Analysis

  • max time kernel
    146s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17-03-2024 20:47

General

  • Target

    d1d54d2c7024df5f6c6ba10e3bb2a607.exe

  • Size

    148KB

  • MD5

    d1d54d2c7024df5f6c6ba10e3bb2a607

  • SHA1

    85fc23d35b46cc765a02f4a512ad324aec563690

  • SHA256

    e4e8f8e5b2867cc08bc0b0d6daa8797e048c85a1e6af13ab9855da6f85eff2dd

  • SHA512

    0dfac71db8f940d04b221e6746794d0546b348e656c7e3e528cd0bb99a3bf0e00e26c516f856fe4fe337789fb28f85a45ea3d6e5f180558840f4f863ecf47438

  • SSDEEP

    3072:7/nIQJqi7fJE0WU+THP5RhwhhsgWwXNwmhurZ:7/IinhEDUOxRmTgw9wmkV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607.exe
    "C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607.exe
      "C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Roaming\Pmvqvf.exe
        "C:\Users\Admin\AppData\Roaming\Pmvqvf.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Users\Admin\AppData\Roaming\Pmvqvf.exe
          "C:\Users\Admin\AppData\Roaming\Pmvqvf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78033df8e97f1632570f1293c7d11d32

    SHA1

    c5b5a1a4a9b9630428bf2b1f9be2a67f78c4d7d5

    SHA256

    53be50b56492e0f7399bbd3aca42a6da6cfe009b129697aa3912b625b33177c3

    SHA512

    0fbe89f8f4bd2e825c2d5ad8bb705c8cfb8a11446ef59978699cf0edd2ddb1af917c759d75834aa04f9797620249aeb11759c61a1c4ef3cc742958d1aee1200d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4bdacda56923e5a4ee0053b99a5bfe9

    SHA1

    02f7d0d6fd99d1ad19ec2348d9ddb7549cf51abd

    SHA256

    dc5da42d089abaa66b7e96db40b556b6d96aca46f833d74892538daca651b915

    SHA512

    c7e3538418180dafb24dd702463eed33be118e83dff4900c66e1f7615246e94e2fd444d96e7487f2733bec01ebb9c61457b21f18c99ddb98ea575764c61d9d81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3049c4a4e67d15431d91245d12132ed7

    SHA1

    32f9f7cea3be413415381f12afca2ae5fe7d8d95

    SHA256

    1a2e3050032175a9f46715d41bf961c8ba70510a78c20428cf6d6fbde89add25

    SHA512

    bca260c659a12168adec32c929c08d49af0b595d3f19930e050f40b135b401f504a45aa26b3031600fb84655e91e9817e4ee495d8586d14a5c5dabc9e9caa6d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    649b2cf75a1164eaefa3f8d5642e56df

    SHA1

    9adaf653a134b3dc9bee500121ada675f2d0267f

    SHA256

    0bf5238587e9bf823c421948d5ab84003f05136ca9e7866f0493393fc6045676

    SHA512

    e2d64a2be7b05843febe995b6dff2236fd43b503989598d3b2cade00194263ee4205c1fad3dab3ce53387a3be6198c60df0cbe3b62a797c72b33d1314948b69d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e865a0ba761b817e85eb221e4b866d58

    SHA1

    7e06bed27752b06c50dfde2ff75ccdf3cf190b7a

    SHA256

    914586de8ee365d27b867c03f1cc590dbe49390ce755baff0e3502cf9d8826fc

    SHA512

    073c66e3711ea4577b5f6c615e28c1b7c6c01ec6a5e49172423e888d6d9e4394f8e5a69eaabcba5c55e6a134432d7487285191a9b29b33220b0f79f11cf49f16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    744af1656d5736db3be46c78a30247fb

    SHA1

    25e252cfe803da4a3af0524ce51a3de314ceee8a

    SHA256

    6c3b04ea585b296790a2f0e1a78d0b9656a3a8ab03ddcb5291fa90ba68fac451

    SHA512

    d4f38c093e0a36f9b0c81e6235d3a85c19548c405451d20e8f851abbafb946a302997d0f9317c0e101d9fa8c03cd18bae1558603ebf84fc189823d10c026d0ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df0d35fe647f60ce37d64d38a684e415

    SHA1

    c57b81807a0ff11602d90be096dc11def37fa452

    SHA256

    762c4fd1fc2649ec8321562d3b881e01998ee147414703d5a6292b2e6c0885f7

    SHA512

    21e13fcf4dfedf55621d939b2112f069015c2f8b0dd33ec358f6283c23088c9d82bfcf1bc0baa4f04dcd7df1aabecbce49d58dfb1ab40a2d9d9e041a95271edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e48847fca255ac581d4ea6ce8eeb8bb4

    SHA1

    5871ced5024834bfa0d5875dfd3b28a378b8e663

    SHA256

    17fa8665b806aeca0bf446e567d1fe01c01c770df5961b7e7ef77a6ec17587d9

    SHA512

    5acc9d1f89e9badbf5b93d3919d41e634d8b2787cc2cb3c0f7425596c6f616272c56d2508534fb9a050a37b182ac66a613277e27fe565071c7b42c68b447bfcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6034daaf89409ecdaadb08a7ff737b5c

    SHA1

    12ac708303dda93669e26e73d81e64b30fb17d6b

    SHA256

    1793bc0356402f84ded01eb7019af3e1b8fdc004cd4aa2078e699d1f64bd37b4

    SHA512

    9c22fb1a6e37cc3f10a7c6151b5100f2d275f6f5ef947172d4968966a49df5faac3af3e3140eb20931c27b624ee87c018bb14a67c7c9a6ca9ddf7ea34100dde8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6253585bd30ee569a747d2d02c913c97

    SHA1

    1a2e7db440468a99fec6186f66356e8b43176f7f

    SHA256

    899bfb3b5b8239feb82f4769ff452fda62398c37752b6465d12d72ce27597739

    SHA512

    a5b94394f831957cb1dd38109578a9db8a104a264d98c8b2d536bf8194c73d13a658977a3a00453e609be2b2296f97ccee6a3a6408ccd94df0c5423ee1dd890c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df6645cc1f81d1a2343634f261f5ee5f

    SHA1

    83c6278036a4056902b04a2895a86a886f495b91

    SHA256

    f9dbb0a9cef5fc6a5143462897a2e794f2ef786974080d64f8b2e549d3f6cff8

    SHA512

    89b314348c1100c1c5c7adb5196f1390710262cdd3c2284c1b56d9f150cf9f24adb376a1ad24b63ebc66040f545d191c3b774b47a96ff0f06b5f9e1dd3e80e56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2624808aee836b637723cae1a63bb87d

    SHA1

    46f76659312e9fe36a1736d7af677c95e3e76492

    SHA256

    df4b8f518a2e12cd9af6db604d7a5f4bf3e9162040b2cbf0dd4ce3859997bb9a

    SHA512

    bd902e68f365782f99f0bbef1e305e257970dec90ca88a9e99f10b0d77c46646a6782d0e999f33dd814bd390b3a8833cfcecf23d649307ad9d133b74c23de667

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1481dfc5db8da0f386505c67f539bcc0

    SHA1

    21332f1c3a68ab173d09644a8cc91e6f26ef572f

    SHA256

    2825a9143620154e35bf7df0982b8b1ad49d3869b8fdcd6dfabef87589871ef7

    SHA512

    cdef1b232d3d9f985b786d5fa6f8b933791b8248af689ac89af81a0630aa72ba0f81c783b889694fa0dbdba738ff2ee61f653ef4e7af4f7f3072efa95d7e7e2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30598f3724367b6894c8a5ddf73b537d

    SHA1

    fef244e9cc8c1144d4fd5d887d511002a9c47a1b

    SHA256

    19fc077dd95ea855e635fd977e49a8f211bf71ace7a550b56d3ba5c83e057fe1

    SHA512

    00db6a5cda7dcadbaed45a8040495ebe6b0c62c7715b1a343d888bb4023e0bf4f2cf3e8ba89e5b836a4a76f940f957e9dad80e89b59015df21e922d0cc9bb707

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e4b649f1636408ab4fd58c6542b6fa9

    SHA1

    a611cde35258a2c3d8a6d4776a925c4ef3ab8807

    SHA256

    a091a34e5e9a00e8687d481213fdcd5cd3cdcd32549d50817573e89d2ada65a7

    SHA512

    42f0f7170dc04a23bf6dfcd4ec4385d4ffaf51b007de322cefd4da49d1a349f427ed5f687cca9ee6670cb271112e2be31cd095416eebe7f0c5cc2a53be858215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b552403444f050b78bb88cfd81b1174c

    SHA1

    62dd812a1fc43364d4a1643fb2e65eca341d0bea

    SHA256

    fecab641218c990fc645636251aed5e445f1a49d403b66bdcaaf7f0da0792eb9

    SHA512

    611c2f4ea84fb9117b6d85002fcc922a793703c0de926e4d309b531a3eea722253f404cb45ec31b669b5fd502aceb372cd23dad1776606d4701648809dfa0c91

  • C:\Users\Admin\AppData\Local\Temp\Cab5265.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar54DE.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Roaming\Pmvqvf.exe

    Filesize

    148KB

    MD5

    d1d54d2c7024df5f6c6ba10e3bb2a607

    SHA1

    85fc23d35b46cc765a02f4a512ad324aec563690

    SHA256

    e4e8f8e5b2867cc08bc0b0d6daa8797e048c85a1e6af13ab9855da6f85eff2dd

    SHA512

    0dfac71db8f940d04b221e6746794d0546b348e656c7e3e528cd0bb99a3bf0e00e26c516f856fe4fe337789fb28f85a45ea3d6e5f180558840f4f863ecf47438

  • memory/1996-0-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1996-1-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2160-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2160-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2160-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-28-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2592-29-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2632-47-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2632-48-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB