Analysis

  • max time kernel
    117s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 20:27

General

  • Target

    c18645f01abe60199dbb462b6e941ae9.exe

  • Size

    382KB

  • MD5

    c18645f01abe60199dbb462b6e941ae9

  • SHA1

    093c0db4906c1961a1aca3c3c07a189fff42f52c

  • SHA256

    e4bfd90de1de92bedbd9254eb26ec2b3cc89891ac546431a317cde4071388d21

  • SHA512

    e43114f1ac1f853f8c90c6f9e84ed9934b1d78ee34bdfabea79d3d5f0ec6379763595c53eec1866e4fda39369ad73a2f4833fd77251e978888f60672cc6bb9a2

  • SSDEEP

    6144:+wI4GcWIEVhtywyLyLJHJ4uoz7ru0OeHdVuRJvK4+dg:+wrGNVh/yLyLtGTW0Oe3GL

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c18645f01abe60199dbb462b6e941ae9.exe
    "C:\Users\Admin\AppData\Local\Temp\c18645f01abe60199dbb462b6e941ae9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\MiNODLogin.exe
      "C:\Users\Admin\AppData\Local\Temp\MiNODLogin.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fdbd06416fef14684bfeebf1d7d3123

    SHA1

    090b5914f67f9d40c111a19051ca5029b469a9da

    SHA256

    bad49c8236649bcd4ae3f424a53ae3ce142088f31a729d3cdd4885bebb8c67a3

    SHA512

    63b1f90e6a1b66212bc045f1b26efb08b64141102151c446e959fb5b9f0748a0c7506037689d7618b7a767fe256c28b79c1efe91ae570add1864014aacb67fe5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4aeb5becd53ab54bc48a62d2417ccc0

    SHA1

    f0835fa6d04bca8c99b41a4ba7edeb73b26bf7a1

    SHA256

    a4f1acf104fa183a94d2d6a0fc9dab2c48414bbb3d39f2dd715fe0508c82afd2

    SHA512

    63beb03e4de2ba36f2dcd96b63038803e256d53fca10ed2b242fa1d1cbb421a753768280cfb40769a557b2a473763af178c04a5bd03f144f7639d37d32f6f20e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4537a73cd471c3b44aa00e10cef0c8f

    SHA1

    b4e2874e0f19dc6b293e52559e648c95579e55f8

    SHA256

    43ca9a1df0c2ac44ecb42ccf6a30500eb05c3339b01a4421d05eedc92c821af3

    SHA512

    ef352a09a7bafc392164c603f2c04af6ac2f3c226d86b6133c6258359d7559023c4b98df6028d3816d99063c1d1bb27a128892c1027b602c915b07b5ee88e8dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d15a6057da2f6614a4e88ed84fe7a38

    SHA1

    33386e2be2239b1d87e6d8b8b383a3d64e703e4a

    SHA256

    ae4d13133eaaf8d493b83c00c5636fa9bc64f3eb50ec476ea8012c63ea13cc36

    SHA512

    b8f6d1d485cae1ea1e509ae1869498f7bbb3fb77ac6e6860d5877dfb8f1b2a093017012647cba06e190a24182dd4bc182acd19fb94972184b55ff90ad886d3dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f76ec22fed2d7e338758bdff746fc7e

    SHA1

    5cd5c16320a81b76c9f65f1e37a4a48e97f5de68

    SHA256

    86eb373ec3efb3b1cf69d6a7fd9d69604145dc739c92c60f41c9f866830ba7a0

    SHA512

    26e04fdb96daeec65657d3cccf3be70663f708e4f2587bef22fc247354cd5247c404af4dddb10725f9470fb412cfedef3e8323d9ca466cfeb2a0c49be8a277db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ef15b368da098e88e91bf2103606822

    SHA1

    5eda13704769a5cade30e0b6a27fd456e8f9d6fa

    SHA256

    8d241ae40a71e620eb0d7a778762f37bf0978060da4acf1e89e2f4d89ab53cd1

    SHA512

    c3065ffce0642f03e3a388280581014e0c4284be7f878dda1946726b77b88fe8b3c41673ed7c261da30ea4b56a97085a6ea59005045aa6be742960c7ebe996d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    569d0b81db18a05b0cebff141cb8e815

    SHA1

    43093935fcbe20f4a5ead9166737de79c98ba0b6

    SHA256

    b7beaa5e2a4ea4afe43e45d2d73e846a73cbdce507776acb50e044d4f0961a19

    SHA512

    1cb354f3f8d85f72ca9aa4a337cf9b8aaa363893f198405dc475deaa5976fd862631acc0c175dbf064332e0d0145a9def56b82f501e7266698acdd6b0ef1c75e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ded1d385229bd38719e16b35c37f6d65

    SHA1

    4a65ba142b7428f4134296a18f60e002a814847b

    SHA256

    1c7d794908ca59af53368b597d4809ab5559d3f302763c4e49f633e3e66fe353

    SHA512

    a632d56a80e9f137f2a0e8532bb9585d258a9dbffd07cf6965febd3e1532cef031a55dccfe1c6d6bd9dfdf36dbe890f5567b84cb510ccb966ccd06264d5400ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a6857b07134bc7cfcc65aacb6be9002

    SHA1

    99f72ab9af8a31c7e158ae3f3cb1025c24191a97

    SHA256

    4ee8b1b8f1475c260fa0ee90d1249a700eecd67fe9cea46c0664477b70fe632e

    SHA512

    66a9b93f7a98989635678a86a995380c80ee0147d769da9ae02c29f54b86d01e45fc21b413090d4c3d2f23e7d6358cccc9fbd78a56e32d8ef033f15d16a76496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c65cade7153c60da7e9f404668b816ab

    SHA1

    6cb53c1b19ce96161162969375d5e6d5e9e33333

    SHA256

    061ebc5c783f244261ce16b96ff4efbaf3341fa5bfc91ab2588d130024c786fe

    SHA512

    218559203eb7266ba3d7f9c5296f40691ccd577ae246b4481f6aee2ff86ac14da356a88ed297a25580dc1a5a0793239e367cb3aa3c3c02863091384acfe1d9ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0633778441c1d3b6937a26fc486bb830

    SHA1

    18cdf6a2a836277b758e1e9cca48e0deadf4acf3

    SHA256

    a6346cfaf1a4d48f715749e80e4a90905662377cedabe49a82240e2cf3f2ab9d

    SHA512

    0a6a31de5a24bcc9f8696f26bd061e9e7f908bc97e2cd266c680d5c8bd1a7af5c914f7b3dde2152aad2b6e4a2cb5dd6f3953a6eec11a4145af14ef0c850a62d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62f0a8a34309ab29c71719dd7114e886

    SHA1

    a1d1632fb4139d54e53116f599ac07971a509a33

    SHA256

    cdeb64941aa9d1e1a05fa3f63311fa77bafe5877ad5b55010115fe7da5a0c368

    SHA512

    2a7c9d1a6d8ef52c6dd506be4611eead26ffb76da92f5e54788533cec2ca45dddefd2b46917ab37eab591f9c11cefb1fcc8bc1cc732f463fcd9c2e388ea1c56d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b003f08a376e3cce72a3d88738f90e6

    SHA1

    eac9a3ab1ad80c34a474a35fddbb7c785a97c0db

    SHA256

    161b07ec4e09f360c973ca4766e54f6600783412e4291130a11542d6c8b06560

    SHA512

    e7987554c2b6a5a8dd4d07fba8a801c0ca1f8e9c444cfcd54ae58810e5fb9c36e9a271f0d5f76244569c0257919ad5a97ac2161dbfa0f5c7e76e942f514930ad

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\VG1ABK6A\www.java[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3pl5scb\imagestore.dat

    Filesize

    1KB

    MD5

    fcbf01a0b3aadba7bb829db9a0f3ab24

    SHA1

    7a6370fd32021647e8109a75a48ea1de96faed6c

    SHA256

    b4f6faa055f24c5331d05c40de2df2542cd94df8b311a57eb8e0d0a962eae44a

    SHA512

    445b76e587a7bbe6c5d8f9594b81e82781eb1c00252887f3cfb42747f32f86aef8198c41bd59679704dc4191de8d0be35bdbbe2c7d3ef1f964f87e910879445b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\favicon[1].ico

    Filesize

    1KB

    MD5

    8e39f067cc4f41898ef342843171d58a

    SHA1

    ab19e81ce8ccb35b81bf2600d85c659e78e5c880

    SHA256

    872bad18b566b0833d6b496477daab46763cf8bdec342d34ac310c3ac045cefd

    SHA512

    47cd7f4ce8fcf0fc56b6ffe50450c8c5f71e3c379ecfcfd488d904d85ed90b4a8dafa335d0e9ca92e85b02b7111c9d75205d12073253eed681868e2a46c64890

  • C:\Users\Admin\AppData\Local\Temp\Cab8CF7.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\FP1DEC.tmp

    Filesize

    177B

    MD5

    596ec657667d8634e7489f2da9e004b1

    SHA1

    5a5a84f75bab7e8cb7a7fba323d5ce95f4d49d82

    SHA256

    bc2f3427ff717e4e5a36e7aafec3b12d9a702dae6ae7bc005fe14b0a52bf5f75

    SHA512

    3673e0ece787f746e3b489f293b0fbcdbb10293be16ed19183794cc7c2236fde17063a4d9c1ddcc3ecbfec4f9465b809b9ced06e4a0d161c8291320f4ea26feb

  • C:\Users\Admin\AppData\Local\Temp\Tar8CF8.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar9A95.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\MiNODLogin.exe

    Filesize

    123KB

    MD5

    7ff9e487ca5a1f214baa78abdb8b1723

    SHA1

    8ed1c4619864e28fea212ca096bfb2d687c1b84b

    SHA256

    39dc6441db71d9a2a0484417847153f4a9b53da31bd4f1326b75bd22019e05c5

    SHA512

    03ca68a297aafae39005f51be5260b3e0ebccab976aed6e25da9b1a8b3a57804eb9aa52128fd959cac4f9e4ddd48e65836308edefd0f23fb6951ae9c3630d89d

  • memory/2512-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-25-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-39-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2568-24-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB