282576bc1add6fb379a997cd66

    SHA256

    6b8a3864ed344f958a98f48ff8d594b64530f1c0efb64bae2e6cf68488af4302

    SHA512

    33b0c1944acb3330f4e001fd64c753c2f6ea9a5584a5a08c0273ec989e061bcb615945b6db63e64cf130f152a146a5ba56ca1c424d5ed9f7db9473b675f48666

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    173558bcf9efa2064347a890909b4deb

    SHA1

    ad3710f12371167969ad8e4ea92ded1a794c7408

    SHA256

    db340116fce804a8fa63ad0d72024cca71ebc27dc9257fb7b223502ba6316d8c

    SHA512

    b1cd8880aadf556bdd6ac26db334a67736bbc89b42bfe8b772e31609b3be280053169d1a0e881a80da8f8e672b2166d71ea955dfeae83b03d410f632f84a8e33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7886339822399f0b6adb52b86d1bb6ae

    SHA1

    8b3ef72049284d6a10508a7666da3d7316f090be

    SHA256

    2117f6bfe2af98c746e7233157c99c5515f7d3cc5d540405b1042932d809a7f8

    SHA512

    83526e14bf02ec3e60bf0edad496022bd6cd9c7a62c8af789051a4002fedd2b6f804a1d568c096a27c84c12837181db45bd36ae2b95ddd3b84b013e707ac413a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3533af55533bc52ece6ac71b54d16010

    SHA1

    6d72ec71c12c0830b5bf09c6b461d0df114594fb

    SHA256

    6e9d4d5e05817b5e659c687bf47425e463ef34de1271972b1b4461d5f8babfd6

    SHA512

    b77f1722b5c0b60d5ce6b3332adc161a9022a15e5e531b86ae8e214d9334866d9a482705cc8178fbccef039efebdc2662e13d8424cae8af292e95de6dc2a4b58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31844d51e4044c1433e5e6f1ffe6660f

    SHA1

    686fb706834d201864a4ad6e5702b9b6754c3b2c

    SHA256

    4d954fa49f740c36c3e1003eee11eeefbde9c71c81b027f12b554593c7e4fd7c

    SHA512

    844b4b2d4f08e6fd10a302293cc7c2547aae2851276413bd4ceb69e50b37aa47a87d06d6ce6e02710729ce7cdc4657f9e95b5c6d078db54aa6aa5af33172ae88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a30f614252e040e4bb015fe0c9651c1f

    SHA1

    6ba053631666df0a7c90a1012280ffdc31ac4385

    SHA256

    8debbc98ab3ce69e997218cc4d42994abe1276b52b594625aacbd3cf35a06e47

    SHA512

    3c7035dc181fd3fcbd7553280a0e44dfe452fa9748c507e9f430cbb8a814a828d431767ac44814ef76fbf88f928bf9cf14a57a1b24d47a5c64563b258e9efac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83f11ad85702aae95352e9e08ce1ff77

    SHA1

    c17bdf076452dd403be6c3abcf1597be6fc3d37f

    SHA256

    a64913dbb3f2f719c7bc55b7629703b6d2992e6762cdb1407cb1ec08f37f3998

    SHA512

    a616178a86707189371b334c0bfd579cd9137688f0c59c8c3141408c89d06ff20560a908856400fdfe5cf6fe78ce796c6b4e710d650c5309c546ee514f6e8a0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d07d0598171158693e2134e2a77259b

    SHA1

    6e71f2166dda6797e7de600fa8c09168d10b1884

    SHA256

    5875a6d22f415bef7185c104f0e53fe22ea7eb8d4095b3691a9b93b1b3d74369

    SHA512

    fa437ea08fa3140902489b77e2d4c864ce2453ac610b7dd167ba11ba2b40519c6c09aa82d2de32d1ba59ef9c53ba66a57be39106817ac222e50c34646f30d884

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    800d11975e6fa27b5ffa4b7536408004

    SHA1

    119db8524bfad10cbcb08fafbeaf670a9971f5fe

    SHA256

    b8ec07e62e28a03b96991276e4c64bbf1fffcb91b55ca278379a6c40e78786e3

    SHA512

    6bf3c66fb9cfc31ba74ca0ac6b44628b9d49f95984632602be925f8a3805607e88ea2262461859be2d70487e2456b692acd98b4db5e9d30ab9e9082fa0d89aa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35d011b03305708793a22c50606026ff

    SHA1

    f18744d19b6380978ed1d580e6ddd12acd89fefa

    SHA256

    abd6f9a9c180026fd6b56ae3e2f3799cecb2557ee21f3b06cdb9d3148265eaa7

    SHA512

    eabf55626e31fe5645b13d4b6ee4c4f8a196d0db56a60e68fccd5342305981dea0a7fc579b682883f6e694317c5e170979047de1b68a8eaed4ecfb08cc02528e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81b4078f4b2fa9df7e99bce9e6ea67ff

    SHA1

    344af46e3727df15722f6b0e03d615be0f9fef7e

    SHA256

    7aa43459c84ba9e6c8f2969ce99f1587ee0f79e84d3493d324e152c820f82cd4

    SHA512

    e85c55fc5da5631c5a7940bc18d930e22efccde938abe1e9e419dc463ef250448e2b5283ed346eb6c2678d0b693d05c13d011eadb138b3cd32b5c9b37741ccf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b6f824f98e252cbb0d2a6c03c04aa89

    SHA1

    80cc6fd35563a65cf8a1c80da5ec573d9d55c56a

    SHA256

    ffe0572c902535e4d90ef5556c8c38a5d3f3949b96b2136b4b2dc495f75a943f

    SHA512

    ef47fc7e5bd2281e244495b240bb2e02cbb7d457598149d3b94dccd3cb782852271c0b3a0d51b74a38e18472b42a1749add8d3ab6d6c61f871674119005c54df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    734f37dcc142b684fdd88370ff518f10

    SHA1

    27a88ae9aa972134d5f3c2cf76812783c292c763

    SHA256

    27bfde822ff49ff62bf5c0c7cb099af604c29a03b317b5c62f6b3b17a9f3b5b6

    SHA512

    f50fd86977aa33c6aa418e50de75c9138e839df2bd9a211a68675d18530d8b64286054d8fef4820e31d2d13eaa05299913b3280e5bd9349fa0828020b35352cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43f8f5baf73e95fcb8a69c5a7bcbffca

    SHA1

    391be973e3478aebee77e8c33bcb58b9abede60f

    SHA256

    7a002ab950f3ccee1948e4fba9363c8b3da196b3a5fc72a79d68eb50e6c14f45

    SHA512

    8ce56b3a536891dd13ffaae45410cde81dbf95c1e95fe568f59d173eeac02cce85f278997c97cceebffbdf43f4e06c3f2dffb41392107a526bb5774cff259968

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    156dbe91802e6200c88bfc4758e6363a

    SHA1

    28632908e24d752b82c91656eafe6b7f59b12268

    SHA256

    66afdadf981fe987a4eaef54abd6ce8d338356b35b0799098d3ade8dabf53922

    SHA512

    eb52d1ae9abb125e3975c309c09686c59115bbd98d1d97e3a92dd47054d6c18fbc4ae3b318170959427fc081a4fb7dbbc910edf7ebaf602c0514842a1d02375e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3682b9e110a4d58e45ecc1ece8f0705f

    SHA1

    df2f929e5b1602f376a0dad385d1c3b24648b1f5

    SHA256

    38e8335311194c313299f9703e75b8f65c34f0e241107cebddcafcae034873ec

    SHA512

    a1cf0214962986931219be947f29d3c32afcd1e3590543c6ef3c157cbb9e4d36d57a08f81acc8fdf7b4767e77e7ba3a43d3f958cd5fa6c1e6245f7c00a9152d8

  • C:\Users\Admin\AppData\Local\Temp\Tar73D1.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/1796-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1796-14-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/1796-12-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/1796-10-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/1796-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1796-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1796-5-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2192-0-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2192-7-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2192-4-0x0000000000260000-0x00000000002E7000-memory.dmp

    Filesize

    540KB

  • memory/2192-3-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB