Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 20:33

General

  • Target

    e323c11ae0aff211f26acc3add9ad68f.exe

  • Size

    799KB

  • MD5

    e323c11ae0aff211f26acc3add9ad68f

  • SHA1

    393178ec692bff839190177e239c3048fb189fbd

  • SHA256

    50ab4df7d9411160c2d865d393fe7ffefcb87d8989341cc4a6a538a3bef829e9

  • SHA512

    0e1ef07a525c5885ea0c0c4e16a0567680c86a5a740ef35e571c4dca2929b64565c1fe2ee25dcc85acb01a0dbce1e325b0fb3c709f7050a68860933a5356c241

  • SSDEEP

    12288:Wh3ZukLF5fRY5a/6GX4D1DwhHd1zre/9CL77EVMTe9jrsrXQuVz2c:WhMkxlRSaiPDi3qs3lTWYrX2c

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe
    "C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe
      "C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe" C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2156
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e323c11ae0aff211f26acc3add9ad68f.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2788
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275470 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    825KB

    MD5

    16f16efcc35a3a8525c47021e1b58239

    SHA1

    29544cadc7ff5629ab4c0cf66a43dbf537ad8c0f

    SHA256

    f57a12e7ed8824c0957a09c7f8a93f43d7c644d5d8a839897e75db63bdedcb30

    SHA512

    5f822071b267794c92f6fef89eccdfdd00390ed17bd6a3647def4f47f9ef66f88e1f2bdf06ebcae6c6f3d381f5b68993cb2694da16463d584be9c0098519d8bd

  • C:\Program Files (x86)\Adobe\acrotray.exe

    Filesize

    810KB

    MD5

    c59de2a02684237802b000c58bc4758c

    SHA1

    94eddce15707864ee0c84154084f062a375d5929

    SHA256

    21752726883bee78a499f2e8d2a714444671b45967f61e607f8943e2573a528a

    SHA512

    d30eb2b6cff4e63eeffce70c30d6e88aeaa6c9a9c36fba04484de6b1c2f09cfa33b4b80b42727aad73152692056865fd9a440edae2ce4c0235750283ba4a96d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d2892ecc605fc2e4ce95c453503ab13

    SHA1

    42526b68e09eb4887aa33552c961123b814835e1

    SHA256

    e6f9b0c38fbec0ab64ac161971f1b15327c1591c8cf55e181ad0fd1295db5cc0

    SHA512

    dfd83550b678e300c557cb798799dcbef246daf2b3ffcf0beb732bcf61d42df3dae3f60d00b2ccdc09bfc8448ac53b07caafb476dc1790938f62bd4cb4faa3c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae7269efc3e3cb7cd5846eb63fbaa371

    SHA1

    4415aa4d42958134d27ab2fd8f0360bf03282bf0

    SHA256

    d5b619b105c934508639376ca5ab534b525ad42c6e9102bd21b0ffa330814743

    SHA512

    4277a0241ee2c6bd6f3b39d09b06ceaf744f39eda475e2c45d09b837a0d6dda7f7a9e46ec82040c428d5267ee127bb611cc3b859b23ad4c100c5b3041a7cfbd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3131c20b7b9b54db29c7d96200ed2c94

    SHA1

    69b6fab83eb5212d4ce29a1cf035a58edb4a0d50

    SHA256

    f17cbdbba4649705961e13013544e3d4d384814df2c7c853cf50334361dfa6ce

    SHA512

    3f48b407af9ab183307ce87b4d5ba771c6629a188a64b40f46ac10d2e92a1292529c6c43b8c0363d12f20791886c60893d172d78c0fac941ba60e81e77fd0a21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3d74c70fc92aa20654d0dfa74d864c4

    SHA1

    e9ef51d3e43ec151c73f4307502cbe6fa0cb024a

    SHA256

    60c39f353b7cd35001ac083d30dfb4becb4ce065e45f57ad0bedcbe47c8f2dc8

    SHA512

    10d6dc3a9066cbdd8616513e15e1560980d072aa1d08e7ea8f292c662d8e8fca55dc4fcb7088bd2991aacdeef526d5b32d2f6a39a5764159497ae941a92a37f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c592604e824ff7f4a3a4668f1c52a7e

    SHA1

    714ef39eaac0d62547c27b53e9a8aaf3bf011770

    SHA256

    e8b5214d0655ceb2cdc7c2868e02fa0b2b013ef2c86147cbfab1a576817d8317

    SHA512

    724834ff574f8d39ec9c3bf0ff501d12df25bcbfb455b46a90201539e26e00979eff23b5923024a2f492a0f24c6d21044e6d2c83d27db23fc0b69b0ceac007cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7b5e3cec87463a2197274c7fa1f17e5

    SHA1

    3bdc6a25c7009ab161f613dfa9420443760b9f9c

    SHA256

    2e3efd0f9a44f0877348b3f0a08d3517f63649c1e692daf761d54645391c2bbd

    SHA512

    668b3f53062c9aa9fd1385c1b77b540a1b0a5859a84713a8b5d374c615ebb35e472bdb6e3e526fc70f5ed3e436aba7afba44408ae0bdb4445a35bd0860df3ecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b79cc4c4768a64860ff613cfa9a73d88

    SHA1

    962dbdd3503b9e262ae32b68a27eec56483f9e87

    SHA256

    86843f263513c14efb19c67bde939ef0cca706db5120d6325b393f7fcc48f8db

    SHA512

    cd62f360803734467505e86ebe003dd73b7f4c4af7f7915c25ca5ef9ce418be995812ca7df863e141cb0e31eaaabb9927c545a1e6588be731853612e331b6e37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e0a60b02ea89d2b4eecf62911d0b9e0

    SHA1

    034de36eccbd0a11132db384dbf824ae953369c5

    SHA256

    09937c636105884b821eceb0df2df25928cc5f9007aa855391e74610ad3106a6

    SHA512

    b0e4afb99f36dffd823b2d20dcfbef9c1af5be0c7a511728f04d9dc968ac22640188ad685adf7309a4464ecfbc536af18c25c288e193005c99a1b2d978e4155c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a17df564bb8da2e750c0f1a6e4c9f5e3

    SHA1

    c37f4624aa4814472439eb10f23d861211595986

    SHA256

    df16f955b3035966812eb7584a05f6edb53c91901ddb27a85c7a82a0f2207415

    SHA512

    6e30eea2df022ad15c54f0c3244dd4599d46d504a38464bc0f3c6de7509e2e5da0a1cf629eb0e09902ed4f474406a559493f07d07d3254ac1dcccccac97aeb3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee033a849401034162ec53fe88f487f6

    SHA1

    1a4698282d2ea920941489d2016a9a7bceffb6d5

    SHA256

    b3ed743943b379e5ccad5bc67a9374a8b9e0b86175a73739b7bd3e6c1543a0b1

    SHA512

    20e4ba89c40fb83d10e51ab9ae8fdab19f3c79bf2fa6c49d8e62dede991c71081407a1e627dda58834a844d6b5416636e487e85f0152a857704362f19b52c928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11aa2fd32a6156daa8f452bce4e0b7ed

    SHA1

    d0191cf285003302b8246804f26437ac440c4870

    SHA256

    e19cb84002ab3e3d16502b29ce41f8078746b9f538b1aaa62c8ed580577ffb4c

    SHA512

    900e25b0137b4433ff21f1a15c29ff8e568ef105067bc073f7ca4f336485f8c5c8beffb63f83ae959af2785f5a157d549e0be98174d5ca048edd1f6dc6d4c009

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f115f342644c2ca896301ab11d6ff069

    SHA1

    f4eab73c5503f071f6f9ecc33e63e474e2ede687

    SHA256

    606854118715c08f103efb1539d83c62423d410866dab7ca08ed87e501b70691

    SHA512

    17abbe603a2b1f2e4a55348161f055ceca3f014eecfc8a10fb6ff223f68b6a1b2a748fe972b91cf3a391a107fdba86252c27aab92a78fa04097b28f5e47555c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04d8732e161a35afc5531ad83205a727

    SHA1

    f9e7a0526b7d901e5d8dd76eaa5ade3d144ac67a

    SHA256

    5a33af1aba166d479931cf4ff0d8101c0e6588c0e2aeee777ae174b912c6e20d

    SHA512

    ac59c383124aed64b61350a317832b97f3004067c74fa7cb46b2c745fb437ad64903777cd8b81dc504a39a41cd5187ea35dce693b98b1a191f3bdeb5cd1d6494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf014af70cd852736b8dd5d4586131af

    SHA1

    be1bd27b4968714741ea01f322e3684cd5e9556f

    SHA256

    dc591fa6a9a1d1d9ceab06f5d3f843a721f17e16967e6f3b7658b73ceb673e3b

    SHA512

    f9fa4e2b3eefea1d9c4112b9ab034bc70e61d96836a2ddf053c497c0ff3432a706326f839952c8f43b5cbbfaf0a31053f212212add0c240a172336f4152ecd65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fdbf415ddb68a5993f0953060cf7e47

    SHA1

    21757841b7f3933bac42482472cac3442fd3cb8b

    SHA256

    79afb7dce2ad6c22186d01376a43a76f94278831af79561c53a4293454c21250

    SHA512

    67e3d001a0ba2314a800eba27176fe6f752462d94edd8c9a85c7486ff394e28293850fe13baaa13e733b1471b3cd16127459f0a25e367e57cd33ddd4723184f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed84741bac13d271d44da4872a4b7160

    SHA1

    1a0b73c50b3caa2f252ece1c4e6f79e173904b29

    SHA256

    213cdfa8472e677a87dc1dd1822294486420efb3bee3689f075b0e914ca8f571

    SHA512

    080a29531e1906133f92f19a600a1fa86e91c403a2c590a305cb0104529a0e6ed61fae8cd36010a6412896fa4d00d2f25addb8245a65be52483052942bc24da2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    850ce2a68081b15a304d10ccd107f3c6

    SHA1

    20d79af94807a247883a9ccaa24cabf0741e2a86

    SHA256

    1c8f897f637ad23e6743f2de22cd7e7eeefa1416400e36c260fed7dee44af037

    SHA512

    6634c5b6cd2f57bc0e19b3dd8b2da88b3ccd662efa192f41457dc6a42729886a54abd0849dfe670d30d97527e93a17a72772507ef1297dcef230dadae1ed1422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba1264a0813f58f8bfdbe7d2b8d6d2e9

    SHA1

    822374d2b9b20e34cc9d9c38a69e7b201c38cc3b

    SHA256

    5dc236add051a6c6b55aa487654e709ed08daa3afc639bdc3c0bcf21c959183e

    SHA512

    2778acda44cb9560641280933dfc96adc6a42585be188f977bb30c1cbdeeb32d0ecafbd70d7e377594bda4a46f533fa1295d06b70fe0484e45c2915fe19aabf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b19bfa6e24cc814285f7644798ad187

    SHA1

    5bd17d0b3e533ab9e1b26bacc06d3d62ef45d3e4

    SHA256

    238a2f495468f2de6cee10e53b0015e35c7fa2f8719be120a3adcb0aa3ca99a5

    SHA512

    9770bc58873043a26b35e6e2136f7dc1810035799973150c944009de0cf923b8ea1a8215a9cc3e420cd7267ea800a2dd6696f363fc23955652a1245386fc4e40

  • C:\Users\Admin\AppData\Local\Temp\Cab7418.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar753A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2208-28-0x0000000002320000-0x0000000002322000-memory.dmp

    Filesize

    8KB

  • memory/2208-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB