Analysis

  • max time kernel
    118s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 08:39

General

  • Target

    fc50da30cd4f03abcebe124ae9cdba89bc3a4bf92f35a22a6bcbe98fccd40f7e.exe

  • Size

    2.6MB

  • MD5

    1dffea6276602a3c155194b12ecdbcff

  • SHA1

    307015249d4afc191d01ee2a64fc216bf019db6d

  • SHA256

    fc50da30cd4f03abcebe124ae9cdba89bc3a4bf92f35a22a6bcbe98fccd40f7e

  • SHA512

    9f97812aef4d65a406f861102dbb32537635cd5c859281f6f1d3750ff0af9001a1c895aedb2483744c7c2510fca39e04ebb97327c663704b7fc76b5c5157eefd

  • SSDEEP

    24576:+A8vyrepIND/0bfSPdaYrRFo3UR+h+8fEvdDrGnrdEROGHOhBBoKpYC/hRJHOh:+A81IJPrqnEvdDqnroHOPHO

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc50da30cd4f03abcebe124ae9cdba89bc3a4bf92f35a22a6bcbe98fccd40f7e.exe
    "C:\Users\Admin\AppData\Local\Temp\fc50da30cd4f03abcebe124ae9cdba89bc3a4bf92f35a22a6bcbe98fccd40f7e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\fc50da30cd4f03abcebe124ae9cdba89bc3a4bf92f35a22a6bcbe98fccd40f7e.exe
      "C:\Users\Admin\AppData\Local\Temp\fc50da30cd4f03abcebe124ae9cdba89bc3a4bf92f35a22a6bcbe98fccd40f7e.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f61ceda059b8e3614f713cb75ed5b78b

    SHA1

    4b8c2d760647ec900ab74926987fe3c522ff09c8

    SHA256

    60c95680fae959c7866d7def1b009fd1a2d02a4e4e4fd96a274342854831e5d4

    SHA512

    de40f16c25f3c48026377bf8a9818a69be3f47d32fb581f152fe2d2cadafa39f467b4970dd14b6f3a05c10f94f0423ca799b92d8971974871a1f107b2b8c6bd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5765877abe7d882603d03a700410c23

    SHA1

    95f890f6a487c5eb70dd6c7a8a7d558bb5d1aa67

    SHA256

    bba49eb7d2c4c6bca0e6391ba3653d8fb2fbb2b0330a3b7d22e8dadfd01a1776

    SHA512

    e0532ba6d7f53a21d1763f2e4a54faa48c1a77a4466090e0c16f895bbd27d3d436e7fc63b17265d12e522213adea59962822c4540f0425d73d13dee5797c85b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b21723ec2d8768f51aad5e9d6c5aa6db

    SHA1

    2a7d077b84ba3c0d7ca4232ee0ef836e30b6cd0d

    SHA256

    7e086cab33415448ebef6ae6058f08e0458f1fc87c1dcc381a6e00c63196c11d

    SHA512

    5129e41ac4315e6682f943db50d446fce4da83cb1cda4a5ded68f6786329c8816f880343e0bd712975d2c76642fb471b539773e559ae186be469370f03343cc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63f8cba9377c86d30868e810b41ec3ce

    SHA1

    dcbd51da4703f2e78930b2ec6a4450701e31c522

    SHA256

    b5c52a451be28f1f4f636796da17844155f6245be9765713e745d0a6d1534bc2

    SHA512

    aa92697385bbd177a22357cce3de177d8da5f3e1f9e97811724a3f8a5c80cca0f5722b2f118bfaee4f296a8d001bb2111dbe83d3d8fe988cf862deef76f9eeb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bd7d61c073b108a9bd875b8e1b1309d

    SHA1

    81987c80d80fef131bb990f84e45fafca82a0e2c

    SHA256

    49339b1dfb92a8452539e3c1a4a2f4833ca30407f0fc554877e2e0ca07f87c59

    SHA512

    3e0db1ce53140eb2dea9be2b6ffff5035f5ebb9bc8e8ef6bfde1fb9fadb58fc1ea467f29418fc2e492a90d8c8896e1d6a216e7320c968e1edc986da713fb03c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bcf52c0f3b8d4efc988344d5db1c36a1

    SHA1

    fddd0b153e3d85d141c2e8cff02c848679554bb7

    SHA256

    adbc0237579f006c8b046420f2c10b7df4d7e9c9baccd8811310c6988b11e6a6

    SHA512

    6e65b5b0ff60b54982fcf57cc8fc2c90508c76fa6f39ed1a9b09829d344a97dc1a1e3a895c72583a6a1e36da45d6041752edce55605c6c2ba413f0efe3bbaa09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acdbd32daad2df71be2328dcce126e8b

    SHA1

    c168ca0212b025f0925d9d384c43d01d6fd97976

    SHA256

    038c8cb4fb18c2ba4a2feb0abe8b57e162bcb790e82323d1aa02d2418e532c1a

    SHA512

    0b1b771632ecc7d718da52d30bf5831745894472578d67287d669afc436b86db292296c6926eb3b7df2bdfb8dcbed50e201dbfdb320d6590a2f51d6661fd3e9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc85b980d929c0bc4d80c9bd6a6f0020

    SHA1

    bb56af63c4a981e0e2c91a024728efa033301394

    SHA256

    8f3b30a4123a8b6e293cdd203afd02e85d3ec7f62d2fcba1004507e5b49919d8

    SHA512

    fdddcc7cbbc6d84541ac35b622381e098f134736de7ccabe4124b537d4f3741d59383d2e9bd10afcc97b4d467218389649631892dd8cac2af71673a643043ecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e77c375920ebe4a615284aba6f52af15

