Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 23:18

General

  • Target

    d75385841ba84180116304a6502b2cfb.exe

  • Size

    686KB

  • MD5

    d75385841ba84180116304a6502b2cfb

  • SHA1

    0e161d341fce830894d6332192805c5e1ad817e7

  • SHA256

    4b066e6f81bdb021faaf9e81e9b1e8123b2fc8379843013b26a2e5efed26424c

  • SHA512

    54dcdea62c09bc9d19c964883eac79d3f127df97f775cef003ea8858be2a163fde65c70d6c791dddf7614cf3e20c5b430b02c84a45361fc1b7e16edd476fbb5c

  • SSDEEP

    12288:fvaoCaey4G1UQlVFDQqIvsV1X1tolMeihq7fSk3kdcbCa:fvaoeG1UQa8Lp030cbp

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe
    "C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Dzsevzezr.exe
      "C:\Program Files (x86)\Dzsevzezr.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies Internet Explorer Automatic Crash Recovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2484
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""c:\d75385841ba84180116304a6502b2cfb.exe_And xMe.bat""
      2⤵
      • Deletes itself
      PID:2620

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Dzsevzezr.exe

          Filesize

          12.5MB

          MD5

          f61b3a3bd7b0093cb2eba757865023ad

          SHA1

          4f80d5251450abc25061d76ef2d425ce24d85eca

          SHA256

          40836955524a644e53046f4ff66d889e8eeebb7d37791cfd38cd1a5c9cf75f7e

          SHA512

          aa773323b5ec0e522a5e7906caaea6cb169727c84c38fc79a235bc7e688a15b18dd82b646145b8cedda11d01354350107c738ee488ce64b54d848126b093d9d5

        • C:\Program Files (x86)\Dzsevzezr.exe

          Filesize

          11.7MB

          MD5

          fed911c89a95c358dc246ba29029521d

          SHA1

          2e5b4c4e9a5bbc1ec1752b6db01026dd58f89707

          SHA256

          7acca753976a2df8a4c00b5d4acdc01c6918f66b5d42799f037b48a0b9cc6808

          SHA512

          9f1fa641ab23c2677c4663384180149cf051934f6688fac98fae7804652d1cc37fc44ad463961b4cb7c1d1eae6d7ee18d595f0b104ac5f38515c145651bad4bd

        • C:\Program Files (x86)\Dzsevzezr.exe

          Filesize

          13.6MB

          MD5

          c400e9f580d97fccdba3921448f158cb

          SHA1

          1ff0118f7ff91437ae64e388f33e3bbb4add9a4b

          SHA256

          f9c2b041bf08a9e3e4263d80f8ebf369c4cb9db0f2075caa711e0e503258d3f1

          SHA512

          8f5731ce1f01811e7394659d45ecd5afb427b70a5854d87b7d380b459428e869bae84e4688b245cc7ada1a58a6b6f9488cb80932cd6fa078075b14294b85fe25

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3f263e12468bea18b27cae74657824c0

          SHA1

          c2e4323916b816044d963dfb3d3e604373f212e7

          SHA256

          312effbd632887f58ec66d9d045505ec6d3c6748397ff1e795359401f90abded

          SHA512

          539fe31e47a301327a435a37cbd7ecb66a49a1ffa948f670b4cb09b0782cee6fb1f6be4e79fda442692db48ab6c57768b3ebd2a541e50b97a37434421ec00cf0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          546688bf2116f7fb0e90b8c0d7ed8165

          SHA1

          651e2eed28c5c9022859da6b71bc4b2ae6c3df6c

          SHA256

          d2397a88e0a7946028fdc44915b8b6c347ec9d2eb363242ef627e36f00fe92ed

          SHA512

          90d01e406d73f072a9af8944629562b17298b9ad623c207579e18dfb9926ac53994ab11115f8a750c6bf285760228f87ca5ad93304fa46df3a9210863988e3e3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          956fad729d16a5d7ecf480a6b38feeeb

          SHA1

          418df7a1bc9e88a047fd843d443919baaad36727

          SHA256

          c14c7214212ad654ce0a018b532b246562d5583416bcb11417d001a36f19de25

          SHA512

          6f6508614dfbb119331baf929395698a909df3bcf5d0f0eec2e9a6d9b7fa24960cfe95414f6c2c5817042ee22ce9052bbb6b0f50711d2a436ee459d62ed65d2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0e252788221ea4782451f37cba9cc6b3

          SHA1

          d0e962e5fc9e4be8a8c98d61541c01b006347c50

          SHA256

          46754bd02595409beb205d39f239389ff7686e3c4cc5277d26997ac3c3f94acd

          SHA512

          0d968f158829490206328fd67d201dbd581d957aa6d729ff0cea9602e55ba7fee355dc8aba9ffe3c6a6d17c8045b879ee8c2f109c9c48c1664b1d73cdc20bac8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0c9234f749f0b2c34deea029938787e4

          SHA1

          2cd1176f95cc5cf2c8ddc813967cfb86484b9511

          SHA256

          4bfe3fc39362cc478fb35c2e2fc03f08227d911cf4653ba8b5c0920c0fac017f

          SHA512

          a63eddc2f35642b93ea4d8ad57d460eab620cb415ef75ede016cbad91c52f4c71e31110c86a0867b423e97349ae890ee98496d7519f8d29531a9ea304ce709b5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          dda3046fbae91f3a83b7b0952f7aa29b

          SHA1

          e0f9cbba9a81df45c161fce6bb0cb37c5ebbc53f

          SHA256

          3e802a13c207772b4ca8f9d5723262b47de9dc84f1d85c1a90700eb33e63acbb

          SHA512

          3571aa3636313f8451626063e7e0044db25dc91a6f7ee60fdd31c7ef2adb45627c6f4f6e53b54bebc284785ac6e380f301b7fe1146c35ebced0b93e48bd053f6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          012c59ca39ddea711dab9a33e92cb46c

          SHA1

          e2344102a87ff2dbce435561c6c565b3c2f5f232

          SHA256

          72e81af2dc09a6829f3fc9f582496a207153a938c189f1e178de8dc58c63e21b

          SHA512

          7b5597985f3630dd93fe8968bfafb30136f23acab3b9d9151c0e4bacc2a071643f2ca9dbe1f08e7fbc3ca951e97da2f13d9f439118ecd535210e1695087a699f

        • C:\Users\Admin\AppData\Local\Temp\Cab3008.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

          Filesize

          72KB

          MD5

          f79ee77a4f30401507e6f54a61598f58

          SHA1

          7f3ef4945f621ed2880ff5a10a126957b2011a17

          SHA256

          cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8

          SHA512

          26ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739

        • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

          Filesize

          112KB

          MD5

          6d4b2e73f6f8ecff02f19f7e8ef9a8c7

          SHA1

          09c32ca167136a17fd69df8c525ea5ffeca6c534

          SHA256

          fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

          SHA512

          2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

        • C:\Users\Admin\AppData\Local\Temp\Tar3CFB.tmp

          Filesize

          89KB

          MD5

          df91efb08e7ef413f4e4591a785acef7

          SHA1

          aeb94c0f3714901c5a0a69a08ffb91c11a0c7ea9

          SHA256

          0df0bfe7f379777a709f12ef1409662c56b9682daa2cd70434e8483d170ab497

          SHA512

          a3b18e3c4e892cbe04221b2a772ecb1c5f9df6677ef2744340f1425da395211351e9464a1943172651e5fcb4e04e58c6cffc8485195ec2c6203fc00da6ed61ee

        • C:\d75385841ba84180116304a6502b2cfb.exe_And xMe.bat

          Filesize

          182B

          MD5

          81f6bbb182df4ddb1193a3c0885f0b24

          SHA1

          2725fe220a412a68dbe7220a6002c4394c69e709

          SHA256

          1c96d3b1acf54a5e3de429229c755f3888de85cf961e882513304cf5c6bc9355

          SHA512

          f6bdb629163d5e28e0e2ee4b3100fc9e3dfe82e8d56ce1e77526c5aa0a8f80d3cb4d8485a22e2c3aee7a8a7fb8d60f116fc096f2d2599d026d5f99af60c8f519

        • \Program Files (x86)\Dzsevzezr.exe

          Filesize

          8.6MB

          MD5

          5998c68bde146b90d36efb74864bebfb

          SHA1

          609cd832111262c634e0ad14751f44e8aaade130

          SHA256

          57feee1d7dbd7877689e67d85e123588e4111771eaca4d35f25a894867e7e2f6

          SHA512

          96afeb6d949a053b9c58ec10b9e63a6d1b87787183534cead0fd183c4fb7879181b8a6ed47dcf34aa02b29e9bcaa4c9bd5bda9edf746bb88b7850a78bb2e6de6

        • \Program Files (x86)\Dzsevzezr.exe

          Filesize

          13.3MB

          MD5

          fc4c5776ad523973f7b2f721cf5a1ee2

          SHA1

          739b8be56330b92f5061665ac2dde6d1296d90e4

          SHA256

          4cbca24f24e3fe58cb5460abe93788efee53d8db8d0ff3d7c2d3112aac5e6fbc

          SHA512

          acb9fee218eca8ab75a88645a8cc29c59e21251981f5f305f8778e7aaa07d3a828970fb2e655ef31db1dfe51adaf8c37aaeac603cb0e4d2dee90e4f902dcb88a

        • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

          Filesize

          409KB

          MD5

          c3d354bdf277263b13dca264ec2add9d

          SHA1

          b428dfd7df0f6024e22838823cc702e2293bd314

          SHA256

          ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f

          SHA512

          24c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e

        • memory/2080-25-0x0000000001E30000-0x0000000001E60000-memory.dmp

          Filesize

          192KB

        • memory/2080-45-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2080-44-0x0000000010000000-0x0000000010129000-memory.dmp

          Filesize

          1.2MB

        • memory/2080-36-0x00000000006C0000-0x00000000006DE000-memory.dmp

          Filesize

          120KB

        • memory/2080-17-0x0000000001E30000-0x0000000001E60000-memory.dmp

          Filesize

          192KB

        • memory/2080-3-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2080-6-0x0000000010000000-0x0000000010129000-memory.dmp

          Filesize

          1.2MB

        • memory/2872-53-0x0000000010000000-0x0000000010129000-memory.dmp

          Filesize

          1.2MB

        • memory/2872-29-0x0000000000840000-0x000000000085E000-memory.dmp

          Filesize

          120KB

        • memory/2872-27-0x0000000010000000-0x0000000010129000-memory.dmp

          Filesize

          1.2MB

        • memory/2872-26-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB