Analysis

  • max time kernel
    117s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 21:41

General

  • Target

    4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe

  • Size

    2.6MB

  • MD5

    84f597a0b9962fea5259cb95536d0c76

  • SHA1

    86bc5b0a8a874c75f8b0cdd517bcb63557919bae

  • SHA256

    4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8

  • SHA512

    014c4c553848dc523332fd06c4009fd10c254f85ec654a991f8abb76ab1cce1d126243ad4b365b35afa24ceb486b1a12f084f0f906f72aed7a9a79113acae985

  • SSDEEP

    24576:9A8vyrepIND/0bfSPdaYQi5YYR+h+8fEvdDrGnrdEROGHOhXBo7FC/hRJHOh:9A81IJPDmEvdDqnroHO9HO

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe
    "C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe
      "C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2612

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d192f81a84a63316e152c5ecf4ab2986

    SHA1

    968159ae8e7a1bedf88dec029c170d6da8a7f9d4

    SHA256

    349a0102b7f84fe34fb8fa3dbe7797434a618c05347e9a861886cb57fe6f31d5

    SHA512

    783e742b766af3b94dc012b425518ac8186437bb79198ef562202477a5ebab6ed54e9dc2cc8b281a8703682e5d5821f16b421ccd755b6a840ae4396f41767b51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ddb1428bc4eb312df285bd0fde47056a

    SHA1

    227a779723d3dda2801be686ecaf17016c858bb6

    SHA256

    fa1c96556ed804d9dea3f9c7768307c5ab0ab7e797e2cae75ea46bf8c9174a03

    SHA512

    8a8288c4519165d75d578554270bf19626eae3450a33b6154b58a7039e510a1452f14907fae9e60ce9664446eab1afd0a2e3a3b60e310a8620b2292b579b2d5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    324c91041867ebd240276fdc31e3ac56

    SHA1

    bfa89be578b5d374ffe66e7a5916628d44615b87

    SHA256

    ca68d22fc6b924aeae457923d1f58e2787e90a8950b6150ad38b444b163052c2

    SHA512

    8646f398410ce58a93848ffed89c479304dbb45c2bb4957b1fb47435aa66d0696b963ad80192c4fb6e7f620143bb9f8525a8d384caa9080f5ec8ac43583b01fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    659fb127f0572dbc4cb71b53c08db5c6

    SHA1

    ec76a84ca22832df32c855e4f7ba18833363d20a

    SHA256

    3b06e01b01f518942d811508cfa03b05ea5576ddc51a6563c5ae51ccc7ccd614

    SHA512

    498d61446a841ef39ed133aeace811da38ec0615d482e4529988c2263f02919d3a0591a4d80229ba9420ac7e0c999d2d39669ce465e855e3a01ee74b0dbe1d13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d6b5374f6143d74b186fa92a9ed8c136

    SHA1

    3e8943aa1fe9e3d876eb9a460a91a0c3c85e1fd6

    SHA256

    06c058cefaa1ac4a979f56196f5f2af70b77aeca98145a9b65f458c36f758b31

    SHA512

    f865afda01caf072c5c0226a3fc5c0e715fe5ef0d1543a57aaa6fd8fcf0e3d25b72c20394d2640f706036b7510706089a7c8fdb932d6000310a4a3a78585307b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f16e5a220a918c463df20592d3152467

    SHA1

    860a0dc7fa420b6aa92aa9fc44340a11d859f90f

    SHA256

    7200f4fbad8a8399fb05f2bea840a9195c2ebd2ea94f9c3bae3ff3e7003fcb52

    SHA512

    07e3bb34e8f1725eadde32c3dd5c45e707a4c69513440049e03f8714ce98ef23abac08a83b8d40ce2402f145fa7a66601f2f167a5c2f2ba00847e8a782915c5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fbc6c0375ed3c180f0729ac0ac8f7a6f

    SHA1

    76dc388eb82e9a6e2b8bdd119116a45e6db59693

    SHA256

    1404c023377c5ad87e60105d14b5d7b258469467f29baf57fb0444e08e2c1fa0

    SHA512

    2271069c4a0e11516d824bdd905acff5ceac5e4605f406a59df8aaee1f4b3b7923c16e772ea084031c073a700325ff113a80946cf35cf9f71aa0ac9903b8ed79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    376e0c78c08186039db1f6f29eb072c5

    SHA1

    bb14e8307d3e2c9f03203036e7fe823785429829

    SHA256

    519766af7621662aa31cb5da2175aedcf8e1a79320d441c4d7f9e24c836ebcec

    SHA512

    f266519a0aae7b01400162dced513c609c4830344a4f31f766b86083513ec10962ad5ee9d86c40ec49ce2974895c988bd1e2c0e835ebea2c00b86d7fffacfd88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    937a791b6f30f8e1ead0c0ce112607e6

    SHA1

    312209a66706ebe64b396a8c85993848c2b6e527

    SHA256

    8734b3e346415591b26705eb05f7d1ae6bcf3486cf1b3c5f4b498729892197f6

    SHA512

    c6c2b45aed10add5434e9dd8fce1abb7ace80666599e5501b3ef6242a5ce8982cfff4c4db05b6589100b7a6e0186d566c6191edc1fd7ee5082f1fecdd8afb528

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    877373b45c23027d4573414c9181f4cd

    SHA1

    d30ca26c65fd33a7b8b4877109be10b7a572b616

    SHA256

    37e31c42691a56fbc321025a2ecd76757c72817077f7f80902be90f4806b6bbf

    SHA512

    860d206356c96ce8b3926c299b8c8bd14faeba74d5a4c66336ad240f5dea45cd87b67be49f61089f3648c4ea3de3f802a95b1c9de015232947ee94cc914dad1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    eebf7a089b35fc8b13b078a030c59819

    SHA1

    e169a9f75df5fb5469ff745ba295c2ae777c27bf

    SHA256

    6d4e53dbf6c5e1ca569edb3a0503fe0f2eb2cebf0bd1f24a61fa7ab5ff081545

    SHA512

    3377d41d776dbd6b41576c7b7541babd487624728c86c3e63d0c23ed72a7300ec723cedcc4b47dbdd7dd1e78df37b19943b877803e48e668e899a72980183be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e50dc07995779f66362c722840694663

    SHA1

    de7b65a0a4b9ff2478858b0cdddcc066f3bb1a87

    SHA256

    7e86861f21c18a97f4d624d32b6526403a3f46743f7cb61b7d164723270109b0

    SHA512

    e716cd6b980de41c4ca8d1d6121a5ffe604c264c6d98b8e2a792f1aa7a65f1bc182696d872ea7e3bcbd18e5d8318a1f760868db55dc27147b4ec9addaee8b54a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2d81a38d3f2b2de177b9536730400bf5

    SHA1

    5fbe920ca905b9ea01280b54488fab1c0f3d3bfb

    SHA256

    4f0431a6881c454f911413fa880cfa4ae20ebc1512e009211f4f7ad17d4e957d

    SHA512

    bfa59a493496114f9c8d2d6b205cddfe0f85c4b9a377cf1ffa64759a0388feaa0bcf07f2ec85015967c6239eb7885d9aa909b9c21286ad764a42c7633ede0e4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3e51b5588d788447092092fb807f8d50

    SHA1

    478214ebbceb4377cbfefa79cf173e106338112b

    SHA256

    f61b6a5dfb65fa05b2dc0d7842fa18e3feb6f4166ad32a5011b65c23dfda0739

    SHA512

    39efeac7913e214dd1d218ee8c082c3e029c88e94f3d134ebacad42c57912cb3b828983063c68230d814e8d8efab975d27d05a99ea2876c759bc59c444139ab8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2a747ab94009426d71a2cdb381946b6e

    SHA1

    26e2901e0b2fde9d56503399cc85a313df3ad708

    SHA256

    6b2bb0f7e38699a957076e8f0960abe6d4f95648df869176083f3f83759c5d6d

    SHA512

    08b4f5ee2f73f4585ca4589906dd74463b067541e9e83294cd0e98cba7ac13f65d749a6867f1a104901c3680b895ab3e12b4497349e887cc96d1c9ec7d172c6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f89071e86bbef5a1f870277227d489f0

    SHA1

    72ac99eb678efe69a1c520487afc2f3e9cb583a4

    SHA256

    cc3d742a43f419a093edd22edf5a538995978545a820c692398a441ee9c2bf50

    SHA512

    5ec2f72217d6541668e18ae9075263604d476ba897282ecdc499af2e80ddcbab7d45c1e012a523fb4080f0af035f65d1502f39335421fe2c86d871598c4c3b30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c2a0e277ce542a00d8c5d3b10f2971c9

    SHA1

    5a2ed3ead2890a9268330b049600155e2de59c34

    SHA256

    9fb761fb93e35a8fd99d9d650aa3dabdfa3ad2fe162f24965cb1afd08baf3754

    SHA512

    ff0d5f55eee9e66d88b2f1f4efcdd494dc42f14162c354f5a0f9a99a3048635633583b7cffd0971235aa9c22f8fe05012773e3ee44d22eab6422d6e17fae3f00

  • C:\Users\Admin\AppData\Local\Temp\Cab1C89.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1E06.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2136-8-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2136-5-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB

  • memory/2136-2-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2336-0-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2336-1-0x0000000000400000-0x000000000069F000-memory.dmp
    Filesize

    2.6MB