    SHA1

    77327170b9102b48041de6ee399cc87d1e72cd70

    SHA256

    6c4fc772bc8b9c7e38e58cd53a221bc977b7b2682fe93bfb8c04e3f57d73e768

    SHA512

    044675bc3f6568255ae20765265ce1ca144438667541d4b48d547b4b9679507cdf0160acf8ef63da4a131762dd701188e99fadd8dec4736a18e5f8baf4d12ff2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea4d78dc67b8684017607bf609a62ac5

    SHA1

    9e722268591d5da5d53a71cedccee1fd38e94fa7

    SHA256

    72978fe7e77d110d6f625ec1d9f7fe6815a3be599f7719951c6f80793024c6fa

    SHA512

    ec1be76bf16f38fdfe2334f2576d8e51da427f92a48a7d3c73dd83cd5717551204d9281d2c22e2c15121145c5a1d9f9ba7a932b83b338251e43236a2d3f32782

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f1a1a571d941acae895f42660f4a8de

    SHA1

    bf2143410ddcbecbbd0b01955bdeeaaeef7b8c56

    SHA256

    d741795ec18b0ae73a4566dfe460c461eb76f570b2a3856cb7c9d6194d7d6e2d

    SHA512

    3f53f62aa874ae5ef12be7f570acfd11b9d9e3db4e15d025d5be107c7e821e9b9cfecd45e6d73707299b0a9c4690756f01f93fc721e5a1bd3821556c35b00283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    654f29511da2ac9aba418c363451ee0f

    SHA1

    ba2f4caa2b84c47985ee64e9af7ce4edad2ff8ae

    SHA256

    f94a4ae810bfdd80d72e4a5114599d5f9132ae4c679d59838466d27302e326b0

    SHA512

    6ff34991da9af84b49b4f05d2a2e43112591e39caae0f5d79f15409742fb50b82e1363440af9ec0eed7620bf47c16b6590faf140747d3e558ca67cb2f093f91d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97e5bbb8d07ab0a292bf1f19b1a5c086

    SHA1

    a901b5bf61b3797e6928447156e83c4e7cc95248

    SHA256

    3effe00fe9f7277f920b6bc05481886bea95924b56665886b307ea43c4cfa86f

    SHA512

    08f8e33400641aa1a4d039f4b41bcf184a9ab66c78d4782d357c1d1ae1f4af1cf407c7f515f080d9ff34900c9b674fa1d98e6f19061f7e4dcf1f976fded1a534

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24a837f4c33987b3840fb4dfbd46f478

    SHA1

    48ef48f6e37a9afa750b96e099181d607ed6536a

    SHA256

    71a90f3cc95e5ff385f43ed354893c3fc0e9dc34cb9288d4cec247266302f8bb

    SHA512

    a6164a987f67035a853ba1071fc93f7ae37e8d23f1323413ad17bdabc0a326738fd6aa08978fce794e5af75bb641845be959c0ad246d07078f479b1f9ec8e314

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15e4d3c0b70fd2f82d1ae2847c58bad1

    SHA1

    974faa4a702f624ff5f3bfe900b5208e7a7a9bd3

    SHA256

    8bafa8051e96f016e4c63c83b3ebaff6ad2d3b1b9ce1912b2916a0ca337ea22c

    SHA512

    0c9933095154e758954b39cb307bac0a5d684e57adc7b4a9d0a506231af807d27ea8a1b0ed5efa354fa3a47ce8e17896aa367e0246ca43f2f14b8c1465c86520

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f77675f0a5b381f573dec19c59fe247

    SHA1

    55cfe4f871872ffe396fa182955cb2aa654948c1

    SHA256

    16cf38b6fa5ef4536ca087b19e88b44baca45a35093b28ef11f670d7e4d3053e

    SHA512

    f293716e54fe8983bdf1a3a18a367b2b36aa586fa81e31021b8489ff4d26b2591763f87acb7c091474295f2e546c99177326d434e3fb700df16380db5f9d0a0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a775e78202e5876d01340674508fe3b7

    SHA1

    2025c473da5d8494d7465a5a617c52a08f3a39ff

    SHA256

    3e438fb7e55bb826bda726a5374bd7914c4de7e32c3ac7567d9d7ce35a019a2f

    SHA512

    d71759080084b88472d4e18b83ad8b624421e1f2f4480899552ea9bd9b91f4c9ebd4f9f0ae2f3933e528ba7ce6b33291b7cb0544f25fe9ebeba7d20bf13a970f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b87247f49991eb99aa6ac7c857d2f9c

    SHA1

    0b9a4e787fcc065853085f34b53b3827cced8618

    SHA256

    ad2fa8fa0ac2b851914fc39a46f12ca73d2a169e37ada8975194a8fe8e686678

    SHA512

    dd97446387868d84f35246c5bbbc58b95242e3d7b8c4934a77ee3dc554df44fced8908d092b5f8edd98f331e3cd66083b13008598e4e6c3618b1a2b555adb702

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c19d85f946abcadff87436062933ce88

    SHA1

    b834ce8f3713d85ae0dcf414ae1c4e177a302120

    SHA256

    730003e4aa0de714bdf4a20d68d6ab909d60aa52650a3c9ff338380608de874c

    SHA512

    46aa29cd57d0212f267d46f77cec08cb7ea75d9932d0f0c7c708b59fc30fa779a67d12d989b0883e9da0d081769a78a83930c860b3bc62a2448461e92b560781

  • C:\Users\Admin\AppData\Local\Temp\Cab6B8.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar738.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1628-8-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB

  • memory/1628-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1628-5-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB

  • memory/2068-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2068-2-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB