Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 00:33

General

  • Target

    Skill Hack WarRock-Hacker.de[9.Juni.2009].exe

  • Size

    28KB

  • MD5

    06fb86cb0a706457a8975951491064cb

  • SHA1

    acf100409ffa610116f0085a561d7d4faefbb497

  • SHA256

    de50f96cb09cc27d12eb293d84cb35a333a4c230729bd1e9673aa5c14c5b9cd9

  • SHA512

    f7d2a490d5e585d9d01bb1e42fa03f4615c8fb16cbab713dcb25fc837d2c94f6f60c2bf4ab61271ee1b8f59cc6002884a922333770ad4e02697dfaac14a4f5a2

  • SSDEEP

    192:lRkjoJAjnhtcr/kbN9RYW3MHaMTqBS24OwVHl1LA+8+uU77qcFkPlD2oVFoEc:gJLI/eNnnl+8+uU77qcFID2BE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
    "C:\Users\Admin\AppData\Local\Temp\Skill Hack WarRock-Hacker.de[9.Juni.2009].exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://warrock-hacker.de/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4446a973ff768177a7617ba5c819a4d

    SHA1

    c323c0305fb7290ceca8bd323775f1031156d331

    SHA256

    a89b97cb6b4cb774cbea4e3852439d91f3e1185cfc1220fae76aa4f8f8e043ee

    SHA512

    d982c71fd67231a27f9d636041dda5a465b44fcb6714adb927cd7d3c291345f793878eaec8a128571c6706dbb28fe08ceab5ecb1c25b662e43504b5ccf6358bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    230b405279ac2ec5d83ab92720379827

    SHA1

    3d9652b3ad4a8457c803123d4593567e186c95d0

    SHA256

    4da60a51a53b301b29dc6cbc001c5c69d77126a7272e650bccea6d688977fa79

    SHA512

    ac0c7fef9b5bbcc4e7be5cce527d9092d154ecad8d3df94f5a0107b28fb350c22696a9deca181b0d676daf8e0505e24ebe4d8e4f5165d284fc2144bde45d467f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45653f93b07357834b7e4733794bf17a

    SHA1

    179cc6baa57d6c90fb1d63ff0ceeae571ee0b54a

    SHA256

    6b23b4221a069df1471fdf8e221c0b93180ad1c3aa9966abfc3862618e26f4ab

    SHA512

    1e772c02c64e8e8fba86b8f0e1f4fea16cfcaa2626b645545f3b79c7b35a9609585e39d3ae841eb7644d83f2b9b0a29ed39dbc0170a1257b2c12a07411ed3096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cca3a393726e2fd4d610c2ab46c766e

    SHA1

    bb2c94bea05aa3d8ad35c72311e4b685bdcdb513

    SHA256

    dc09bf8c3df6b950ab8c2e68b8ca709110044dad96b469904825e9df5a05a5fd

    SHA512

    79ca28f8021558c4b44fe4ca588a96a0cfe6f4a257c60c6d23b6d01cc4aea75224b476268857cdd184845aa9bcf3711c23c762ad04545d40cf088240ebba4f0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0865a6b57f3746f50b19432216a78f2

    SHA1

    f9a31e923c507982f768481d98e0d5199711d064

    SHA256

    922afa020d1f9a66c0487ec7883fd6db3ea299114244f34f37c949960fc04e5b

    SHA512

    b5cd80dd08fad83b1907e1acba218b1067a006728c06792006dd64cff821161dc8e4460b47bb5a08d360b0d9ad58bea867e6a483d308a0db33a435cbc7d48833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7f7d1cb21d66acae807929fe2668d7d

    SHA1

    d2aaead38f557b8333140661185a8cf1a94b368a

    SHA256

    44b54544869996f939e1189cc8f56c237d9e57f9e51ec4863c9970ac77f2d5fd

    SHA512

    24ff92a0bf41287f4d98f628033dbba6091ce563988c6078e7221597b9d41af2e7811bd2209edf90f3a2a5ac39b10076c1168d93e3d7db6b0d6222b9747765fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a7d1f718ff5ea0a6d9b9951495c5b06

    SHA1

    91f6348c9de99ef4e3ff6fd526eaa7bb1f3c2cc6

    SHA256

    b8b10718cc1a45c73d6a35453c4aaab58812e8f4307f653ca22ce6512c4920d4

    SHA512

    dc73e2a8e875bc33c2763bca42b082e8cba750d242c5b1da4eb8ceea828f0f7cf94db92049ddd14029de28f853b14c6461b6be83fcff35d0d3b10e0a422ace30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a16e5bc67973f1b5eea4f85859536bc5

    SHA1

    e29ce8e165951241c75bc3a77eb15c54f88fe9b8

    SHA256

    1e0b37aa662d1dca062d09c071c9ee3dfd978fd0c05bc0e239937b5f7adf858f

    SHA512

    41e1389934a881b8f2fa71789f1c5b2c56ac478f890f7c83ac6a8f7e9df146fc1288e3ba3fefc9f292b633f5c9a9b7b49b5df2376352e7a2b28cd63513042c76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92b400bfd2da9e9dab7e097d7b117536

    SHA1

    43915a14a094075b0622a004ffa94bc923c23b3d

    SHA256

    00a1cccbcbcf816d81b6fe5a28ea70d9b78f2139173a829b32cea1ae0326c3e0

    SHA512

    e40f449c0e60f45127497926318e91cb815eeef598bdaf355945518f43b94a4fca66beee0223fd1822e4d2dcd0b1c6fa183834fc1b12a4bf3f06e92e2d182804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b69dc718ac7046e667632be74e5c12c

    SHA1

    01ca1e8e69c55fdc18401725dd7991bc76e222b0

    SHA256

    579b3252b15a38226ea0274c05b95b64b4f735133d300ca1c3dcf33b3c4bfe9f

    SHA512

    2709bb7ec859ba1cd222e9d815a499abb7b2162fffcac5ac5ef6d52f8b4b9fb405b7a40ea3d6c720842dfd931032c942acae4163153d7fffb56fef023689f380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5c967117e5ad5f405853ea70fd4efaa

    SHA1

    36ee1c159f8a10f437b78e3f3ff597611c9e0707

    SHA256

    e359b01263819c5cbd8e3e0baa4450bf92c0d7cd59242b9d4570a151ac9f13c2

    SHA512

    3f867d2f50c3b5ba9a5561163bd0812454e367aa25f9bfef4c832d30da472e5a436d55b8d31bd0ad81a70f4984a9bb62abbdf65866143f510e13141ec44bfd50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0eda12b672bad34ff1ea91d46718b5e

    SHA1

    3e189f0470d4f3904c8ce6079b3fcb2823dfb64b

    SHA256

    a46353f752ac7862541625704ae477b4ce7b3372c7e06d8789e6e582ca18ee88

    SHA512

    94614c064365fde3b96a45bb977feef989332fc70cdd5647285ddc37dafd23f782d3872014885d11f8e3040cc3f9f5cf0effb5108d292b7b9350dfa72afed487

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d58fd84f73663905594ae08ee5c120c7

    SHA1

    749e18375dd9138ef9356e023d1a0e141ac5c5a6

    SHA256

    60b2a509e2303beb71d2634481c654192094f2b9caa36d129b899e1bdaf9c8e0

    SHA512

    3b3d46690c0d70d0893d8961dc1ceb028d5d8ffd23d56faf682128d9d963c1b65bd8a07b03f4a41f750a48b3f6924eb19b2f096ef7d8e42a63963759fdb51c42

  • C:\Users\Admin\AppData\Local\Temp\Cab8643.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8B78.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63