Analysis

  • max time kernel
    119s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-03-2024 01:25

General

  • Target

    cf92dda49a91c36023ae0c094928f8c3.exe

  • Size

    144KB

  • MD5

    cf92dda49a91c36023ae0c094928f8c3

  • SHA1

    e0e94a498147359f329cd32eaef8596e7859275b

  • SHA256

    17be29b1409cdcce9b51f4950c2fbe5745365e89c180ef5f959ae2309a973d1d

  • SHA512

    28059108ebd2c66a9835c40c5a6984a05ea4fb28f77a3e9e58d77edcb1ae5ec5fc00477264d0629d92dd8e57e07bfe435e0784793795cb997046a0dd505b920e

  • SSDEEP

    3072:3v/qp1/WXqOWV6DqzknWeE/sBQ5zCFMFrdZx:e+6V4nWeE//dC2rdZx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3.exe
    "C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3.exe
      C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Roaming\Bkgpgq.exe
        "C:\Users\Admin\AppData\Roaming\Bkgpgq.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Users\Admin\AppData\Roaming\Bkgpgq.exe
          C:\Users\Admin\AppData\Roaming\Bkgpgq.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2348
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1064
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d737c98faf84a03b84586f89050a110d

    SHA1

    f3ede3dda86302a312f72a7e2c4affbb08f94e34

    SHA256

    73d59ab88a986edb3583f12cecf5832d92cd1dff7fefcecd9582598af107cb9e

    SHA512

    3e371f2314a6aeebcd36a4744c3f32599fc7425b26349dccfcd6e87041bb2a694743ba8cf4dd8771e8d113e7212f56a3bc5e1bcfa7daf49c44a822bdda769ea9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2c3698c3f7a63d69ec69262809b5d71

    SHA1

    20dc25eb290052b80bc810b8451908e634893282

    SHA256

    1ba00fffc0f0c87766bd9d8edb6268f425a6f14494d2ae1427213432baef3a0b

    SHA512

    31c99c4cd34e4835381eb0deb191f140bbe432993e51fb31beb9a130b3e483e118ff14c635b1dba4e4f48a8e6c39e6e75564b8293d3fe0a8933c74f4ab0a4008

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1b4d430447a145db675c1a741fd888a

    SHA1

    0395c29dc0b76cd17f7ddc2042bcb0f129dd6fcb

    SHA256

    86cc403853a1fff7185feaf3104c1dea1d54f6210d362810beddaa00e634fb05

    SHA512

    74d19d7df8019b21aac61c879fc52e29d18effce16f50709481f373cd0358082d51f493335c3c4c5bc8b45fd4348f5f24209d9c68b629e9917969e45e2fae2f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0105d3e53d6a1b5afec43345ba620b1d

    SHA1

    3e218f324f3bb201b7336e8c2d75059911a7ae91

    SHA256

    47a67059e544a22bc23f01a98420dcea5f7d93462f315f58e6a1fa666a984460

    SHA512

    347dc28a4c7ebaeaef4569aff22745e1c78f60f552d74ba843e6d4834b4bda1debb2c1438a694641d129501c21b3a9af49092373df4df8f9aefa7e1a0c88e9a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c7948e0bf31639b7325e30c33cee7b8

    SHA1

    41fe8a45b99a252e5d096a432cff7a51a336a402

    SHA256

    62a4986a4e54721e5a19de3e474702765654d8b8db276c432dd26fc64d9df5dd

    SHA512

    ef086f51146ca5501d9559db0dcd9a1985095ed497610fbd1d35b34419b7ed3d37dd895dec80c600a8a0be8a38d57208eed9f862a77fd421bdd66b426b0798e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    255543ba4f839a86b8c6179ba1f792e9

    SHA1

    d39087a9285fc4fabc200f966018068035a983a7

    SHA256

    e78e69cdb043e96953f8ce6ea75793207a05221d510ff167a45bb7b5f37f2dd0

    SHA512

    96c335baeff9c56ca767edd0619c24804d293c7216367a9192afe4cd3c39126ee59f6687e24f78b91c9a3fe48071f371c8ec678af89975a6de5c74d4be97e0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fceddecb8fee408242fede615786894

    SHA1

    0f623e01ed6b22b525a745694d8894b98cd6771c

    SHA256

    b2cbbd3c9356b6419ae05ac6fb17df71701d12fc96533db28a22bee4a88415da

    SHA512

    e3fd478a5324062e844537170190f9b31c0a73749dfaba712a41fedbb57239348b5a316d80f076fbaa599cb31809a73711d1acdf1d6a11008fa158f89a319edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e78958b53d92c325155087f0996f5ae4

    SHA1

    1dc92a03e27e0d023d2294287aa5b1e744b7bf23

    SHA256

    7c4334083be2a6374f3fe8730aa67552497a20124909cc540faf9f1fa91c8d3f

    SHA512

    4e3c153f2a8dd2fdfe8b14ed42766a42c981a613c63c5cb7e18cfe94d1aedfb50068dbcfdb2de7ca21d3dd66bc0361fd23209cefafb53d58d29d67af35a07be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    765b8fddc43c1bec2de388f1eb41ca43

    SHA1

    0a6d9e370f8dc600f778727225c51d58ba6dc80f

    SHA256

    c75847321707cfec7ccca98a2ca0bf35147771b6d26e95b975f2b32e9fc86a44

    SHA512

    57754be1293738dfd0c827e0db046276a18d5940dfa06830f8fae920bf77570f9b60233c94f9479785cee94afa8159d0648962b7de9527310bcd380b5bf81813

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cc973a605ba1bbd862b370226e8019d

    SHA1

    b7f1640f85114e58a706af35d21cc41851968b5e

    SHA256

    05739fd74fcab314bcaa388b7bc4a23c0e7ef190c545890ad152e1a4df72a393

    SHA512

    9b9713274130a7a01975199c09fe106b60b3736eebe158a056694025bd75ecaa80b697266da20cc5b162690d6d9bb27d456159a13d5fa7e98564f9d40ce5c134

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ed7a6f3c5dc9629dafc169afaaea16f

    SHA1

    7b5327b3ba64623a84c2d52f3b23c8dca20ac889

    SHA256

    82ec28d6a6ba918bcb0da30e9836880c6ed61ee434c8f6180c92314d4647acff

    SHA512

    2e60af565140cc04db77efe4bd4cc18117c0f9942a7d87058be98f19acb56c434aec642791a6b07435c4f05a9d07c79340fad692f0bff234faba21c072185213

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76caea51fa07b43697c0f275f53edf62

    SHA1

    6748e32e8377dc2c6e997e1e35e1dd59e89328cc

    SHA256

    3af4ebdd0a0d95374f48e156e5d6ecf7fe8b72fbc2fa113eecc145d46e8b35d0

    SHA512

    645f2c6d1de25177df6403fbb3a230a922688ca922df8aa35f5ab801ece9e68bbe2ab9f18fcfebcd246d57d337fbfd6250287112813e89cf3620e2780d5ab81c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bbad346ad483d5e142e959650e28d27

    SHA1

    d2e14222a9ace09fb98cd4f2d3362c8dad28323f

    SHA256

    bcfde7a8c319a67b43a8d82ca87d9c50c214693b6e1d74f0b188f3e106207114

    SHA512

    38729558c75403d193e8ed3c6ef0435502a25bebf8cab4f3dd74f3b732c6a680d3a207cca3435933a5093f0302e4347d8f382be403fe9a368af73f840e90dd1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a498f6a09e8b5c966f53fc653ddc0a8f

    SHA1

    b6ce0c47081754128773490f323242392d797b45

    SHA256

    7cd022aeaec15b846ae77aa34d09dba0f1cbee1aeb1e491808d6657fa8b8088a

    SHA512

    a940bad31658b449adc88c02008c58e955d174b8ee1e1a516add88eccd37ad5536f279656980baad7348675940a52606018d46172416746d64b7474f9afa45d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22ccd9cc72fc35b4db2f148051659d6f

    SHA1

    c4f819e2d5784c9f4db173f052e8a2eff2e6fd73

    SHA256

    0b17428e4176f353aaf10b1690f47b1dfcecf2456ad453168646ac7cd28ad2ab

    SHA512

    09ead7f6ac82ec6eeb8515fb261fd766e89913d6bc095b6fc4197dfb41aed7dec5471642a5f94d221c8ed420ecb7c966c2415e202309daa433381682fd02fe97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    004147673785044734a28d8bb91c38be

    SHA1

    7e2610390764d9d8e05fa59aeb0b369202c87418

    SHA256

    77b0d0f95a74b554019fbf533ca3d9a91710c543ee82d26675f1e888d26286f5

    SHA512

    6e1c3725a92071a828e0ab4d391c0cd937e584bc8c1768fff68bae555824369a068ff9e7bbcb0eb805dd013ef69acdd291e43e563c10001207eed23878d038e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf9416a3aea92317e6a9b5d3f192635a

    SHA1

    b96c615243a5ffecd56ba0589b7c33e25eb08771

    SHA256

    dac8456f8248a28190200bad99f11b3f3bb17a42585862faac42095913bd2552

    SHA512

    36c90bc0cbc49e5f49f3fbb6eea8b6fe40f9e12264d09ecaaea83e8f79c21c1fb5731eb7812b9e7e706550a5019030bbf1951577f8c7830d154f4d1e0318b80c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4a9847afbd0c42bc8d7297329be36db

    SHA1

    e6490d340eb247d84c50cbd547b47acb07765014

    SHA256

    003dd22938d6fdb52f0dcaccc4104dda81856e596b600ceec91f6fc224ea3931

    SHA512

    39d386bec91df8f9fee7909f566ad49fa09b236988c2133a1cd0e896c64701e1422610349a0f7c47af5ed824610bdf3b031a1d0501f4d418a8b868a671727264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2cf0ac19675f996be08e8d8d492c0fc

    SHA1

    21ab2b4ce1dbeeb152b0f3900c9fb59627fe35ae

    SHA256

    3b8a891378ae46d190d926ccc95ab18655099e0fca0339c7cf15f0421ee5b2b3

    SHA512

    7572c14542a2478047c783c3935a2318c7175e783c375e5b6a4c18b13f9a344c5489fc6267f2fd52adfd9f44f4e09ac244df53428dfc1c893900702a2cab8ebd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    536f5b5a8293acbdeb86da1dfb49d454

    SHA1

    d3c8b82147260af48c45778c6c15fee64a801e2f

    SHA256

    7b80d1d313bd5fbcc5b4cfd9130dd77c937b2ded530eb796e98d4bcd9486a182

    SHA512

    b5e69d466ec3eb739eb650f387d704d5de3cf1d3db1a0328f47ed68896aa9c951901c146fdeb19fffa18ebc6d1e3756f4e929283342333f1cc92f5f13f322753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71cab0223bcd8d009397474bd9dca3f7

    SHA1

    680ab050f574420c10eddd201e3314e7572e9ba9

    SHA256

    d078df73f1e29fa0b0f260fba6ad20e5b89048d01375986b0e8427f1abf71056

    SHA512

    2aeb2b18e5e41ef2ebb259bc92922e1c88ea2ba952d730050fb0b4a47f27ad7a776dd7ff824dd7ef285adafcda598844be5003781ea905b9f5391023b2d66550

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    094dd0e97cf66a8da398e2e24b630985

    SHA1

    7056d839c71b62545d6fe1cb0ca426f59844ff63

    SHA256

    2614cb1507a403d7ba9d400f583c6c373b8cf96b5d33d870825295f624e97cb5

    SHA512

    31b324cd3a3ca0a14d08e3f988b62956bdd725c79cdc7b819d69deb02ebc3241475033c6066aad487ba93c5ca297dc663a730c11dea11f03995a3d7dd5c02262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcd5994c1d052ec7f0bd75971d976075

    SHA1

    14710055f0b881276da0af991582398dcbbebe04

    SHA256

    7011811920edb6ecc55dd57be9b78f3a44e30adf7d00fa3d42c705dbafd7c98a

    SHA512

    db10630065b1b07387e3fc164ad42a9d0fade668392642276d44a08c03d0d52790bbd57f97d85d2c61f9be4fc491d2b96f12f85ef9c87b9aa0a277a0366cf0ad

  • C:\Users\Admin\AppData\Local\Temp\Cab4241.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar447B.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Roaming\Bkgpgq.exe

    Filesize

    144KB

    MD5

    cf92dda49a91c36023ae0c094928f8c3

    SHA1

    e0e94a498147359f329cd32eaef8596e7859275b

    SHA256

    17be29b1409cdcce9b51f4950c2fbe5745365e89c180ef5f959ae2309a973d1d

    SHA512

    28059108ebd2c66a9835c40c5a6984a05ea4fb28f77a3e9e58d77edcb1ae5ec5fc00477264d0629d92dd8e57e07bfe435e0784793795cb997046a0dd505b920e

  • memory/2348-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2348-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2352-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2352-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2352-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2352-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB