Analysis

  • max time kernel
    152s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 11:32

General

  • Target

    655ca39beb2413803af099879401e6d634942a169d2f57eb30f96154a78b2ad5.exe

  • Size

    489KB

  • MD5

    8f7205aaf80ce4b5d0ee8f00369f301a

  • SHA1

    401d3336eb33cf82eecb5df5c2ac6d5f7f78aa26

  • SHA256

    655ca39beb2413803af099879401e6d634942a169d2f57eb30f96154a78b2ad5

  • SHA512

    1de8e8e3e4e8356067365571e90a812425ef18da2b7c210656f79683d41d3943e7fd052160978e370952afe8b14555a51871bd2c3923294c5057a8bb6d82b47d

  • SSDEEP

    12288:747jVWnPp3kS+U8u40Rqk84MjKZ5x88tb:+IpIU8ut3MKZ5xP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\655ca39beb2413803af099879401e6d634942a169d2f57eb30f96154a78b2ad5.exe
    "C:\Users\Admin\AppData\Local\Temp\655ca39beb2413803af099879401e6d634942a169d2f57eb30f96154a78b2ad5.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2096
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2440
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:406543 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc3aab66e3deed8b9dedffc730b2cc2d

    SHA1

    45a59136678b4139f03af6f75b03804246b2c6ef

    SHA256

    168d7f05ec2d7b64ff310b35096cd77beba6578e007a5ad76ef2caa6c1959b65

    SHA512

    f7239376303f88dd66d5dec2fda21c46689785a55dd1bfb773d34eb0e20c4fa84a4d9fa5f61fea6f39ae72c6a2358e77407d206e4075e30c7e9cd1687b5030d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4b0fd3c3eefff06b86cd3910d05260e

    SHA1

    d172a47216b913f873e175fbcae1cde99bf19358

    SHA256

    71ff773a595200fff49ebbc85db5b5d6c2db4b1a37bb2148b032c6598594774c

    SHA512

    5ce43ff12d02f3622438b7532fa285580f615cb7da294259d01de671da05c01b12eebc8135985d744b93ca17de6c80b08dbd767e97243ae65e02aa28a0404fc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff8ca41a0dd6aac79148d6aa16df7a1a

    SHA1

    17298c4eacc69039983803fccc621c9bb7e2b325

    SHA256

    fcd56308f2d6f9f9a75348dceee63a1749b6e6c95d2be23cb768fc609bfafddf

    SHA512

    dd8cbb7e32743851e6b6b7ca7fa50d6ac08d24fbc2f7fe5f46df17df429b0c3b95738cd7f59e445bb0ba10ad4c4f353a17821bfe0109f335314f92fe92ca4cef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83789fe1c1758cfe078ac87083e2931f

    SHA1

    9897c8e9cfdc7f2ca177efb42e825e0a00b51466

    SHA256

    97f544d5ec2d367c2306319c309b1e8e628ee013b66af637c1b51d3dbc2ba646

    SHA512

    3c0773e78d78670426edc0f48febea24501f8e5b09b19e6871e2ae954d63e6d9a3e2c335ad4a9b8c66600e7d2e9493c142582ae21c0c8d7a1ee8c8e36beb5bbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    edfd6748fabf0b2a3e1220723ad7d192

    SHA1

    44b42bd2c2c1164c7fae9d40dbc89ace8a4945a9

    SHA256

    ae4181fb8dddbd3fd05ad30313b22ec3be3976516549ac9d97a1703a9241adb6

    SHA512

    a171da2dc61740e330740a70423b6debea77b93d23d9aa73295f1e31482f0f8793453b5f3baa97fd1208bf32b508a2477bbedced7ccd7a8f7273e06c2e8e3981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    832b512bdd550e70e66dd58b5c172270

    SHA1

    f12249a0afbf59db28cf38a2eb677f7697dccf2a

    SHA256

    68950d4cd6c329ed1c75c6bb7142edac1536d1dd2b2ab66df14159b061f11989

    SHA512

    ed7f245f62e567eaee1af4d093c3f801497d72f4e8b11d2fe5cfe193b38f25f2ae5b2253996725ad2765e5e78542d55e7b2c6862ed4e9253254ebce520a8052f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05caf8c01b433c65ceeee877998f7f21

    SHA1

    94ad89631d0857c4b35ec857f147a8c7f4510153

    SHA256

    147b283cc548dcbc5c1f474091b9a83b7d84fd6f845ce2e525c3bdfc3d251d06

    SHA512

    70dee4b43c7df914258825c8bab065f7ad551cb0217d72f0b2603f5ba6dfba904a7c31994cc7e1644aa11e07618244fa88a9128d79979598385be32f18eb3f8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4920c152e66cd2fafc8c3c518e58ed8

    SHA1

    2a99c3f14aded9a57bcf29e95b4811c8c0c35970

    SHA256

    486e8395699b4988f9ed342f671a0a8cf863b7403ea87e13735b2d41aedf1b94

    SHA512

    a97cd4320a91c2f38ca15fc62422b5d4d55d3d5068bcde8274cf478484a2bfe2592738e9ec0bbb158018a27b8587c829ee171a96152fe8239a4d15192afaac49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5580816cef8be92cbf1fadf515b1dbb7

    SHA1

    9a1077db4957a2e611ab5877f7d2fc3af9536c66

    SHA256

    34d19b32a2dcadfbf4c720994d86801b3741a1ece1d52d6f70aa3142b7df0dd5

    SHA512

    f0e29b7fe971d1c9fc12305508c0dc47b63094c3c9976c36b3db9f9e61ad0632f4d3cfa8f933756c25720ac7fd5dec4fe15828c6c154f91a782a1ec9c664df15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca18cc2d41b6b45258b57f191361adbb

    SHA1

    0a9203851365979913d1978da18eb6b1341eb897

    SHA256

    9b992eda620210ee87a4defb5648a0d2d40e4f846156e501caf766e61f370e64

    SHA512

    091c3371ec6efd8741417834de0c32f2eab9ae7514ea1ad045ebd8a8799d6c57825fd0876fbf3f69ec7373da5b1c9fbd626dfd3447b7eece7ec0142e8aa6b66f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    115f01073dca05bc39de4773744ce0b1

    SHA1

    b1b3e32616eda253f609ea855745105a2a99be48

    SHA256

    e060d082b55f1f943a475b9b5a072aaa6e4839ec29fc1b7f220d08d156b7d610

    SHA512

    a7fb7fc9b5ede847d6201fb09d11aa3f3658a1d77f8dd157ffec27bf19844012116e4bf357b92d2ecca9446528e9743a7dd61276268f8b74120eec46d8609de9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    260e0a6c9555955aa1d02076fff70407

    SHA1

    ada6c77e9d5cfa3c7885429278fc7bf597d23b53

    SHA256

    bacf0224f057b6cbbc609288f02263916e5a8e9209fee83d3aa86f8193a72117

    SHA512

    c636cfb18a0819b9360ba2bec1b53951b5723581a4200df2166ecbf0168c62e77dcb51dadff7e91bcd51f9eb93b858ece4bf5047325bece79e281f0df3b0766b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ed0db087953749080a90e0950fd0d77

    SHA1

    dc9d97e52ed61898d86aef2b3d82953140214086

    SHA256

    d422be8fe54a99278a4fb7b156f9381848aeb88b776d526786dd0c0640461258

    SHA512

    309efe6c9964b05f7d83dca28d06d7bba21546bd3039e748fd6cf4f9c1e5cdf293a4c659a1f25bf4d23124e477c03cb60008c8ec6ef8665d48a73e6eaa4c88cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c83b903543f4a113397cc6b125b35f3b

    SHA1

    e5f27c6bd07f8cabdf033fef3fd67bdd722c8744

    SHA256

    9e95f54470c8c1ed6aeeb9b14166eacf355717bb9a5140bd5762c932d490ad0f

    SHA512

    261c0bc0dabb02e66b92bec1f4845c8bc152b7fcc2d2ec0f2a6b8b8e584ecf823b62a879e22ea209c797898720bead8941c0c70cd1415694506b4d63a4214936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    370e4a2524ed265ff60acd0563903caa

    SHA1

    1feb9109a9718fc75d8102376c35c0f58408a0a4

    SHA256

    c58d3d353fbd125abf2c614bfa935af2ff23d1ea406a181e64d6eb2b403dd98e

    SHA512

    1474687e18dc308a0d419fb3cb85e75a7ca0ff5b8b19b9a836f05371cf373e8173a5583eeba7aec3e913d4cfa3072e8cb8d392f9a4b16e5d9a4177f8f8c5f756

  • C:\Users\Admin\AppData\Local\Temp\Cab64A0.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6581.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2096-0-0x0000000000240000-0x0000000000242000-memory.dmp

    Filesize

    8KB