Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 03:40

General

  • Target

    e0ad5018961b11c645688faa5ca2cee1.exe

  • Size

    144KB

  • MD5

    e0ad5018961b11c645688faa5ca2cee1

  • SHA1

    32075dfaf77b27c402c8eac56a2315de4a6130f0

  • SHA256

    3649f3e01eee3c32e74acc778a6c45b45a302af06cb25cd39c3e253b77d0618f

  • SHA512

    e14e0d203a053a591c46c72c9343caf694435593f090d8eac11af537fcefc933523c74fca152df44d573a4e2d62020b2f24196452234c983a3dcb5de6188c43e

  • SSDEEP

    3072:3v/q91EBXqOaSUYvhQ914q8izJ3srI2+IlKt:CI6S9K91J8BM2n8t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0ad5018961b11c645688faa5ca2cee1.exe
    "C:\Users\Admin\AppData\Local\Temp\e0ad5018961b11c645688faa5ca2cee1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\e0ad5018961b11c645688faa5ca2cee1.exe
      C:\Users\Admin\AppData\Local\Temp\e0ad5018961b11c645688faa5ca2cee1.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Users\Admin\AppData\Roaming\Ufrirc.exe
        "C:\Users\Admin\AppData\Roaming\Ufrirc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Users\Admin\AppData\Roaming\Ufrirc.exe
          C:\Users\Admin\AppData\Roaming\Ufrirc.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1628
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1228
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fc303fd498c60acd34aa0d2a26bdebbd

          SHA1

          37f54488e99796300f9be7270ce0f64bc7c74628

          SHA256

          9a8e339155d636e230757c14e5ae418165d81178f4da827b498635ee648b902a

          SHA512

          2228f6c85eaebdf65b9458b7155d6d197890e8eae1f555dacf8daebe0101367b7e089c42926fc1eb65ccefb609b3719141c65a431519a9ec8256c7eb721fc3e3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          02add3ce7af500462c0570fff35f01ce

          SHA1

          a8bea8deec98b4aecea2938b08396b542fb1bbe9

          SHA256

          68ab7a93a09c8f40f373484c8808de347231d182c70ca7e6916f9facae58620f

          SHA512

          adf6313e6f1c80ff464fff726f00202342fac72cef366cd8daa1793fa6451b3127fa00e7ec453aeed9d91d140a1ca537dc8bcc7e50ff9cb28234ba3949edbc26

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          de9237da37bf132bfe8ba45e2bd9f427

          SHA1

          249794c125e9236c9c5ceca056a1e690aae22369

          SHA256

          ac6a88fd12ecc9d8771f69a41425cb5abcf2cd0f4d9f098c36f9d4ba4817182c

          SHA512

          216c78eaa83bc5456e5dbddf9a4f47e75bbd8ff2b79b471507827ff6f68e8924c37dcff8165a901ae81cbebf403a105be375c015182a51cc4bbca660630abdc3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          87c10892367ea33ee4ca4fcf51f1154e

          SHA1

          8b1486638fd98b038cddbafb4e2174e28a656423

          SHA256

          64e3102c999c7415a24967ed27ab2806866f6226236731d45a6e4ec4ef80a704

          SHA512

          da7f21653fbc8da5e92bf16cf6b174cf7bc460374a5f257adbcfd252f419a911942f1a39fac6896dfebe784ab3d3ef501d9ee0ec138501c50042cecf61a9f56d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2ac0b0dc096404ad293f43ec3a1681d6

          SHA1

          8bded1f8f40ae14bdf38b53c3aef03d570804791

          SHA256

          1dc32eeb001a681cfba4c0961c7bb62e719a1176b473c5d90cd50f31a1f2b21b

          SHA512

          4e97fe4b3fc864d3dd35c9e2024d2a04e1e740acfc721d6192402a1326d121c7437cf3ff5ac1b378bf167df215c7c765e18ca4d52114bed66a699d6bf64aab99

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5a421eda536ba4e43437e61f73c26ec1

          SHA1

          7e1f8fbb18c0266fbd499c83078ae95bcf6ba776

          SHA256

          807a91ddc155aba792f42f21e794cd18c69e7a6b8b2939c40cdaf14e449765b3

          SHA512

          27e21cb52e560810cbd3b328334c2f14aeb88877c9725fac86fc84d19904ba57e01d9a69ff72fdd76d5bd27f8e3ee80d6ebed4fd4e08ee20a901556c44e83d2b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          744a1c6fcd524d4ace6825f8d9c52536

          SHA1

          c1f728f45d7ac7f79f492b3f7cd5382c19de641a

          SHA256

          81a144074b27fffc92be37cb3ece513acef1d5a284e1bafef429c52776ca267e

          SHA512

          4918a7980e979b9847fabc0cf302cedbc112ddda2bf4b70e32496f97a9d105b9f544b03e27fd49ea94b928c0583942c19bf25b615f5fb09ef66aff7b748b5479

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          464fcd27d072867ee075e7ad2a1bddd0

          SHA1

          1cb2d7a9d98d130f171cde06693ecd19baa7cc24

          SHA256

          fcc9645b70920e1bb9d6fce1a87a6514e43a65b5623932e0bcb87d9fded2a2d4

          SHA512

          54bbe9dc561f92038f6b74e7059a4ee06e321ee0948ce339e92c6f6eb337284b35a5f4df7e8a60f088eb4c84c29beccc74a63b94b77d056fbcc1f520fb46b8bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          773433cd3bb46caacaf044a047d608a4

          SHA1

          1a491a11d96426470f4c4f151e42faa1b540f4c9

          SHA256

          35d6a877c104ec535da26ae6b340fb97f157aef775fcd66406f23dcbbf43ee45

          SHA512

          5ab25e8fd1843b0f105269c51b4cd720a1de43a3ad68055f400fb680eec16eaaf22761b7ab3fbe1f12370096f6b5f081f9ab09b46af6f603bda3a9772a82c9eb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          643179f3d547b6d47f923c768673d07b

          SHA1

          29dc28d7819c3c61f4a23f72f0ac9f8393850549

          SHA256

          429a0897f8bf6d57105505fa0c1febf96e9b440913be7e8f9baa10791e44898c

          SHA512

          7496d68368d163d0df30134e6e9ace8579e33c57c4f380482473aba6f3d11c8672c5a62aaf0ecda6f986fd012af156cf43095c163dbbb2413c3154054524ce06

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7241bfa0953c8a055a178f62082c5621

          SHA1

          3322eeedd4ad864a5dc0183b4e406b45a21814da

          SHA256

          277670f676dd9bb8cd1ded59e2c12e5ba874d2bf40b10873a994eaef1237101c

          SHA512

          c3c6f547d4ea03caf6c3cf823a9ab1966eff2c91eb37214039ea56897f0ede8bc7cce0482e533249f814c22f703f00928e5780ac2f0c4d45a5d4648ddb5595df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b4e0ae2fdbe942c21c78a21998eef5ef

          SHA1

          e3cc63b3c336111761a57122c8dc3065205a2f34

          SHA256

          2fb84f77dfb2cec555137446a68b388ac36f1f575f4439b3d43b0111613ba7fd

          SHA512

          fb673e913a2123e7cc7be36a8dc6e250bdaf9f7865c45d0e3ea6ca416adfb51bc2799bea013d3eee1ea46638866676b38c550cce46c0a7b653a8e9b853ca0bfd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          81a633df9d3ca617fb14e9f10d15201f

          SHA1

          974f359e8432d192d64b63c52718413ece5acca7

          SHA256

          ba372277e008380da4e137ab6cfe95274dce9aa4054f3ba23143df0706d70ba0

          SHA512

          1f1afe774e3690e682b255c907d6682861b9e235b4138f6e6da2d8daca98fda09f6f0ae68f844ab9a3a0ce79c3b0ac1241c5d9b23b3dea43fd0513995281ab25

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6c732e45f285482331cc313b6ea6c25a

          SHA1

          e9a54b980bd987962b7f17438a5f1fbd13681413

          SHA256

          5d2bed8672d254ce54fbd8b2cf6cc93e9eeef3275599d5220cfac8acc4cf7b32

          SHA512

          0e0978aaf00847e710810b7fbb7f913f12b38b461f94b767544cca1e9fad473c2a39ba92f787cd2593576404fbdcd4b2e313af1b9a9c75e22c57f59456807418

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          55b4b317f6ff4422b5225c7f9ca3897b

          SHA1

          8551015f1cc34776d8b12bde2a74564b1d0b4509

          SHA256

          69197b2288be80d03d1e6790605eaeb0d42f4480c1caa9be9f39028255d2b150

          SHA512

          056529d3d4f3f3f11fd64939af08baec5300f17b445cb64ac89ed19a15b91572a0d68ba0d6d21ea4375b42d707b2a13e1534c119c158dd7fefdb318d3e5f449a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          387752f2b33c515494ff3acc91ad6912

          SHA1

          009db3d6ef4b3c6332a5fe8733a1eee133408837

          SHA256

          decb978c749a0ff432f69f369b68cd0f95555e051dff5a12553b7237484a8405

          SHA512

          21fd4f03f911527883dbe04d6a380340ef7672e4c5107fc12d0c65ea7d43a4fc74c216be3d5034247b9ad30a9727abcd57396acab3cc70239af6aa0d5a1048e4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3c89494c84726629f9a98a123288e7ab

          SHA1

          314363507e7830fad46e7690b2ec3d01ae5dbcd9

          SHA256

          32ce843d5f9fa7ae49e9dbe497598bf59f961180c60b3d7613fef92160b76ee4

          SHA512

          1410b73fd4a96b75399b5fb367272241d1db4534cb70e93ed8cdac1b9e87dd08a39d1b53c24cfbb5e78d6b1e5ec44ae1cdd3db5703c5c040d76956c4ac1ebc0f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b215c7ddd33dc811991aa07ebc1b383f

          SHA1

          95438055da68c50e24bb0cbb7ddbe2c8f5f59a23

          SHA256

          16af3628aff8cb921bf3d8ef569d4026ff972a6ed934a2c33d77b2e8a021c123

          SHA512

          565728098858c55d5b93eb70c5c0fa3b4c516103cdfe04e40605e3b463af7daa3959b860b7aa2dfec935368ed22c55d790ecaea420d891698583efb07b82bdeb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b8c339c4b34493fd6bd188c30175bb1b

          SHA1

          9f193e06f607bc7756ee0c115ce0f77de2f85191

          SHA256

          8aaa3199bc4d00a961a789636c8ab531bc6fff89943d35ecaf307e45b76abf30

          SHA512

          8ef093847d16063f1ce4e634bebfc71f5dd13f23bb65ccc341cd9907f6c570513854d49125a9c8caa92b00b9be19f7f9e28d1c3c5948a2e4955d51bb337083f1

        • C:\Users\Admin\AppData\Local\Temp\Cab8602.tmp

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\Local\Temp\Tar8772.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Users\Admin\AppData\Roaming\Ufrirc.exe

          Filesize

          144KB

          MD5

          e0ad5018961b11c645688faa5ca2cee1

          SHA1

          32075dfaf77b27c402c8eac56a2315de4a6130f0

          SHA256

          3649f3e01eee3c32e74acc778a6c45b45a302af06cb25cd39c3e253b77d0618f

          SHA512

          e14e0d203a053a591c46c72c9343caf694435593f090d8eac11af537fcefc933523c74fca152df44d573a4e2d62020b2f24196452234c983a3dcb5de6188c43e

        • memory/1580-4-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1580-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1580-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1580-14-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2148-25-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2148-26-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB