Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 03:10

General

  • Target

    9a56d506889bc7c1904d4869a9e21e383a6f66eadc0dd71191cb74d3a2ed20b6.exe

  • Size

    89KB

  • MD5

    b4e634baeecde29b2599537d357f87a7

  • SHA1

    29ca3fd61d1563184e8c6353520ac2b0b82c81f5

  • SHA256

    9a56d506889bc7c1904d4869a9e21e383a6f66eadc0dd71191cb74d3a2ed20b6

  • SHA512

    c26d975be9a020a11248147526d1bc0733e62e4dee1cf146775cc463419161e9bad886c4a5fe56d4608f03540ce1655abd250d90f1fb2637cc1c597f6b61e64e

  • SSDEEP

    1536:lr9RFbR3XfYFHuI2Zod8+7gTSaSMi9xfQb+ng5aOmTcuOiFeR7Rkxr:fbR3XMuYd8jV5iQb+ngQZhYRV

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a56d506889bc7c1904d4869a9e21e383a6f66eadc0dd71191cb74d3a2ed20b6.exe
    "C:\Users\Admin\AppData\Local\Temp\9a56d506889bc7c1904d4869a9e21e383a6f66eadc0dd71191cb74d3a2ed20b6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\oculta.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\oculta.ps1"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://server.massgravs.pro/index.php
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39549f0a7bdb4385aceb8a4b551530c7

    SHA1

    f3e70d836311caae009525f328bbb2543bfb02e8

    SHA256

    6f99d9a67b51a8ab3e1ebca3aa760bdb7c629f668725feeb7b01ff8c7443e348

    SHA512

    621aa01880e68024405096fcd56ff01a22dd85026e3f62fed29ac28c99b00a9817a2d4bccd28424a4a6639ab13aae006feb473ff01589e59d4977a7fccd0151a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d2130c9fe34947f861818c87ed451c3

    SHA1

    d201d091e356cf2287ff3d6b7eb97ed45ef23a0e

    SHA256

    a2612a3ba30b4c565686451434658ab4d1b93b5ae680e195e7dbe0272304dfd4

    SHA512

    cc9660d7e42775479a57d0b65a9078cad0c93185e38aef28e4bae90d8b20083035d42653e6d512bdbc95213cd46ec099785a655604234e92e8b3c9042bb3c7b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d69a6bd48ba40f2bf414752900d9e4c

    SHA1

    f43ea1a8e9a5ea77f7de2085e21623352d181a84

    SHA256

    357ad5fca591cc043446636038fb90c2f6548f5bf7351713edfb538bbc9cc739

    SHA512

    e217855299a51b9e4622d35775b3dde716bed20648ea39e52eeecef0b7f82abe557618a1cd93e3e8abc24b8bf642eabfcfc9eb25a4a41c5220d9e3c1476c8e29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26a26f30206326a738b4dd4e042a68fd

    SHA1

    bcabe714b7a49b5eb0e860d08383567ef3a9fb77

    SHA256

    b0cd00a8c1a9ec45216dd1b93b4dc0645056e20682630932ed25c93ceed7e9b3

    SHA512

    306c1aac21b58ed3de55a56e923c2ca0392dd9c1a3b14772f96bc019c7d40edf0ed6ba155d9e0a3c35f805dce808f4357fc5620f1d8efd6d15f3683f78aabb9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af61187aedabc512b5e1620cc43a93ad

    SHA1

    156b33bdea2fbedd4edc19ed04b8707cbfae404a

    SHA256

    b5acce7b576c19ae84f13a288287f24217c3d035eaa49b4aa477c32859a8b7d7

    SHA512

    33d802a4d42c452a298e96768f1e4d47aafdbc9737e64f7d7515ae307dadcdaead84f16c7f8bf86dfb16e37b67073c198658411e666f5305bdcb70030f55477f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bfa504bda1d5d1be42eec3a6366ecc92

    SHA1

    f6818352d47c736b14f030c28ce48d5b76a53ac6

    SHA256

    b99fd28744f339335fe0b24c3048f8bdbcf65e710657a7442240a0b4bc141554

    SHA512

    3ce05efcb0221f044490d007837dff19adac88b76347d29252fed535c28945f876d4727953e5daa9d84ab6b35e8115ac8d8b8b56e7e7362b990fb5f4c9edada9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    513f5cf63aefba64e4861056094017f9

    SHA1

    0ea8c1a078c690765557da76307a1607bd0db152

    SHA256

    a4f24afaaa645ad911debb5bd22c2422bf2d56daa34360b2383bae2d7aa084e0

    SHA512

    9eb9960c26ac29c2dc11b8da823fa3214d0bc835fabf9f892702492623896857b4da22167b6294de77275a7017cc0a7b1659036e0dcc212a34f427c1e7a9cd5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1739d62a897a8c407814f266075e64f3

    SHA1

    6f9e70249ef66e009571135de8abbb8e19c1565c

    SHA256

    663a26c7122bb8c78a681903b81746a1e83e820f9e5236f7f23731d5bc8d84f1

    SHA512

    17df3c65b1ce8036918c70632920c0d8051b0e4f8612204b4bca7a30be0025b3db049809a721012539f83bb2b5feaca5e0b0994cd37ce7ed8dd22b05efb90f6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b7cbbf7cb5e5f6df27437a716ae8604

    SHA1

    49671d20c1a68d40d5eba50317d0ca106a2a4c7f

    SHA256

    5bf0e3752a254bf956cd967c434a74ef5b725227d7c6ffe22bb2fa7d430d3966

    SHA512

    ef363db46f25aa16c74554bf1b9b2cb5cdd49bbdda66e9849a3b43ae612917183bef22ae17c25319d26e0224cfddee0c9b157f802b80898fea3de1c6511d224e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5cf2ef910a34abd6f4617778d5bbc7b4

    SHA1

    d456146650acbe37d1ae4a25120ac02d2343ff5b

    SHA256

    63527a38de8f11e0eca1c8e72a92e1635e76244becbea57ca487e1c75214e370

    SHA512

    c58bed4e4a5d5e3079fe08adf8095aaa4946e5640b84379b57302fae1612dc550d2bf1dcd26b6fa2cedb4af84d468ce8927a5e2281a0553aa2dfebe1cd451eed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a8f4e4ecaaf97f7367af5bf76b10a1b

    SHA1

    50fad7b8bdf6f1cef59682a9521ad432aeffc8d9

    SHA256

    73883994b41a6f2c84423fa47078f2d615f45d757f9a7dfbe24038b3bf501467

    SHA512

    f820f7bd423f622fb188538e03f3d7721e537aa3497a4d3f92e2dfcd50936c4cc530563043f2ec842b9ed58289a6193689026640f900d3b0f37e866bf09aef0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c48001ccef76e96b94653b986f5c190

    SHA1

    207cfc043c156a3db715629164fae4e4f4fc9d88

    SHA256

    2b05a3ddd5ab4517c2c4c0175c7385273c7330a5fa95c2b7e937d9a71ec9fc91

    SHA512

    56827f944619485e7d875bb9b19e307817575f7c4153337d8eda72a0ae97b3b901375ff3edbd819410da0033dca464eb879683bbbe5ba214ca4292730961dc53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d0b06744c21c41d4d4abc48dc70dde9

    SHA1

    0d2f341cbf3d65c2c99c154ab19762261a1aab07

    SHA256

    f1f640cd5ab0e2b7eed7eca683657a229d7408564b76f1da7d90e315f8c925d3

    SHA512

    4cffe7cf15be2055cb0e815dd55493345759d468077ced9e92179d5085ac732d1d40c7b60b698b2a558a173e08794412c680e1e7429b30a2b910d261f574e3ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a23570544176ac4e862adea9eb4d93b

    SHA1

    850673b3f29bc69aec869fd8a9adcda08f1830dd

    SHA256

    791db47e1e030c79027f8dd431698d60986f0682e77b84ea1d52e166673ea4a2

    SHA512

    2de93f061eb1c743f44f50c146d7b142e995f8c5b7a25e5153a92e255882cd50168558d7bb5e120878fc8b2dd7c7460089aa82602d8cc5e557d96885d9e41969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e423d9b20da009be3ca7bfbfb47ef2f

    SHA1

    7fe73fc0f59c671799f32313ffc095d3ed39857d

    SHA256

    e188d67c9a49619e171b99a15e0ea79aba3f1e25f940beec2385ef044aa73477

    SHA512

    0b94163d5be79dd2047b04af308cd19a99fdb039cb4d7c85d690a041b68ced0697d9e2c50498156bd67d43f5ff8b137faf0aa4ee8dd8d34b8762444f2ef32f80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e22f4b15cb91a6f644d8f73ca134846c

    SHA1

    c999032934ea07d0e261f79f53eff78b88d7f011

    SHA256

    3bc86c3bf0cac972c227d5e082775e82e3175d9080056b38a488a9b689fe3f0a

    SHA512

    472787d18e574a25cfd906d9c76c147111b61e2eb8c4ee33e6357efe521ca9fbb15c1067549211f47a04c616f6af339d51911e3640bf77d15806563aece15740

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a3adcf8508acd6578fe84a6ade01354

    SHA1

    afe9a4ff36045caabf22c2d47659aa75a26b5db3

    SHA256

    93b989d088161a8ca469e1c31bbcb8b7cc747d2756396a67f87e9c567b0a158a

    SHA512

    c5d016b747077978f7b3ad7fd41b87f1785c0dc58c1540c0ae0b9a7334723e6511c0bb8ad5874753c4c386528dbc14c092d660bdff6cda2a73cf44ef4013bcf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7cd1fb0ea33b93809a416b31064344d

    SHA1

    1b0dbfddb8d60c08d1826d347649f79fc44792a1

    SHA256

    f002ffaa910bf5332df672b6b63bb27c80672c39042a8c88c7f42928d4d9fc7e

    SHA512

    22c6d853e14b6eb55f9dd702670c4a7892513f5f60469d71e2fe259d452288741887590588e63b579334788bd58704287043a7a565afc6532600734a93df8293

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28b05a430335d5e00155829623d48714

    SHA1

    33a0a791fb5c2aa8bc5dd39ea088f94eea3c4f11

    SHA256

    dd573449c537e085b451178d56773a0c7d42bd089c99787c01da66af4b2b527f

    SHA512

    3146782373d84eb111db0bb465479166403d34e154e151d59669b628752dda59ef5c9d975d545af0e0d56484f6d2a099d880e7a55e1c1a227c964c04ff185ca8

  • C:\Users\Admin\AppData\Local\Temp\Cab4D49.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4D9A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\oculta.bat

    Filesize

    158B

    MD5

    54c2f3a00d5bc5ffd7f5338b8d7e265c

    SHA1

    5c4086ecf9a3508666b1bd4e27ba8f7a517813be

    SHA256

    a6aec3bbc95bc0a300857092e35a602c601397eefc8565f2bc42e7e77df1eddb

    SHA512

    05bf9854e0ba84f12e7ddbaf14886491d98a832ef3287b3affc08079b9d08c88d01c386737a3b3e1d9be3cd8850266bb9ea037269e027209410f1ea6c5cf685c

  • C:\Users\Admin\AppData\Local\Temp\oculta.ps1

    Filesize

    1KB

    MD5

    921c2fb8f2423f9fb469e274eed1d860

    SHA1

    48bf33a865d9415e514281ecb48ac8e8e43ad4bc

    SHA256

    ce0bd47287e5b4ebe9de5d050e27e36ba863af9a9b21c52a3e8bc5f135252220

    SHA512

    31d6a485ff59da843ce4048322d4357ec1eb832b7acb0bff4aa6a9005efdd26be97163cdc5e8da30684ce2b45b72b1b9d02bcec800c7726b26fb52f6dafb16db

  • memory/2236-9-0x0000000074B8E000-0x0000000074B8F000-memory.dmp

    Filesize

    4KB

  • memory/2236-0-0x0000000074B8E000-0x0000000074B8F000-memory.dmp

    Filesize

    4KB

  • memory/2236-1-0x0000000000B90000-0x0000000000BAA000-memory.dmp

    Filesize

    104KB

  • memory/2236-2-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB

  • memory/2236-10-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB