Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 09:41

General

  • Target

    e15cfa0ebee2434ea5754b8792e99fed.exe

  • Size

    457KB

  • MD5

    e15cfa0ebee2434ea5754b8792e99fed

  • SHA1

    5c266f0cc99ced529a6f45a75cf4028d3b129ef1

  • SHA256

    44a3de7a127eb36b40a74a0060878511552e2c1cf1895fa1c3c94e2b97700e2f

  • SHA512

    2274f30ea04d57a8c119ffa8cc6550bad318936b4ee3c079cd08f48d321b55460810115f77304705fdf38334a1f9f3e80197ade106b9b3fbe70bcb65ce774144

  • SSDEEP

    12288:8ruv4bsMW39A6Mir4Zhp9TOZ7OoKkBfTqXheBZdo3Q:v4v6A7ZhIV2XheHO

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e15cfa0ebee2434ea5754b8792e99fed.exe
    "C:\Users\Admin\AppData\Local\Temp\e15cfa0ebee2434ea5754b8792e99fed.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\fPQSIKlJJK.exe
      "C:\Users\Admin\AppData\Local\Temp\fPQSIKlJJK.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    893B

    MD5

    d4ae187b4574036c2d76b6df8a8c1a30

    SHA1

    b06f409fa14bab33cbaf4a37811b8740b624d9e5

    SHA256

    a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

    SHA512

    1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    00f44b41343e18a7a91241dc7a904b22

    SHA1

    f5198570bd08ab56fd02758d531001d80d626690

    SHA256

    d9458cdd05f223c4769abc092f395b4cf2c7dbc16f29931f13deed4abaacdf33

    SHA512

    b30c8999bf2f5a1627fa91426e976e1b74748edbab6adf68742ba65c116b33bd666c1c3164d779a61116be90dc32ecead915c3c0b73111bc8cc32bd42ecc47d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ecf2713702d680fa46b7b9e5b09d182c

    SHA1

    3cda532c8f617008c734b0e74ffa0af7da672e8f

    SHA256

    48dd842dfc317646944cb56b20c56c11be8ab0da8bde752fdc99609cb5f2f4af

    SHA512

    219c34d4fb74c7cd704957b581ffb4d7f1e82333d404468f5c95bcd2618aee22b8b45d332f9148da48edfddd45442ec27c7a4f7d63ba40dcf8689e5b6bfe04b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b0fdd3526664387144e4edca79ba3ae

    SHA1

    8ba94eb3326e45f5e61186110944515dd572a6ca

    SHA256

    01f7f4da871422a27b28cb93c050319a03b9ae644f930ba619226af6812de23d

    SHA512

    78d1d4468e039b995d626081b8d6ba141290be9fc05298a1dbd0d8e32477f9dae9518c38f3c23636549383f56e3d6ead7f7049efd72cbc529da9de765ef891cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    252B

    MD5

    c1c423b9f0f351eeabaa554c46235a55

    SHA1

    79a657659e80517018ed45d74c3931ab0711ee23

    SHA256

    e4e8cadf69e08d0a0b864ed009bc722f08ab50bb591603612131333011ee8893

    SHA512

    56967723f3e23f7dc7921c61fe2c1975b808e00c3d7fd74e8aa4e752ee0615722959f0bf31423ee241790a2222454360b0c14e2afb29b8baeae025cc0f97f93c

  • C:\Users\Admin\AppData\Local\Temp\Cab5DAA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5DFB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar6033.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\fPQSIKlJJK.exe

    Filesize

    64KB

    MD5

    006e6463ab2eceb0a8882d33ba1d60cd

    SHA1

    86ce4c373a14b6fad6ede5d0b38c8915781944db

    SHA256

    c1281348aca6a8405d3d8d5216d7c0e2e6476b0bd65f1d8eccb0abbecfe47abc

    SHA512

    64de28d255f8f1f3bd97afa94087931c30d4fc91fa3d75003b91617f2041fd039ad0b92a4ae6281b8b1baeb8e174eddca497ba5dd8f607fa71413895ea2e4399

  • C:\Users\Admin\AppData\Local\Temp\fPQSIKlJJK.exe

    Filesize

    128KB

    MD5

    57b15ab8a06858ea14afb9007fcbb3c8

    SHA1

    7a3641a154b7f57ee4a0bf83f7b40dbf4dded875

    SHA256

    a8fe4049819d61e3e4f19c2efcf3e002e7e33fb9b1f93b6800a55773e1cc0102

    SHA512

    096c2a0b38f0e50b3def25e13d23c2c411e3d92b90a2c2a7a8ccbb84c3f1bbe4ae8cf42ad7c55b73039267138e68ed5f9f00efcf84a870296fe96899f0c03c24

  • \Users\Admin\AppData\Local\Temp\JSJEFAOQke.dll

    Filesize

    409KB

    MD5

    df277c7402149235d44dc9c7c8bb0275

    SHA1

    6dc8bd3deac80bee4af156c55fdffd125a684de6

    SHA256

    f230263b33195c7c9809ed01146eb930b84be41f2048be05da43945a0b5c829f

    SHA512

    b49c7b67f39f0f905c4cdf061faae22d77347b827ff999d2784621d95faae3c8bac206a7c44145653f137da9de771ddc83b5660abaa01300c7690e0dc3ab85b5

  • \Users\Admin\AppData\Local\Temp\fPQSIKlJJK.exe

    Filesize

    457KB

    MD5

    e15cfa0ebee2434ea5754b8792e99fed

    SHA1

    5c266f0cc99ced529a6f45a75cf4028d3b129ef1

    SHA256

    44a3de7a127eb36b40a74a0060878511552e2c1cf1895fa1c3c94e2b97700e2f

    SHA512

    2274f30ea04d57a8c119ffa8cc6550bad318936b4ee3c079cd08f48d321b55460810115f77304705fdf38334a1f9f3e80197ade106b9b3fbe70bcb65ce774144

  • \Users\Admin\AppData\Local\Temp\fPQSIKlJJK.exe

    Filesize

    192KB

    MD5

    9b4189fed2ab163c53a56d4342fc89c0

    SHA1

    4448056c0221e341166f756844364a7a56349b62

    SHA256

    a11b6506321d225d070915cd3f6035130e85292299778d052c1db506f048d833

    SHA512

    a93ad8163a2a197bb5c6c7b547d519afcc7e96a7a2f62a3142e310ffcd2d1c1b5925a4e3bcf426b3464a551ba1993bba43cb04e155be504edbb6a1d854c25fcd

  • memory/2144-0-0x00000000005D0000-0x0000000000640000-memory.dmp

    Filesize

    448KB

  • memory/2144-1-0x0000000000400000-0x0000000000558000-memory.dmp

    Filesize

    1.3MB

  • memory/2144-112-0x0000000000400000-0x0000000000558000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-15-0x0000000000630000-0x0000000000694000-memory.dmp

    Filesize

    400KB

  • memory/2928-16-0x0000000010000000-0x0000000010142000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-12-0x0000000000400000-0x0000000000558000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-165-0x0000000077A50000-0x0000000077A51000-memory.dmp

    Filesize

    4KB

  • memory/2928-172-0x0000000077290000-0x00000000773A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2928-173-0x0000000077290000-0x00000000773A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2928-174-0x00000000024D0000-0x00000000025D0000-memory.dmp

    Filesize

    1024KB

  • memory/2928-175-0x0000000000400000-0x0000000000558000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-176-0x0000000010000000-0x0000000010142000-memory.dmp

    Filesize

    1.3MB

  • memory/2928-177-0x00000000024D0000-0x00000000025D0000-memory.dmp

    Filesize

    1024KB

  • memory/2928-180-0x0000000077290000-0x00000000773A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2928-181-0x0000000077290000-0x00000000773A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2928-182-0x00000000024D0000-0x00000000025D0000-memory.dmp

    Filesize

    1024KB

  • memory/2928-185-0x00000000024D0000-0x00000000025D0000-memory.dmp

    Filesize

    1024KB

  • memory/2928-193-0x0000000010000000-0x0000000010142000-memory.dmp

    Filesize

    1.3MB