Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 17:48

General

  • Target

    通用多开器(互斥体多开).exe

  • Size

    852KB

  • MD5

    7e601af7168d9faa8946e803c3762e53

  • SHA1

    4843454669be401e3db178006de90c7a29ef4b35

  • SHA256

    ca04be9c25291f7868827bffc885029c861393d0b0b3d07977ec966b56894c68

  • SHA512

    d6e4b4a96e2a6cdff1ac2927fab6e7089e35142e9a44ab03e63010e9e506d7107d6fab5fa6757407ba4d701dfc0663898ad8a0941d01416ebea47b7dbf9f9dc1

  • SSDEEP

    12288:GGtJ3ORzqq9A2iVnrMn8fd7v7y2R5nWFpPoSvISwb:GGXORzB9xiVnru4d7v7ytbAb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\通用多开器(互斥体多开).exe
    "C:\Users\Admin\AppData\Local\Temp\通用多开器(互斥体多开).exe"
    1⤵
    • Modifies Internet Explorer start page
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7659838c4d8b81340c0ed419f0fef319

    SHA1

    ab8dac89b0bfa6d6ee40a331a86e68e9a0b85adf

    SHA256

    47036a5dc45ef8dbf44934b1f9db1f4fc1819595e4eb52d1105993621ba6f2d0

    SHA512

    5fb15d77a2ab0ba9d8b6f851271c0e4895db12d23f11902d31e5d7d944426e93eb4744f2ec0a6eff68daf789410e59a4327099a7aeaaa37dc18c80202cd26bb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79b9d7ed5c8e990c1404e229b073de13

    SHA1

    1edb55588f96809a95132b485bc7494414de8bca

    SHA256

    9553948b80361d20f6d6c56e1420d28402963660fd264ffb1bcfaef71e507407

    SHA512

    9919ce72be394b4e30989265f7809dc5960d0079bdebe8ddeb40b8fc4f9952434128fd85782567babdca39170529d3c46c73f8565aa0a89ac44ba94f525b09c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d66a9ae0afd7cdab096570fd31030cce

    SHA1

    83951ef6c5fd8be4524c1df831d0de841a37da62

    SHA256

    96baa022f319c1af981294368c143aa858f2f39a1f01965c64c47d77ca4ac8e7

    SHA512

    2366262d3102447a9cc64701d179c07b5ef44164682c782fc3771f5bb53c94294ad9934eb18a6de05777b2eba97b0296f0eb6b9220fb32fc0866fe18ad592c45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05f5b1f60e0031e84a3266a2013b5ddb

    SHA1

    3595486f877e18b0b27524aaecfc38ee4dd17236

    SHA256

    3b8b90eecd655b65526c57dc84ed38f2000db27507132cdce1dd4ad0e12b46e7

    SHA512

    84effab61b9519ed3ce08324fca4dd7a0045f4eb0eb62b9d4b14c0a13c9b95f2bbdd612af95bc3231b86a38041387a3ded260f15fe842cbbf12861f3576eabef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fb68b81156dfda8cfe31393ea113151

    SHA1

    7f8f0e590049081347dc22347fd17a719b350d97

    SHA256

    eb18bebafd9806ca470cca45bb8c9f0fc5d05f651cd61a5937102b7d12c804e0

    SHA512

    ad7034e08f8aead1ca8dbbbb03432350d047d0c6dac6800b88e05dd07f22108c5abc9c0dfa7d1b2717fbc0bc29ab95b9b055a346a8a8dd7316d5f90b0d56e10a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    537610e039a17e320a5e0d33a7160cc1

    SHA1

    765fca1691ac6b67fca5a750bc50866908d16c6c

    SHA256

    389bf44869ed58ec9bf9972288b939e0f036f919c1ce07c9991f11a2391a87a7

    SHA512

    cb232ff627c0068d2854cb3cdc685f2d86de0f227f127dd7648ef090b92f362ee85e3bfd9481230fd09a0eb749b32b6b6b7be86ea52be9c8d562d9884aae4d94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    442db596299c00ddb2e949e1fe005a93

    SHA1

    a31856d25a0fbdc9ac518375110212a0984dcf07

    SHA256

    38cc32bd5747157127bd2ea8d313e7c4665ac8719199b1a9507bdd6665ebbbd0

    SHA512

    b716fff0cc6ebc20e2eb507e16a332ca234eebfbb6b4e70c11ac1e24f2608fb5474e1adcac93511cfc21d5d8962266f17b8f14381bac2223ed216ce7468d22da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f3835c77d6cdbc03e5398cbe427502d

    SHA1

    28dff7fa5744de1ba5b8d09ff48020af82c6b2ff

    SHA256

    bced695cfdc30780c0ef86864a93e84e92a683ee41765508ce072ffd094a24a2

    SHA512

    e7c97ec0a028fa06f2b109d2812c1187e320cd6ac1bec5945d61f92257ff1b09ef10e14f790644f2e74b7a6b9ba4351e2b98baf3da3d380c90c600c1fbf1038c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    297f554eb959d5322e3d70f0012e62bb

    SHA1

    5594ada5fbe961dd9ed43d0566837d2052a9d28f

    SHA256

    07c15901438f0fa5d803dc7551be9481e33e9aa1c24734c321d9003933161e41

    SHA512

    d01b5fef82f27440755038267a8f765c7fd1aa46f51762d50fa990f3a7516f6e887aa2da05b153c58b853acb99f6f8aaf081b43e3e553f91e9641f3168fe220e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9135ea41c09057e37ca3580b4311101

    SHA1

    a8fd87c3188cf9bfec839fa78dbf5002fd958492

    SHA256

    3d85525954886fa1c6f120dbfeb15f455a4ada77af8185261e2358b8c9b80e23

    SHA512

    0dcfb6d942cae8d2afd6e1b06e872676f11d87490759f864579718ec960fee5262cb5078490aa0332b0cff83e8a55b0e1989aa31e7813a2ed4bab226ad57602a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15414c6800a7643a76c5c2d57c9f5c73

    SHA1

    008d2fe32e224a6d79e83db89250a81a363b4fc5

    SHA256

    c72a5b062e2a6824d46c93da0d2ac669b97e3dbd9997bf9273caccf911ecc83a

    SHA512

    54b6b83a3cdbad220d968c391390a477d92fc33ab66d5c3652f61e8c8f47ec7036861609b4c9349416b8ffd892651fd1b39b116dad74caa147f2d98d13e08f42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0413a588aa13c93d934f9677d9f079b9

    SHA1

    5b1200f116de32e2eee967b1ecab9e1c1f100a97

    SHA256

    2ac465646be824b74d1074369af762dc968cc30c4d9936a4a65a6fb5a910cefe

    SHA512

    391539317f6e2044d24bb121dab5551616a8d886e524678d4da67e9d9ee331ab95cdc34fbf11bd43b7ea8b41110d82ccea2577eece9abc9cf9438a090913c6b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a7b9f97d608fb9bfab23ab8178909fa

    SHA1

    5297dd6d5f484f5ea5528f6303dcada3c41c10a9

    SHA256

    f59d75404e6350057ac9a8b752947a2602150ba4c1cd8767e9cd7a1dbfd2eb66

    SHA512

    df597c3d0b76b56ad72d7b85a1c5c6cdc4589b81de85d0e1286a605dbbdeaace626c9a53a732740013367e8d38672f41f038035d5ec5804a5620efde866b02a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cd4c0fc7e399de30f077492262ca71c

    SHA1

    0bb2346333208f914f990a2752984e777cbcfe2a

    SHA256

    3a56ca6d72b8f11f1991a40dbe2b9455344122b1bd45dd315df92e9358b2e449

    SHA512

    5f16727dcc47dbed0bbab42ab5950c857cdbf85c83f6965091a03600be26d0e2cd8a53bd9f230489db32421a1d17c80ffb2196bb6acb2c3e4922a9902f90cec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9b88aec433e3829952ebce511f1d2df

    SHA1

    c84da18136b6d466dcb0358e091d54f42562bc09

    SHA256

    aa80ada1ad0f1fefe10047ff1f952a6730658e7282181332c9c483d43377080d

    SHA512

    922f9271ee94029bcf5a7c5d3e59166616e32a555faf63310e85adf2da29610ffb497b9e166afecaa13fb92a93bc100814b1374f7de4f8eb1bbfd5247a577a4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddab0b44d3941f347e5cd309e463d222

    SHA1

    1cfabad4fe97a05638c1dcc8d16de0a58c686cbc

    SHA256

    155545ebab9344b5bcd63988fac0ddc5e924ef698829ee21213f27b38bfb19d9

    SHA512

    cf1f889295ee34d8af21ecdf243e01e5af28289fa8c8d47f8c3814fc7ae047dab491c8c743920d9dff233a6ca1cd8a7f0fe2ad8242a8c2b90a6104fd601445ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb42f2ac07f88aa22609ce759c720d9d

    SHA1

    3a6ec8b9a30584ef71ef9233873f4308929f27f3

    SHA256

    49803ac07a6e1400af3260b054aa2c60adb272c7ff9ab88885ed02543066a813

    SHA512

    d5f77e4a458ac4201f090fffae72efe31ebef1da9698bed8e3f5a7f55f33fd95e54404e1b62d6d1687614a989ba81de9f51960a43846eddde72567aa7694e38b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3061bca70e58c399065c179a44016713

    SHA1

    dfd1b9a4afd2fec4a239c05c789c6af11c517d7a

    SHA256

    2d646219d4497025b6dffce57929130ac7b9b96dc79528ef2b35941391c2cf41

    SHA512

    82beae884d960a3400fcaa828cca059ed46309c7d6ddf605038ea00a35e196b562fdd455ebaa225cb71a8dfd9ba663f553dfaafd8833100f0482addeaeac6c1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42621dcdd20b5009f1daee7489b68a94

    SHA1

    e1f1ddb4a42867f076c6229668a8ce88610d7939

    SHA256

    50adc4649d628fa69d445bb6a94de6fa980a1c41c6df7ea7a5ddcf0637e58a1a

    SHA512

    75b3471dd5eae738de290dca876a297bcfd38c7b7ba178e8f9f07ef2a889cdce9d45fce20c6ea9def190a58294d7d1c26994f5f5f48f37bdd31268f1da8be47d

  • C:\Users\Admin\AppData\Local\Temp\Cab2A0F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2AF1.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2108-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-28-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-6-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-8-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-10-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-16-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-20-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-22-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-26-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-4-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-0-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-520-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-32-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-35-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-39-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-41-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-12-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-1-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2108-2-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB