Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 20:07

General

  • Target

    657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe

  • Size

    546KB

  • MD5

    475a17c4dbc94ad0a4c0d3c2d2b61d73

  • SHA1

    ba9cc6bbce5719fcd9e608d5599bb96aad4f10e9

  • SHA256

    657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b

  • SHA512

    f252cad650328aa22e1d7a568945cccaedcd31066be2af3bb4b1ed015266e1d78bdf19b12e7efba4d7d80f618e64fdc72e42f8cf19468c661c35f187f3384fae

  • SSDEEP

    12288:Wh3ZukLF5fRY5a/6GX41rnVMYZc+R5kv7Mu9:WhMkxlRSaiP1L/KL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe
    "C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe
      "C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe" C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2540
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\657087ad03e5e646fcd4cb6bf37ceeed10e951f6b61e899c04e841fc4ae81b4b.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1892
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2412
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:603155 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    548KB

    MD5

    2b54a7bb4b524e9ed56d65eea44ef83f

    SHA1

    3a39a1ce7e7de6f0b06806584b6adcc9e9306bb2

    SHA256

    5bfe2549285f3baa0eaa521a8b2503f2e4e2737b7ff6ccde358f1e74cbb0926a

    SHA512

    f43f07f2be912bd6febcd0aeaa0872c0faefaf598b88539db3cf384c0af86235307d00a10c706d5a55c16c2668a52e34b0ef6e3e76f6492ba7307f4e9029dfb6

  • C:\Program Files (x86)\Adobe\acrotray.exe

    Filesize

    572KB

    MD5

    5ca2f7b3ccb78f051763c2e1e94c1568

    SHA1

    34ec600535a6a46dbf001952a29374cefc77a78d

    SHA256

    4a02c5585b1e1ee8613aa3b4608b0f1ffc46891355bfeb0b8368501fcc2a2ad4

    SHA512

    f3396fcc6e553d539ccbf7374857b3608040154a915a174e582e79f31fe366a56bbd797fb9bfcfbf4b772268f57c85973f0ccba5c91bde24c3645cea8ae5076c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    701f16e8d11a3c7f53b3ce449e998283

    SHA1

    56b37c6c4cf69658b6b32c54bd6d804e8791d0ee

    SHA256

    5e217f5a0302933f414a3cd7046a900c59bd804b62d14e262c26922cec6940ed

    SHA512

    75bac4a1af59b20281d64cf73076556e8d016c69b1af11096d75503658d9520b3799e63a1afbf260df7461e0fff783f8fcf01d359d9164c9eefee1188b673967

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72402669e05d1346cddfb109297d158c

    SHA1

    06dcb651d53e61cda805926ec5206dc20ca2ccd9

    SHA256

    0a4aea3280a6d3ea833699343845fb57c1e433d2f00002475f7d1de05848b8c6

    SHA512

    92f5f289f19eeba41d329a43624be17361686c50d9a5743cb1f13d73e97a2141ef93020d436c3c2fddc1c3fc3621ffc38a0f3ee1ab31901dd9ce9663d4d87447

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c978231679f67f2c78c37662130148b2

    SHA1

    f9d7e74358f0d27ed57e1a4465c6d227ba114be0

    SHA256

    6f7a07e2fce4542f6d7a307cea7b14ccc234d429b4f9445ced1e91609fe9a9b1

    SHA512

    43ad7c87559a7b1edc804559b85fd2d843c9e2c577f00e75fb9851dc1cfe53245549139ab6928c4111da494129334c320073bad5908463f6f75de0d379fad750

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d28136cc55820b285c6bfc45b7e85635

    SHA1

    0cadabb19fe34c419debb7bbf7fba95c94402019

    SHA256

    e17798ad97a147ed6d36fd0bfe7fd7815c1cc541e6735eac297785431d666e59

    SHA512

    e7834e09188c8bc3563d17eef202452a2734317e90028fd3f77f2a200f9d5747ab9a87874220167fcf91696b3d53a596140c8767d10ad0111b7b17e4a946e585

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a19ab8226663a1571b2bc2d8bdd27df

    SHA1

    496ab958de13b76029e2d267d63d0a0eb1bf977a

    SHA256

    c889d0538345ec1d83464cd01a8cdd31dceed4cdaa9c8110ca107d939a63e95a

    SHA512

    bc923102d6dfa71f15287b118128d3cdcbf5d4181f10a8bf502f9105a924147d0a0e3d8ca221cd498f6fd53c8f4b1acd44d47635c1a53e46406a917964cf344e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29fd93eaebcceec202204a4b3c944715

    SHA1

    08d76cb7ffa3f3f0a9521298c12d4c9d79627d56

    SHA256

    4dc82898839c4d396dc4174d3f5c1a6447ad9fdc9115641eccfa01cce9ea3fa0

    SHA512

    f2fd08b06a46615687d62698b98bf4aed3be0954a0ed1a1e7c3702ae780237b8fa2696c69d048397dff742b12d8bec8effce1e00fac2d12801270404399daa26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    098669c054f1abd1bfefefc557a2150b

    SHA1

    c8c0a9c95114e6f5600ca00f6f331ef3d1903e55

    SHA256

    8501507cb754df63605f782cfa7274dabdcb8963535ddbc60fbcd5a7ac9cea63

    SHA512

    b64809af68761ff4379e9e1ba5584a6de4869d62850abb02acd69f8e3aea0cdbac9215a07906a4cdaafee8990c0e275bdf72de39f59ed09e36eb69d1d99065e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d25c9b829e6df9015fc4340c8129ed4

    SHA1

    4d0d38f81819aa532001b89dd2b8e9abb61afd50

    SHA256

    31856f0c124d3791b50dc0e276e1e289f31e6d54c94e5bd48964fff9aac2bdf9

    SHA512

    a6b2e4ae689ac32bf7c1210f71c0197754ba0c41f59116e652d1b1a3b775879355b1bbe6c03333965846ff8391f7ff08056710eae88fc42817d7fa462c7697c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5cca24a91db7872bb69cce7465efc782

    SHA1

    daa96158226ae459979ebd6ff73595ca4b53502d

    SHA256

    2c1bff6b8908dc1b8f9c91eaffb54c9a9406192b070447d15a5175391d6a8944

    SHA512

    eda580aea512a2039967751183617caf36f54828236341e44701ac9bc2ea0e1a53341c5a6131d2ae62b39af84b9df853680b2bff2347fb6cb76254ac946d9b7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d039a29517837299203772208aaff38d

    SHA1

    cde646a476594bba932b8e37b50dd000c5f23f01

    SHA256

    547eb10366686652600fbb5943b2356968bfd288744cf882e6bf463bad0135cc

    SHA512

    04b044d49406156a0f5a843402314a72d4e1136846e93fd875394fa2edd5e1352e39c25c52fb1820bd395418487737a4340c8f0be39a74837f779438fe92a79b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ce8293e5a7ca55213846a55baedbec3

    SHA1

    f83f08e9452f9a5549f33bbde4c6030158001e35

    SHA256

    f4abdc786f68a3a73f36c27c932db6e2298d71766327bae6f0c6e2bd116aceb0

    SHA512

    2a3348e5dfa485794d9a633b14e4b9dc26c986e177d29468b272f3aab60257c7387c6394caa32051c66ffc2dd2d194884a959f86f1a2eb8b2526f51847136a51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0db77a110999aac18453512ca5d2242

    SHA1

    312180a3680b3b1886c6eda6a43c95b5b718942c

    SHA256

    03c8c5b082deebd6403352b3ed3c99980993674309316cd5ca6f323b79ed38a0

    SHA512

    9572977427d1542cfde77d7ee4540b229e23a8d3db033c334b8878bc7f00d296a321906376ec35a674f44b99f4f0b2ff8fe5ae6203b4bd02449fe4f9f136d30b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf51507825032b84ec1694108a43b042

    SHA1

    ce0365ba685b8be3211f703a5b676f0b15a86d9b

    SHA256

    269ee8247cd4d5a61055e5d4d1e59142475819520e80eb3945c5d55a28fbb143

    SHA512

    504235320841d1ecf141c50acbd432a658dd5890905acd99f2967c49c7415f1c6bf28d82b60d0db37c45f1126516e8c9979b9a38954ef1c5be23aae0ffd06dd8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\blweddNDq[1].js

    Filesize

    32KB

    MD5

    481b762cb35e9b51e29d4c3fd951d90a

    SHA1

    24d87cbe34c340b2963499748cee47cd0bea00af

    SHA256

    dca4905f387f0954bb5e1bc86181072e58c18bbc04593e19284253e7f85bac0d

    SHA512

    25f4802ef9f14278641da53616828048901e488ae533617b9b4c24f7feebd7043d96ac5836ce57c7efc25f869baabaa4e4ecba95ebd2c16207b49b529e48430c

  • C:\Users\Admin\AppData\Local\Temp\Cab7DF9.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8199.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/2824-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2824-28-0x00000000021E0000-0x00000000021E2000-memory.dmp

    Filesize

    8KB