Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2024 05:25

General

  • Target

    f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe

  • Size

    988KB

  • MD5

    6e1b1929f6df01c4db6cc3c7232f1ba9

  • SHA1

    5fed3cc39a5b5e51f7e4f3f1cdc77b2b4462b63f

  • SHA256

    f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479

  • SHA512

    f8c6d8c5af5a6f4ebc19817c2356d959ac95933747c85844429a6e7c0599e3f554ac70d115dc9da0a14875822791ab87fa7d49e1491e24bf64d8b78851c065c5

  • SSDEEP

    12288:Wh3ZukLF5fRY5a/6GX4D1DwhHd1zre/9CL7zf0RhQ2K2cgicWPTMTH:WhMkxlRSaiPDi3qs3m/rIcWrQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe
    "C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe
      "C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe" C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2948
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f5d9b4476d57fde9b99e7e27d7341abc3c194c5af6ff19dfac9b6cf213ff3479.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2740
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2412
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:406545 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    1005KB

    MD5

    5dc414c1b21fe76b307b5b649d656f9c

    SHA1

    a7c0a7f848ebc075940df24e7d8579126b5a7d7e

    SHA256

    948908884a2376bc5e7de139ede447e1ce244173986c1a544edd414f5e8a54a2

    SHA512

    aacf2f12ac594da933242f900c8fcd36cdd289b172bced9a6748a0374aba5ff5eb8fae876158e7c8d0420c6e0366f56a6b368b73c3918e1ab439fb6c4facdec1

  • C:\Program Files (x86)\Adobe\acrotray.exe

    Filesize

    991KB

    MD5

    c4b7f31de07471c2e7cf41d3813c6dc3

    SHA1

    f9319cf506de93307581563ee03366aa30fe856a

    SHA256

    f0b5a325bcd521acb252cd7250c6a8a467f7f66abdca86b5b5e7f55b8ac05676

    SHA512

    cab46c9d502abdcb36c872d54f56c642b4d0a30da5f05f616b7bf9a2e5e344953e67d3c2d371cfcf322c6ba63a7afd9996fc34619c3e3823b447091a2333eb8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    467a5dd3ef5574ccad39b1532c2ce929

    SHA1

    8a48abb0471e98838e481ae0db5dc452f4e4298c

    SHA256

    ae096ffc0256a20fd25340c0a81d93016c33fdbb271304163c2c56bde0926ed0

    SHA512

    68c9016a9b83d7e68f37b650aee9117d40de4b59b2a0308cc4d5afefec0ca3ef7b02426aac8e505bbed689c21a5972126d1ed74fe284bf0627b29e292e6cfd4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da513823a0fca8660c938196d27fcc38

    SHA1

    da017e98b82169d565e14e7dffb8002d515e4d9e

    SHA256

    82bb67189a6bbdb97fcd51608d088a2cfd7a3073ae7d44d0eeb5eebaa22b1fea

    SHA512

    94019026705098389e2b1ec6e61283d96602307f630f5d7d8f31131d3bf2b03f7411baade0ab48914355f0b0ebac4e9d77c08a0caeb8b40156cac7fadfcb9561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0130a02b3db4827bccb4b000b00a4803

    SHA1

    e113228e6551aa2d814a8c83060cbcc50ae9f1c7

    SHA256

    a2bac3f10e3f5c7628c1a76c6af63554f93871063f99daca00906aaf78194e43

    SHA512

    416906a6d501429519c78c90bbec67cb39e748e6a2a7058654ffcbcd7b2a21cd02bd14d71c5b302344d23170e76875baaabfd85a944b8ad8eaa0ad53317fb3fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3fb47ae7615016dc2a01eee35a01515

    SHA1

    b8d1ea2320461494ebeb1a26ce7f09c710ceb611

    SHA256

    995678867075f45a39bdd2b298c9faacb0d7b6d665a83fbd99bdb654c53c1a92

    SHA512

    7e8ab3dab7db23513e5c4b1c4368ce4e307a1933b3af35b81ee722031d0af32f2f0ac640b305f3dbc8951b1aff3e9b652a5aeb7c925c303885a87ebd748768dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45a95c23bcc2dc3114952ef222fe2411

    SHA1

    0c0c5e3deb5c82c68aa3d74aa0a7553e124278c8

    SHA256

    60080faecffd98893f5cc0826817ea3a4d1d2dfb5ff19e0ab234cf284b1181e6

    SHA512

    fcf3e290ae40b5980a42a13c3d3703449e8e3d0327680217a50df942ba1a01f34b4d1ab72c4e313b28984332a53516ef87a1d7c0f7873f2ead5b794560b353bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    903beab7d5e43cf0d76585d01ecad6a0

    SHA1

    20dc7d142675ab5ba179a089b69b8327269b8f04

    SHA256

    9555363eb15c32fa0c853d8d5d1fa124f94f6e707c8e8f17afe1537159d9b075

    SHA512

    9c03c84b3aa3b2c2ebcdca67128899ceddc1b017ff494cee68cd013ad799dfa8f4e255d8bef42075704d72aa27d851befe239721cff241aa60ac61b96471070d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42bd574e64f62a5bc06dece7ba562bde

    SHA1

    ea7cf584ec4d1714a9c438aa0ecb1b9fc95825f0

    SHA256

    0968829926a9d98f47edc9a950deed050b4a020815a3ffc413970e18669a20fa

    SHA512

    22dea12f4b8052068c3f37f4b772443cd4e18eace6913de5f8159609e861d046f92c451c975864025cf8a08cc14b28009d826c4b796234fb7c64c29cb458d3e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c6181a5db75329e9df983510fd12606

    SHA1

    cf690d35f78d2ad648f05469f4eefb3e08e1a83e

    SHA256

    bbcb13dea81c5631c444b42558edeb2e01fd5fea96339151518f817c8423681a

    SHA512

    bf35146e0e7a0cfc2071d0f19904bef1a0fd502a55fad2be82cac3f4b58aa967f4d3dcf456c487adccaed0c543e7246d708f4a4b71ad170accc7f1b84d7da579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f967c030dc25c542fc72652761ab5844

    SHA1

    ce7b009c64ed8b8b4cec3817f76cec8cf3f52b4d

    SHA256

    e3133eba4cbd3a7143cb9efee1170fd2066a2299c06933f89640c2d42310d085

    SHA512

    6994ce3355974cb5b5bd62a2d09cf1a83052d2f41ca44d1b4d381b9fc7aeeb943bca99761f3dd477056d95905b220010d47633ec779450f966bcca23fa954008

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eae97db26265ca0f38d3ee55351a3c50

    SHA1

    9126d8916b2977f948c017774c1ec7fdfcf57333

    SHA256

    d37a71638e3f80d4caa8e00847d083eda9402ea21cf64aa507281a96534753d6

    SHA512

    137bdc689bbfadbd45e48dc614364fb8dff596935f1d9da8c74c4343b39917a1a08d2c2f1fcec993910571fe46bdc31572b9a8b8c3d9de5870835a26ff0ba4d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebe87365ca2ebb73c2c5126bb8efd325

    SHA1

    c596b58891228ba0161ffe5c60e8d4eaa5465e88

    SHA256

    42fb470052bfa6dbf9ea502a2484c9fcb5b15f040306c4a78c2cf972ffee8381

    SHA512

    8a443c3131702f5472f8e5bef76951d2858e32697b667e90884f22dde9cdd5537d14b82aa777ba8ed3662e258f86335589392e3445298bf71c683098ac3ff616

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5d10f90927a8ea01b7d2457842f977e

    SHA1

    500aaf7d4f31512a45cfbb40b38b5bb92f32d4c0

    SHA256

    64c1fdc936234bd5f61933bc51e07aaae2051354ad69fdb90da3ecb7083040f8

    SHA512

    838be694bacdd0dba2f0857d8922d0075e10ee93e799910c9afe4f65a3aa958a91a5fa3905995b3e0c63383ede8cdcdd6adedd16217488c177de44a037311906

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f01ec9d926475ea868b806ceb7d9f00

    SHA1

    5488d52a3c2282730e76952989f5c310cc2a0144

    SHA256

    3144107653cc7c8944d1c435dd1686fdeb8112e86d557e9d10e1d10952724d42

    SHA512

    44f0be7706ab30b346c6de12a6bb8d483fe54adaa6c3a5264432dbb97ec89ddb6190e8e04466a5cad78cdbd043f340f7cb1d0c399f6e16e337e9c2f46f1fa4bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c757b93ae28c05e4b894d912ab5eb5b

    SHA1

    40248a2fef4eb4e750e9ed5c51429c85b8561567

    SHA256

    080477baf726740c69c46914f25513918c2a7db0fc0a2cb86c466243d19f93ca

    SHA512

    6a288a2d0088fe66c67875557d4458638400a9ce4fdb8a220f3e0ff6ace3c04f07abca5f6e658864e8ef76617f6643e9068751f09705206a8efe114007be47d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    848b30a9ded0fd4adfb300aaa3d379f1

    SHA1

    b617f343d0434e15e439b74e0890271d3033b9b7

    SHA256

    1b21e00c60b976ba109e0fade49b6ac91fef83d8dfbb0a64346cd935c67d3b21

    SHA512

    f64e827e5966101f3ee960a29d73bc3a7a61d36671e8fb8fda6a20502cc0ea4f01084f04aa144e4ce6a5ba614b698e053330b1def9029d6aa3a3bba655dd8b95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a05fe82166633302305f90d161c3e69

    SHA1

    c081fbdda70fa6117a710dfd50ecb6be768f0a8c

    SHA256

    bba3ffd808bef773ddce451a34e0e30c22d13a78bafe62e58e09d02aa28fd530

    SHA512

    627f47796401c4709a06d1c7a2a83256283d054f99e6c9d89e40c2e556fa81b21525a08c989e4b881267ef97b9cca3130f9c3c3db672e150cb607744fd083e30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d2822100a8db41561152c13a3fbd81a

    SHA1

    fd0d58d2a05510ae41e5b095f34e111371d620c8

    SHA256

    c2709165a8da03ff36e3017eea8ff5ba75bff2c02b920d0f3b58d02189e912b8

    SHA512

    0a4ee24f0c907e491e5ccda1120bdd67b01a343858e521ea175a281c2b994febfb8d9a54daaa0ea3e4f7a2c132646c00ba880c79df6ab5d64cd9bba11d9b8ddc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45211e95f7961fc1b1feb1aa05e427f2

    SHA1

    613e2ee920cff26c44c84cdce3957f8226d2a3ea

    SHA256

    f69e1a8e958673a2571dfd0ffa27f74ad46e2005525989e9b816fc1ecc373113

    SHA512

    832141f1f2d504d97d3bbd668ce75e2245583266ad22d246fa86966cca0429121bfa30469dee0c031532960de4a5ac0d1c07bab146b3e2e17f404b221ada059a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aab5a241e552ff686303cb41c7b7c943

    SHA1

    3d0d5170c9c9e24ced77011bf688b2e41a6e6cd2

    SHA256

    303afe7d243413cd1a73a01a2c7a2fc323d2c3e67e7accd7bb98e70fc99f0c3f

    SHA512

    88266590c44ccfcace822d997f55058a3700a1a709962b8164a5f8f73f54394c83f68d38679a291b3e3cca6508f885df8e404560c2fbce45dafd5d6a623e22a9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\bWecAEcCG[1].js

    Filesize

    32KB

    MD5

    f48baec69cc4dc0852d118259eff2d56

    SHA1

    e64c6e4423421da5b35700154810cb67160bc32b

    SHA256

    463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

    SHA512

    06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

  • C:\Users\Admin\AppData\Local\Temp\Cab7D3E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab7DFB.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar7E1F.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2316-31-0x0000000002F20000-0x0000000002F22000-memory.dmp

    Filesize

    8KB

  • memory/2316-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB