Overview
overview
3Static
static
3avatar tool.zip
windows7-x64
1avatar tool.zip
windows10-2004-x64
1avatar too...ls.exe
windows7-x64
1avatar too...ls.exe
windows10-2004-x64
1avatar too...ls.exe
windows7-x64
1avatar too...ls.exe
windows10-2004-x64
1avatar too...on.dll
windows7-x64
1avatar too...on.dll
windows10-2004-x64
1avatar too...ls.exe
windows7-x64
1avatar too...ls.exe
windows10-2004-x64
1Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
avatar tool.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
avatar tool.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
avatar tool/Avatar PSN Tools.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
avatar tool/Avatar PSN Tools.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
avatar tool/Avatar PSN Tools.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
avatar tool/Avatar PSN Tools.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
avatar tool/Newtonsoft.Json.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
avatar tool/Newtonsoft.Json.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
avatar tool/ref/Avatar PSN Tools.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
avatar tool/ref/Avatar PSN Tools.exe
Resource
win10v2004-20240508-en
General
-
Target
avatar tool/Avatar PSN Tools.exe
-
Size
139KB
-
MD5
18183e2be4fa30cf4f818c7969e4ee57
-
SHA1
165306852c3c78177eab02b42bed228e8aa0e2d5
-
SHA256
3b1076a41323f422a14c4496c370678d3f083d9d731ad9aae6c4676a3f32cb6e
-
SHA512
c419c0f9c38d78b21d66b65237107cdb791132f060195e60c496e2b0bbb33d1697b4c79e8ae0c5166daaf8020e8ab4d1f995a92a9515bbe0d4e81d06f280cb67
-
SSDEEP
3072:cIzgaYv9HoBifPBPk0AH1a0yIdi3IQox:cEBqjXs6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A16AB0C1-2B84-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2944 iexplore.exe 2944 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Avatar PSN Tools.exeiexplore.exedescription pid process target process PID 2224 wrote to memory of 2944 2224 Avatar PSN Tools.exe iexplore.exe PID 2224 wrote to memory of 2944 2224 Avatar PSN Tools.exe iexplore.exe PID 2224 wrote to memory of 2944 2224 Avatar PSN Tools.exe iexplore.exe PID 2944 wrote to memory of 2532 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2532 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2532 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2532 2944 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\avatar tool\Avatar PSN Tools.exe"C:\Users\Admin\AppData\Local\Temp\avatar tool\Avatar PSN Tools.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=5.0.5&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b9e6c08b80e19acc383457718c9c15
SHA1370d87810a3f648010e8f289048f99f24cec2788
SHA256fb3f0271aeb19d7074c80cc714c61b2346d3532294f23ad5794b074057114ec3
SHA512030c2e9866890c081a0e7a77fd38bcfd464d6a956a0cbfddc5a6519ea8061e74fb65847fc7a7d04bb1b6cb3ccadc89981ca6f53c84cb0ba56ae7c2916cda75f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165d782e2c136337493af28bfa01d6f3
SHA12058f60b85b1a0e28df80f524ef7e73a4b849baa
SHA256e7bdfb2e416c02abf98d033f98e3c96dce015a1174bb8ec0ba273bbe2cb18e3c
SHA512999d035cd5f5c093fcc39ce4278343944c957779c7aa5ead139a3cf669ac79d8b289f8c8017cf5c748bf908779490581865a5137accae13a34c941f334f23ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ba6c0173107828785858519052b690
SHA158d70cf6487ee050f3ce342fe6d525e9c2ed7a06
SHA256b674f2f9ac41ca1fe0dbeffb624c4ae4d55dcb9be9660c8b98e8857c0bb205ed
SHA512555fe1eebf6e4e9d27cfc990f0adebf04ac55bce1ef1a833a45edaf3dedd341ec5cffe0909f8ebdc9b67ca71ffbfc61d10ab77ef9786333d9951682bef91f0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f93f3c8998b983ae1f55543de2616e
SHA1112d69f2c19ce35f02fc74d431924099ca652531
SHA25699d8e85babd64a22fab520666143b306c81f129eae15ec7efde2c36eedb9b170
SHA51274bf7fb30097dc3d04e1cde6f6bdf8bbdc449303a05af20adf926b4d6819ad77f10cfacfb4884f30703854725af2e075a4145fa6ee327e9c87d7969820994820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9e7b2800c4001e45488c839fb741ca
SHA173fdeab9fffd35090c92b97f02630aa4887cdf99
SHA25629b367040e6f3ee0a7384366a4376802cbe7c86ebcf294c2cfdb31e7efc1eea1
SHA512d2cd0328af004b2d56eda86dc5a81f7323fe9865a282d27d509cae4b9ccde1357b2422fe0ff7084e3fa3585be4d61a5d5c282aad13ae0eb04bcd6c1847e4afff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc1d998554f76ef468606f9bb480007
SHA1ec87ce4a1a28ae1ff5056d6f2b0e8918ddff2f97
SHA2562ce966a18fc8e09f119b21dfd1a3bdae3f120407262e83fe9c45f3fb89c6c20e
SHA51276229ee34e70d759e7aac1e2dc07ca275a8faef2bd1ca4831843d9297db46f77261f51bcb7a38c80051f73568e94f56a6485eabd39a68184c223b24232c55fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8c8c4763488355276af0a02caa3e3d
SHA19f48ad2c13baf9475902308ae846a43705e94c4c
SHA25655679610974823f0b2225df0b5c380aaa8b3dc5e1c7aa1c5afc4753ad004d480
SHA512992e03c196af72eefd7ab1a697d3d0a1a605ce0db789c6a193edbe95295c99dc9b9c00d6927b7736138f137a379eff34ae35edb9f22d6bf9daae1afb8a5c7b54
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b