Analysis

  • max time kernel
    121s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 22:50

General

  • Target

    d7492556d08d0fafb6a30c155fbc4185.exe

  • Size

    581KB

  • MD5

    d7492556d08d0fafb6a30c155fbc4185

  • SHA1

    d8d55e503aae39097541150df451a518947db5a3

  • SHA256

    57e7881cb8e9fdd67c38e7aaed201b20eec31deba4306a636643a7e9f8dfea6a

  • SHA512

    bf3470391d6e38b17eea795416990603919272aee182931e4cb8afc7ac38a6c61d7ab55e214a4c998e3e31509ac1247744999476c0d54d30c0a041c0ff060aef

  • SSDEEP

    12288:uoMDtCi7NFlZnNqZ9xGrLpZ0ZHEqtgb0UN:ufplNFgxG5eZngb0W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7492556d08d0fafb6a30c155fbc4185.exe
    "C:\Users\Admin\AppData\Local\Temp\d7492556d08d0fafb6a30c155fbc4185.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/?sl3
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
        3⤵
          PID:2440
      • C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\newsetup.vbs"
          3⤵
            PID:2424
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\1.vbs"
            3⤵
              PID:2448

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b174c6dee3022a7a4072f1d0244560ac

          SHA1

          d442880a6e542f6a2384c973edb9929c0529e332

          SHA256

          74f5ebb823be4e2d3943be38fd743a0b341b8ba0baa529b3b8563dc03f14ae54

          SHA512

          704bde5cfedd33aa6921dae30b3ee4199d60c4ef5d48b11c990db5f4c1123eeaa263350c0bb21cc83572cc1982e077a9341d427c73d0327feb10f31dd9124381

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b6de8663a8b09c95ad02747c70937be5

          SHA1

          c9df784ab457a37caecfab5d2ead92231f94b7b4

          SHA256

          22b76675c53cbfca3d42482e871ae7ee171bf404798776fe92ab0bd5e3647a44

          SHA512

          adda371148ee3627e64a09c02642cc1edabf1ba689f232be796252fc441249d9b05233443a81103be679c2a89f1ef5a0dd1b07ed673dc4f2ab68cec8032c8465

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7138af597113ad0f018aac9b419f176c

          SHA1

          2c31aae23dc6db64602d367213091ca7d0dc4e4f

          SHA256

          3f7824900add60d7264c3caf6a1d6b4ff029fbe9452463ba1b6cbc3a762fb900

          SHA512

          37fa63b3d0b3c0ac326d1d91c1f5e1e98b51819720f44267a01eb064308b078d33afba70415216b4744462f71c4f61299cbc3a35c6c65d7fae389f19fdc84ca6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6a6ad25bfa41d2192a469669fca7c45f

          SHA1

          e032f8692b90a7c79897cc9b61315ee89e763e61

          SHA256

          6c9e4e34e789c62c27939b23da5dffe2ec271a0e0a5ba1c11a9ff67930d0d171

          SHA512

          39c5f6c4b47778d26f6e736244e9bd7d436bc0f703b28f134e2160fc317be961b7a5471115efb6f9803c435352a4cc70e38bb4ece4fb637b5e5d0d0144e10726

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fa65e09dd0c89791a1d206c7c39bd12c

          SHA1

          4c910e525f98bc475a229d383117b7457576061d

          SHA256

          a18dbe08edb60f8fe8e346dc4c3d3bd70643513a13688cf96fcd69504e27fbb4

          SHA512

          90e701436fd4f55cebb0ea0a6964fe14897c9f9ca7b4b0cbdeaf2fd640fc1cd4dc4ae500bfb01e30df624147f2f07b10e4f615a7815de4218d8472a414525179

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5fbaad5c48e8ad3048edfe783b495ff5

          SHA1

          79f80b8066de89bae4a81ae0ccaba9d47c52adbc

          SHA256

          f497a308a924f7a3668fe40c6b7c8e58a02f4271d75854a778961a698c3359b1

          SHA512

          75b7538bb153e1a9998b391d5330139b144d684f6a92087eda13c4a2e375ff9eee9efdbd5f0cd4ccef75212dd7927612c3925f65268bf9180c0c3bbec4463853

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8649bdd48e819b27589bd6e709788c25

          SHA1

          3d80ed9442b4493302d4772476e7137d3e9fd6e9

          SHA256

          ae1eaf86487abc5a1a831b9b271edf42d861efdd2e06305cae5064dde17a4df8

          SHA512

          306b4760497b0907602cccdd03376ff0275040e06025c71c263ca779a53c4fb0388f68898aa9dbe2b031d0e5ebb31002c0bdfdb3c0bc4807ce2fac931766c619

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e5ae31d570c060a1260cd997162949e4

          SHA1

          b35ad9a3f9779040502c0a078fa342f3062873b2

          SHA256

          236dbad78820976eae5630541998d373db06dc2f8571d43019a65653275cebe1

          SHA512

          436d0f3837006d95a404c86a2d702141514f51481e71cd788a559369d290571fda14c53287693b540017b539ac2726a348520344c9e639b6da000eee262dd38c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3bda97815caf2cc6d1321d6991b6e643

          SHA1

          c0c80d1b5a61388bb6628b2aec82043298f03e40

          SHA256

          aedecf000f0a7fa4199fcdbf968761a308f2324b8fcb6f1a6b308ba133c83705

          SHA512

          f6ad0ea7964b7753cbaf910c454c45fa43929de0c5c9028918ff3f9370b5aea540325c3674d93a611b411682974f94bc333921073633f11ed6429358d46c5a49

        • C:\Users\Admin\AppData\Local\Temp\CabAEA9.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarB121.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

        • C:\newsetup.vbs

          Filesize

          651B

          MD5

          4736e7158c27f244482f5a614b9dbdae

          SHA1

          d3a0e95a81e9e3ec95cfd596b25749a0e24e27b9

          SHA256

          b8229bc8d6b0013858fb9599cb510afa4566a439164b2c7444c449540a124acc

          SHA512

          cebf895dd3ec3822c42b78bac49c685b063cb5afcbcfb3850b073cb118d086c5fa75ec50b6e73d90e14f2c6b595752ad87910b8cf27378424d72a9ea309bf824

        • \Users\Admin\AppData\Local\Temp\nbfile0.exe

          Filesize

          467KB

          MD5

          74869a0346ab36bbba85022612505121

          SHA1

          2cd02f46f2f9f46eaf15fce40a3bf4781f80cf8a

          SHA256

          6de866b5c8abb1db9b2be231b365c1aa029118fbc58823f443f00e3a33dff18a

          SHA512

          723812083113cff82aa5e2243759c572518865e351cc81b7c2b85a05557862dbbd7a98b964ff6f3aa3802bb5d4dab01a14147211495fc5803d9ddb7b715f4de5

        • \Users\Admin\AppData\Local\Temp\nbfile1.exe

          Filesize

          52KB

          MD5

          c4ddf11ebdbf9d8397d710d2cb4e2fab

          SHA1

          8008c97e7d6ff92deb3e1755a614f4afedca92b9

          SHA256

          67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

          SHA512

          3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

        • memory/1496-11-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/1496-12-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/1496-15-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/2184-8-0x0000000000510000-0x000000000059A000-memory.dmp

          Filesize

          552KB

        • memory/2184-10-0x0000000000510000-0x000000000059A000-memory.dmp

          Filesize

          552KB

        • memory/2184-28-0x0000000000400000-0x0000000000497000-memory.dmp

          Filesize

          604KB