Analysis

  • max time kernel
    118s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 12:06

General

  • Target

    ce05a1790947ada87a8fe19718874e51.exe

  • Size

    260KB

  • MD5

    ce05a1790947ada87a8fe19718874e51

  • SHA1

    163a6755a44c363838e55afd3bfea566dec36b5f

  • SHA256

    65242190345b80994aca9969ef7e8d6a1378520a7d9d5e02df916a33957e321b

  • SHA512

    6bd270e22132f4a2b88fd04912b7584761dbd7a0e05a49308ed640802112be52ed5a0bd31df644c561510664ac6a9ca2e72794ce0da5c0254c0ff9601ec13d5e

  • SSDEEP

    6144:oiBPjksfQRQLYwKXEgQQQQQQQQQrt0QQQQMDLQQQQQQQQdgPnhcSbLKR9p7l:NJLfDjKXEgQQQQQQQQQrt0QQQQMDLQQt

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51.exe
    "C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51.exe
      C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f916b271fd096c2eca1e421ed346fbbd

    SHA1

    cc16471d2d01f106537b400e1b79f1a464c2443e

    SHA256

    8c0bd88ea13224ca1bfbb98c70197f5d8a2b8e2ed8bc1523a090c0b173189331

    SHA512

    d98b3125a03de74fd11042bc883052ebc4287c129bd2ecfea036a28a471e966737ae79ed7adca8cb26f2d5a812bd0e9ebd03e106094ac3e2d8a5120bbe0d26d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1fe44c4ffacdce4210dd61e7ab15cf2

    SHA1

    eb4e131d909dbd80e9f2023c29a97fa1e44805eb

    SHA256

    0ab08f7dac08bdc11394ae0a985047bb73edeb40d01533f290e7b58f31279626

    SHA512

    f57a58cf779b37752b7331dd035f0420ab3a063ed3c65ee827bec2375b2057e5549b30f67e1ea06967548ccd3a3ac248948d8f8a26d01d89b36c2e37de40874f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb05b42c3ecb9786bbdf8e2200b1abe9

    SHA1

    60024130a0373a1be0d62962256f97feee572c15

    SHA256

    80a58b3fcc17419b48b839118527a9327723722ee6790c9bc2415bb0cfae2f39

    SHA512

    32dbef0ae99cab3bbf670e2021860c0fa568751be6958612ddcd460b941fdb0bfdffb27507347b0a59135c6ab4a63c1b7c7687d59c90274071d135fd150fe5a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f601e3114230c6bf2efec7b3983a87d6

    SHA1

    0b2a74df1b1f5efbfef5f7fad3fe7ada2e521f7a

    SHA256

    b710763ee05eeea87e7ee4b13141888c5c9a29af2246d6d90c830a8ae972d8bb

    SHA512

    20972c0d3aed41354debd0724765eb79b0d16efb608f1557a1f03d4d86bd66f8208b26d9e5f905a35b862b6ceb7660070f617033c5dd93950b380daf20e3c411

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0c692a4e8061fe562dba71274096bcf

    SHA1

    eeb45cf583fba5783efa94adda89c9f449391d15

    SHA256

    7c67d0d1f62098489c993586a9e99ad129719162930c0c1e4bee3130d7340bd2

    SHA512

    de48e49c38ae9d57df219bc19247dd657235c1918e89d9ec967b0186be94ece32625e403841375ee95a008f9f909cfc5b63e2f84473fec0ac50ab918adb0aad3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cff7d0246220a1da3f3356e60f3f06ef

    SHA1

    9a583fd5b818a80e5108ebcd0fa928bdc3e288de

    SHA256

    3ed4858281d2ac24ea8544165385988fa2037d834667031946eb4e8a938f880b

    SHA512

    051a1d07c192ef3a2891c3c99445c5046e5d403dffc732f8660b6d60c5d70a4e961615949cf6ca1e7735182152faaabbfcc537300d5e748532898f66691ecf1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3766386820dea2f7783a2fff317526a

    SHA1

    af987030647b5896e770a7f1d269425e66c41d53

    SHA256

    fb8712cdbe8879b12393a3db8379e5e99b66d616ca92c2ca3b2ca6f003ad4fdc

    SHA512

    859a6b53c3d0faef82f5d16d8e3480e03ed96f471bba4e71b27b96ea65f0870256a62c10bb0d2fb663e5838b916019de278533e4aae413e670d7419df038ab10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f74dcec98775d00cc6d2f97f5e80350

    SHA1

    ab40ff05553c3d962fe5192152b998a5b68e9341

    SHA256

    3a4677f270a024268c3da85e75c4a5487614e6b1d22fe2b50a6cd3653341c8bc

    SHA512

    0664916b508559bafc7a83059297f460593813cb76c29071650f3ffb38be09aef37786a38f9b11f52fe181f77eab3f03738ed9f4c7c75c2aa723d70cc1f5240c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fae4fa95b7471a2c6323d3b8501307bc

    SHA1

    5bf79b572ca169dcf715e89d197fde33c8c32a36

    SHA256

    4051cff3ca2826409345dd15c919e580a4a638f8f678a667d13e5639d070e2bc

    SHA512

    51ce4c40488c956adc988ef9298186bad961a92c5ffda659f701386da9287481bf6f54fe33e8b032f323c4512e4fbef26de6440f6e437433b833adff301bde85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6228ca6a916cfd29c8b2df165780ca5e

    SHA1

    9e40d977d195080c21b0bda0bf834b4e5e0c08fb

    SHA256

    9ce361f9a1f44696d5b412944836793ee23f2df8326313591a7ce65abaa8fa49

    SHA512

    25a430e6df415c5aba2ff916e9213a6167c75158fa5c2f686ffd8b495841955b97a2e857a7b19ca494980fc51f966bddd60ad4f7f16e809acf1d12bc99e8ea68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a99dbcff9e7d25ec2acebbe65c06445

    SHA1

    52eab63e20c93a41f3e2aa7e5ded5e179ceee6d0

    SHA256

    9364040cdf145abea58c441ba855bd75376d357e5b70ae3cf85f060d422f9087

    SHA512

    41939b4df9f26154cd17eeab185ac794d3b1918094ab6645e4f885ff4c241a6f8358dded7591655e43b88930354dfe7b2d7f74f95eccceb92e15d0e39c675002

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    baf5790ec88a2d881b44f54d11cfc22e

    SHA1

    298f737d1cc65ef5bbbff95b8c4a1fb2920cd170

    SHA256

    7d77b1a54abe7e6e12ee9f00f3e0cfa391def9b240849bb6864c1c56d033d214

    SHA512

    29d0058945b368ee735a3275712a78ae9aa9ec6a7b31079cfae6a460bbb331f4de87be6069e6ebc43d77535f4f1b7b465203ae2784b2635736bb4d38e6ffb911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87fb59fbc92e7c0240aea32cebc422ee

    SHA1

    67d2584f3a2e7f86c69af70ba94d99bd13e08991

    SHA256

    d6d99c4544ddb4640338147b47ad473f332bf904e6d55132b5ec5efbdd70b53d

    SHA512

    6ac18e6292c9a9e516e3dd50ac10e34850c9a82f85f6979e46fb2a316860e2440dee6109644c468e0a5d376a5f778f73f4f821982e4b1bdad265e215017d8ec8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b1150f50d873063a90d94178e667079

    SHA1

    bf275760ebc76a9e21dfe8bc2c6b5b944767a9fa

    SHA256

    b287eda6980f726cb5847ff019f4401e2d571ba142e47e1c6abe2622ba412f60

    SHA512

    099a611f36da59d9a5c937762e7a6ec13f156a184cf394f2506045c7f4b7496b9dae7479d5b3d4cd73fc272638512fa52096d881621fd5bc9fe6247cb20e1fd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5593ac6d044df5b0995bdddbc72120ad

    SHA1

    b7ff7d7381edba2f3016a79b0962f2a344d874ef

    SHA256

    1c6b071a2c59c435e51416fde1573f5da8ba2162b7086af35667a474a124d3af

    SHA512

    6494c86754e83ed606410265956f7bc778f15b5eaea4eab06ac3c0c4fc88ee4f20100d2dee6d4c3f0f6ad41a4aba2dd7d1cfdd96115534286d4a00a47d22966f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81c305a4d1d29bdbe1c32608a1645974

    SHA1

    1975ee8080d100b9824be29e07c1b8a988da415c

    SHA256

    e5f5ea4cb66f12dc311f93654e0d273effd54558f1410c8b4bbe323f7a48e425

    SHA512

    89778fe6493bdca86b02dee058c18f21851cff3734e7464b716e81310ff9400c0e5240afdf0a21a18ff239324116993381c23c023468232094f4bdd608877da6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9176a696ea1b5a2415c327e2ec257f4

    SHA1

    b3829952a745b40ad566369fccd11dcc4b5fe044

    SHA256

    42be94927c2e0ee5a3103f34b4ddac046cd1fafb7adb51772bbf9c6c5abae0cc

    SHA512

    bfcff9e20a4aa9d26ce701b129a7e45eb0699da0c443fed133b8a6f2715b02978f81db1cac12085496f6e35e57367c1c94495812cd05a2e656def51ace4fe1f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7e8f6616e777d8f6c4a561767cc81d5

    SHA1

    656df2ca560fbc8771179986a18fbad7af4c9f59

    SHA256

    9243ecfab57a8ffbba3bb4fde020de632c2048ff4c13ec7b3c16d85411d04ca5

    SHA512

    78c7f263d88a7692ee54cf22e92e52a88209e52a2efb6f46f609c759b06da239376ceaf6c75174ab6fcc20d6578f563a916afd4428a9692f6438755c660070b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e8c5d86abce462dfbd3896c8acb9c98

    SHA1

    07d485415bb57ee91d204814169980406edf16aa

    SHA256

    a9bc9ecbd453bc82301c2076603cbfb74b05910a5018a69cd4020f7db45258a6

    SHA512

    e0e60235c05a29e6ceda7dee35730c04937c1b6a30333404e1527d48d0c1908f91316d5bfbeb4ea57087f139c5acd072dd4242bd2517af6d482104a7d8d4eddd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a09a33f0fdd9429448978c6a19f28bd

    SHA1

    0f895734487b7c374d8d013056b7703b841f27fe

    SHA256

    2921037e667d7b831e3360b2c4b11ab1f4e410e5187d71e645633e9aa3855b0d

    SHA512

    244f48d06e0216b0b29965fb3f53c6ed12e4412c26ca2468f2139a524819055fc78e5415e298e024cfdd040a9349637a5c1dfbf8003dcf14d716a96db8665741

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9138bfa93c7b253ae527e7942bd3b43

    SHA1

    b5b63ae11dacc243053b189c0a1bc093cf8e59e7

    SHA256

    18adf7106e2764f17c2691d852c79013b9d23943f1c49aedc4d5f68ab8e0e7a4

    SHA512

    44487b314fb45c55cdfc2c54294580e129759d9b8279ed33e394f7e968881f03962f5073bbe563484dbe2196532ef3278c48337505e37eb08cf6bc4dc044761b

  • C:\Users\Admin\AppData\Local\Temp\Cab91C7.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab9A42.tmp

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\Tar9A85.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/2200-32-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-36-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-50-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-52-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-54-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-56-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-58-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-60-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-62-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-66-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-68-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-64-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-88-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-89-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-46-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-44-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-42-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-40-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-38-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-48-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-34-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-24-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-29-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-30-0x0000000077D4F000-0x0000000077D50000-memory.dmp

    Filesize

    4KB

  • memory/2200-28-0x0000000077D4F000-0x0000000077D50000-memory.dmp

    Filesize

    4KB

  • memory/2200-26-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-22-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-21-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2200-17-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2200-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2200-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2200-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB