Analysis

  • max time kernel
    147s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11-04-2024 14:08

General

  • Target

    x360ce.exe

  • Size

    14.7MB

  • MD5

    be80f3348b240bcee1aa96d33fe0e768

  • SHA1

    40ea5de9a7a15f6e0d891cd1ba4bca8519bb85ed

  • SHA256

    74faf334cb0bdd3e9dfab8c323d4eb3b9b089bcaadc7dbd639d9aa93a4f6f829

  • SHA512

    dfb3b191152981f21180e93597c7b1891da6f10b811db2c8db9f45bbecc9feb54bc032bdd648c7ad1134e9b09e5e2b9705d5e21294e1ae328a4390350745536a

  • SSDEEP

    196608:n+/7/fO/vBSVnf+viDyJBwhsCArf+viDyJBQhsCAaIF/f+viDyJBaF9hsCA6EJ0k:nX/vu0Bwhs8vu0BQhsvFOvu0BaF9hsR

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x360ce.exe
    "C:\Users\Admin\AppData\Local\Temp\x360ce.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.microsoft.com/en-us/download/details.aspx?id=46148
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    252B

    MD5

    1124a3bd72c754eb3337acb50f563393

    SHA1

    1e111e59973bd5f0e0e06130b2671ab62a7a77b1

    SHA256

    0226a3781ab6ae6df4e9f7127ce6d5904baa4c87d26f9dcdfec3bdbb315267ff

    SHA512

    8a92060a902650e7535a432033fcaeb9a3741b9aca283aa529b36db3b37a6bab6bc67d00dee1e957d9161089fc64be0f1eb6110a7558e55ece3ad49ceffca3ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    098416f186d31e24bfec597ecc5377af

    SHA1

    2fa0b86d368dd9a83885db65d65e918b45ee45b6

    SHA256

    dce5c50b06d2ab2dad699f0516400b2399a3e828f8d49209e879c9c25b00fdd4

    SHA512

    764226d4a5ffca6327df7cf9c06ae727dc91ad052eea6d74a0f6d30bfa7d00f0dad982c73492521bdcaf7c432a92997c9e63f7907a1a892cd58cad43ef6181d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1aba81d3ab568d4036a4a5d41f6aa8a5

    SHA1

    85cab90350f98a7f87ea60a8fa4074dfa7f4cd07

    SHA256

    6e0e8dfebb16ab825d9d371f5ad665ab8a5fb4c7d46ecabb3cc747a51b5f3038

    SHA512

    10db12eeea553df8bfb6b1506aa01b96db013cac59e41c9ca6b391f20df1e45623d6d9405ca03bbea0a287f6371c564d4387babe0d1f8fe160a7f4759933953e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7ef4e9b078eda141053e30feb03d27cd

    SHA1

    2c184c55f6c530cea1a071cc7a624163b9e38a07

    SHA256

    7da820335d6d9c34203adea56b995b672c2a081562d3d9d963c5f09637cf4e61

    SHA512

    fa96834c0ec4cf81152dde33e9c6f737fdd48920921a2d8b974a72b8d2386e314f5b13ed0e52c11cf20af077af2082b1f1d5fd8ec06bb77e671ec4dd56d8a364

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    265b742771312314f0c62063e2e85764

    SHA1

    bae567ff252d5ba1175801b540316e939836a545

    SHA256

    032ffc138426f7772ef2299a044c5ef31a236635c85eb246d5ce0791d41a2794

    SHA512

    bc7b5069d3e84372d1ca9747e6ff0aa41b40e4ac8e85f49df2cf4d5532f52ff7229491c180d508a2a158c0ad2243a78f0475ba1e6d9b36afff5faeaf947dfd55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    eb40427f836eb7b7953d48761ba4a315

    SHA1

    072b7df94ffee81cf033c2b3452d10b999ee2c29

    SHA256

    9363298c688430914bf1ccaa4fd5e62cf3ab4de39c8b936c85ea1e404bf525ad

    SHA512

    b9f9104b7478fece6d4159d6d7b5eb42c6a192486ed49e709bdfd02bca00a77ed8aa38a7758c684a3a46607f784a4e56cc555a8b2daf2eac42817f5ec4ab59dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aad239ef3e5312438915f9c8c801acd6

    SHA1

    fe53010d01bd1019a9284864fb34fc0c8eeede4d

    SHA256

    6f62e3d45975c7eb05dee2d8089bfaf3677b315bd760a671b610eb9d1c85dc84

    SHA512

    d8a964a2883480ae53dbf3696bff320221c9bdf0e7d9f2077c4cc9afb02c9a4ab7fa93c372e8a07ebcabd0bfe259b0b104f4d3d62cb1347a5997b58e47817a06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a694ad3b97f9290851e836ae3511a9ba

    SHA1

    0d15fe1877339f83420ea34e1ac4a52b90d564fc

    SHA256

    84177d165fbd40e8b050c346eb42ca2d9ba714019693aa9d9b1aaf4733765794

    SHA512

    5c69cfc93264c1b2e3efb3ba6fab940e26d8807b66e43e5c2abc967290ddf70269dcd78cff66fb47cd62719d1b2e6b8ba4f2df7af45ce94a2515f2ea156c9bfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    512e129ada6390e42b75dd676e52cfbd

    SHA1

    c314a03187bb1275ca036ce814b8e6c7e84344b0

    SHA256

    2c63b63a469c7e3d29a97905fb258bc3146944743ffa3ad58f6ed799b4b6f7c1

    SHA512

    f1ff0df6d3f4cf12c7810d4fc57a47aa0674406a87d3e5f727427efcb86fff05036c59a5d223743c45a62923e6eaa370da1624832f8b3a4d0269c52fd06faf5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8901cc24390ccad566ec3a01ad009d92

    SHA1

    ca129c2e33c052ec521385ee23f55a47d2015b79

    SHA256

    7f51c99fcadb5cf0277e24d2871955770b54eb5ec29e43a54edfe1b3a38dfadd

    SHA512

    da8a589a35d8b0de88a579b9b6e52f8c6f267c079e18de1e53f7627124f1f14eee983152ec2a148ceaf1a11f8f9d73575d27228e8bb0a723ef2e9f45951ce114

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8dfc9e115055f52b661b0d798999b448

    SHA1

    851aa8b97ba39c3805fcec66bfa0876c4e994c9d

    SHA256

    78652ea530bd3cba47f83dc5a212d9d4d20f5ba3defe385736c70d71cac215e4

    SHA512

    64437eda9fe2392da20608715bff243f34f8b07531776983fcb44fb80f732bb9d8b4d08c6a99b911f75d3078515bddf7901fa89279fd255d0997417b4bc7d9f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    044b4851ea26fae42aaaf77604a28a2f

    SHA1

    9b3e055071f9a338e3271b61b1933a0d11ea0f3f

    SHA256

    7e1abdb684e3b7744671440103d36da0801354429e8c1484323feb8a06c46a93

    SHA512

    8c2855c48bff3b6537faa29fe16b13e2c86abb7588be7d148ada9ee03e3b9b2000d452cfb095b5a489fcbb1df00640f38e9c34ee2dcbfc3f2090fdb1f4a048c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    057ac961bd1093aae31a822944dac73f

    SHA1

    008a34d38382bbdd2caca9129a59cd67ffb60692

    SHA256

    7bff57a055c05ba8bbe61f845c788b791a935c5ed675ca66874e3863560f2820

    SHA512

    15d14d240a3553f0c47b43c4012c1c5aeb0612f372e3154335cfbaf2dd9affb0b0e9391b556633a6d703f8c023a22b19a6616d8857b4872865b903a10f66bcaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cfca4b20d4e2098e6a3a2435d591f7f2

    SHA1

    db9f48b8da1a13a7135d17c7854250d5b8c27831

    SHA256

    f675e48b2f2eb616a26fc539f3597970173acdcfee23ed09935ddb84d8b5e60a

    SHA512

    1a2fd96dc036d4e094301327b44952696e35ddec414c457038d1ce66fa2e222759300ad2c5d623ac7684d832cd583a066c46d5e7b5ded94ce95218bd1100b610

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    be72aa31910df8bfbdb01c31ddca6be0

    SHA1

    150d0cfac17df20ac40fff0f5b882821a853ba7b

    SHA256

    fd52f001847c7284227410d6c8890c9b5b7b5c7b7ac9a04db7c96c83a487943c

    SHA512

    5ebe31f058ffcbb10c4eb04ce165f9bf248f9ad424263d4eb473e06d55de634297171546df91009c4c8bc2a592f32de41769a4bb0f9a2794bcb339cdd5bbd38a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d41751d9233cf8af737cd293ca704845

    SHA1

    8952fea3760c839eb94534d442f571771218d2ac

    SHA256

    5642c50cfd078789ed669154f206adbd6b040120c691937e3d5abc6684a9a55a

    SHA512

    01622fb6207782aab9804fcb2ef644638b14d2973dfc1f4a64a073f658692a39df8a4bbf2fcbddcd38d19eace31bc3dd15782a9d775b351949ece6cc02bbfeae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b86203de19cd7835ef4815f11e643dba

    SHA1

    526db17c08e378251e47054c6c77ba0d2f8ed600

    SHA256

    94ebf85a3b22c1b460debc688e643d6e7bf02cbab9685014b09fcf647ea2d59a

    SHA512

    c03a637aef0c1408c5ac9cbced4ae8c2403225abeed50333a4f65746b30ac3ae1d8665d7adeb79b4bd9a172077c2ef67620afd582072980437a5f34e8b8a193e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8121d34bc19fb74de0af2451293f90f4

    SHA1

    c40ed2c70ae311ee08f9185bb0c041bb00944caf

    SHA256

    0b53642ee46bfc74fcca1627fa4ee3fec1429db54296f1f186bd350385dccd68

    SHA512

    22ecbff2a5ebd02ea9b809c61c736d0ed367ab9fb944ceb25e6bcfbe30c29c7b0de31516ea1afda118d0633864846e2899f072b72b3234e2f2cf2dfc170effe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6820b64cfd1cba8da06a3afa5f373224

    SHA1

    be58babe4f33ba0c0b458a89cf4f8d1c4552ece5

    SHA256

    575c136c600f8cc5f29a8af20a51327f479d690ba6e5e6209cdcb8115601b952

    SHA512

    f13a3f8b33be5642c45b95b0df9d734d049df990419c67f8eaecdac49512b335aac6a1a00d7028f9d60af7dc8acecb574a258fbe4a7f849845857790722c00c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a87c33da55d2e19c9f3acbf38f91a317

    SHA1

    b624599177e298b57960eee510a92bb6a8f91180

    SHA256

    00cb4883b978e3d9851abf80d4e5791881fef41a00e33216f88516e0830c19ce

    SHA512

    94b644d4c43d8290ef9a90d4e7705727280ab9fea4d088f52a17ece59e0e1ff5a5a6ada0806b5844de99f1b07c7d0c518c5ac7c70ba42a9ff9625d8d304dc218

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    a9d7149f5e610bb5bf5cca111b45c2fe

    SHA1

    c14c1f20e865b24f435182a2537aabba52508fec

    SHA256

    20ba8e8d8bb54220d1e3244979fb28f766be71fb8fb54733890af0374c1defc8

    SHA512

    273acf06a1fda0b96832d905d616b7c4944b02acb2f488b7c1beea9dc7aef52350fad503d653f0ca8e5683e73a6955457c667b50f6c44ce3dfada8a392913f38

  • C:\Users\Admin\AppData\Local\Temp\Tar4B29.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1364-2-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-624-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-597-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp
    Filesize

    9.9MB

  • memory/1364-1-0x00000000003B0000-0x0000000001272000-memory.dmp
    Filesize

    14.8MB

  • memory/1364-0-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp
    Filesize

    9.9MB

  • memory/1364-3-0x000000001BCD0000-0x000000001BE62000-memory.dmp
    Filesize

    1.6MB

  • memory/1364-6-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-7-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-1039-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-1040-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-1041-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB

  • memory/1364-1046-0x000000001BE80000-0x000000001BF00000-memory.dmp
    Filesize

    512KB