Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 23:32

General

  • Target

    756840147af0dd375b4ad801264f59adfefe08f9719867eb5e80f61011b4bb4e.exe

  • Size

    1.7MB

  • MD5

    39ac1d22a2161610bd34beaee43c69ce

  • SHA1

    8bd73aa8f39f39667bd5032ead01b823631f7cf1

  • SHA256

    756840147af0dd375b4ad801264f59adfefe08f9719867eb5e80f61011b4bb4e

  • SHA512

    13c32a955f4a5f538004443e300a0f70c64149a19dd61fa675c5b5cbc0be03d689132351f524fb962ed47ca8288b5c7ce422099493849c90f26359b2f908dbae

  • SSDEEP

    24576:XQl7fNiW+ZvMNpOoXMQjvMw7EbHTOIT+FTntNnJTiIHMlJWNA5h:X8j+EQGoTTOIT+7NJThsl4N+h

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\756840147af0dd375b4ad801264f59adfefe08f9719867eb5e80f61011b4bb4e.exe
    "C:\Users\Admin\AppData\Local\Temp\756840147af0dd375b4ad801264f59adfefe08f9719867eb5e80f61011b4bb4e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://se.360.cn
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://se.360.cn
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8946fcb111a58e43ff4ec9fbdd15b26c

    SHA1

    1320ed6e26bacb0b68101d3b6cc27e9d48a8286a

    SHA256

    13a7beb16c0e8286e1c7df2266dd90d249bf5e8973938a7130da957f7ec795b7

    SHA512

    24af2bdf7d84b94b768feb495e91c2e87d182e144b7c1828dd45019e2f05bb336c6f9e8a85b603f2256d2d8b581693b1a3254bfa27b2c0bfd72474073f0eda6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a6b41a71c166ac1be077c34796d78c5c

    SHA1

    795f4e6102f1a49c5a6dad237132da77f158fe33

    SHA256

    b4d83c1a3150c1abe4b78d37439423ac5d397108fbef6f84fe715d504bb774ee

    SHA512

    d8a3727bd689e4a836bf4c78c2e2aab3665a3dcf4d6fd26abb255cc73d83506c62a9685b72025943c6ad47427cb68fe42fa09627b220c1817526cdf90ded1d05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3a281e0f113cce44c2019324a585c4c0

    SHA1

    3369c8d846803abd01a66e3e96b7dbf9d4841c66

    SHA256

    6c463d6fd8085a546cc5c5c030e00c71042a8675cb1716b4ec33e942887705d1

    SHA512

    9eeb4fd7c6cd450327f096dbb2974fe77c9f360422597dec4892444505394ffc6e9c30a172431fd1f67b8a7a804942e7b6d6106caa2a3e8dd47e9f7e6f4cfb5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a80002cbc2e5352e4b12398a65ffe9fa

    SHA1

    686950c3851c821b44388676b5fa059cb9647b35

    SHA256

    b11ddeb046b5899e0feaf30f2eab65b0b637e2ab176628e2afd348bc731d0636

    SHA512

    bd06a146efd444fcf1e08ad1354562dd5d15ffb8cf54a2d6d12ae81fa421102e1b9522c0f543b46ae75c7303143543024a40728863005d454b1f6b7ef76016b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e0e4914af5fe8fba7c778232a42e6b44

    SHA1

    a8a0f85f22edebbf4190446bfda32e69e137aa0a

    SHA256

    f90301cd2c7ab34d19e9d3d3249c6d961c4d727ec49c2ae977f582d3f9cc142f

    SHA512

    19063f624e7e40bf59a69935df629b0073048f3533741028e334df991ebd93da7fe9b7a52cc07f622c7b0ea0ea3d3ee1880ab135b1b29819621a793b276ebef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    029ed2dd6d0ad0d9a8e758000e193273

    SHA1

    38bea5cc82d67c592ba29742ac66ff1a593b6610

    SHA256

    15a2fa2e3b28152f922148219450fbb4206b128b20df7170ef9020cea0612ca1

    SHA512

    f190d7ebea2c6170ac721cd274898b94e027aceaaf066917c3c2644a5393f66b656f993f2e375497c5f7b2f013c6d7bfddca469577bdce0be6ff5089f52ed2ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ccf9d5db89f534e75b9282d25bfa76c9

    SHA1

    05a4eee094c12f470df7757a4e7ea3cd0ac7f4d1

    SHA256

    7683e40829ded27ae4045b36ed9d78550375d5fd326aa6eea074d95976db40e9

    SHA512

    1f0174f70b4b839827b982b8a87cf4e79590e34a811e9aae3c2661e762ea43a2c32216b5da843e717ad529db468507d4842bd4481bb8f515fc3c8ab3f86cfc19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    63934d34a2df75e6fa695344d62c551c

    SHA1

    8bde54bac3bdfb7490f65ac179470e949d71b3c0

    SHA256

    31d80a688dff2a7f9da283eb759fbe158f87a16931f56d2e42c852c6ec975940

    SHA512

    dd64c94eff0ac0b301c5b88339fc88267dbbd191631b84fd892e436237c5010f7a0a3758b4a896fd56b77e627daf4ae65e91a66d1883077c1379afd0b61652b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d2da4b4bd2a15ffd894f54d176692732

    SHA1

    64f484098c88546b840ef07b6d3e6594b77c5350

    SHA256

    7548f038e96bca36b87b8c9117ceddcde4c05e4e4cb01db2a4ec71e2066f3847

    SHA512

    4f600ace7533897a2d2022808c0031be984c286becf563b90412cf1be822ccd89480d85f75369de1771e1e83dcc8c24b4a02d78e45925caa5bd6e89d4da41061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    91c784b3c92400099e5ae3643546ca39

    SHA1

    a08a1a95d88b7a041ff33c7b73dd5375b20e427e

    SHA256

    8b242d750d4d2f821aa43b0eae6e6de0441f3634e3df7511301faef7eddd5d8b

    SHA512

    0039f91cd3599044b5fad81c9ba07ce49c5679b1e197aad0cf3a468e5dcb5869746409081794da1f49c749ef31486c9c3384e8132f2d1202fd4c658073b84d5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b020a2cae52053f80b30419afa2d8c26

    SHA1

    c5a53e24e9bc43af5c7596a7b35a2eae5e882f45

    SHA256

    d9b354490e857898267dcba284e7ed04205a09af27cda73aacf724b81d7dd4aa

    SHA512

    5850e0fc3ed4ad1d37bba1895f4e95454ad48323c4a6634586b671edb2356ff1d900ada420cde6ce074d3100e2bf6526499162a752138e50c8a6f7543653dee9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4fdf054dc7649dce78338373ba9a2fe9

    SHA1

    20376c79eade2cd82d28c735bccca0df6cfc6d84

    SHA256

    5625932ab069a25e30d94907b5f0fcaa0686b19455c28f8b63968bde3ada4089

    SHA512

    d39d514f326b84f1b3744db38d17f6e23d09aebf933303f9c074d4e48ab89adab5afc7e63ac253f9b75673702becd36bc7f095e81b743a9409d623b9cf17bc76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7393d03f82392bd071be0ef2d6554081

    SHA1

    d55cbfce64d97a8836930aeac7f2fbba8d8e294f

    SHA256

    f79681eae44cb9f3a93677dfdcbccdfde9e1a2449e02f35e32b226b0403cc4d9

    SHA512

    5cc184c811a388e81b66b04e27d5ffb632a7bd381f367b6fcff5b016ec1477334f200275581b13cf4dfebd2f83d37e561721bdf2b1de7cc0163fea09853d10c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8962c5792318f06960e014afa3e77764

    SHA1

    bd5c44ba0033d0c7b063db4e30e890af851d2f4c

    SHA256

    5287047db1cc02a63e35d6cd27bcfdd6200d2db9586e5113a28a05740a685fba

    SHA512

    3d8216b4281ebe9d1d6f59facef0cc2a97e09406cc1d3fd8bcb714ec4da2fede5b37a6f8050f79e57a3a1f94d0c5a49b75a309e47e5dbcfbddf379deb44e49b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9cdb550507a3acc66aa39aeb0dc5e924

    SHA1

    d19a8e183c357abda446cbdcb9054bd698806352

    SHA256

    8e847932d8798a08c93312154958b178606a2fca477e5a9e4c0572ed683608ab

    SHA512

    422192112fd658b1832a302236abb713b65bca099d1f06cb3b90d333d5d0d13c2db6249dc3bde6b0fce20fb2d3e144ea8cfb4cfcb4d90f0f3742bf500819963a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    54cd52ea23b8c55623c06e0b9bd985cf

    SHA1

    0a2bf5533049483c98423e64cebb7e4f9e49c9e3

    SHA256

    523e3fa8c64c4d51350809200a9ab2520ef800749e4de94b91afbf69ee054ecb

    SHA512

    006069a94d9e83205d3598b5c9a4f6f9ad4aab10766c371b5141d18360712a83b6f94d0cb3796c665a71e72860f6d042a390ac07e6c5313e69e2f8f9f288ad33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    607e39ca1b7a43e12cc12c72d8624fd3

    SHA1

    6071a2f25d4535f5833db728680b3c9c92f358b6

    SHA256

    7f100ff38e3378f705eccbac4c35f4b70420bc33cb3bfb9c2318da8df1d4ab60

    SHA512

    70bde464d9d9de120301365aaedd51779ce90c90c10057f84f0f74b6019672368438478e807afc0397d40ab7f655335baa7704b9bfd1013a98007dc3e711c3c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c75e53ec5aa00c92b62bc727eaf5d64e

    SHA1

    52127cb40b9e59b3a17f90632c6314087619648d

    SHA256

    76334d6255971c4ff2f34b1a3b720a703e7a228549d2800547cdeec7d9b0e966

    SHA512

    874b324236a3d45af9d196a6a6cdd72e95e3867d5f61c3f707e1fa67120333edadf05766b52878985a5ac5b62abf91c560a673b7dd410c5f1cff255d3f84937c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7f3d0018c07fbd10dbfb6f362f772d8b

    SHA1

    3b05f257872770ba18694f931dd53a9dda48b6fa

    SHA256

    7e455e351d2380ca792a7b0e004a68d3879518ac597f6d0d5824d65cd5899c79

    SHA512

    0da7c43eaa0aa7b312dea6367fe5ed84d27c36b9b77357181c8f860439a7177bde8eac876a09501232cf6c07b39875fc1cdb71009f905edfd4e984075cc6f210

  • C:\Users\Admin\AppData\Local\Temp\CabA989.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabAA47.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAA6C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2896-2-0x0000000076890000-0x0000000076A54000-memory.dmp

    Filesize

    1.8MB

  • memory/2896-0-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB