Analysis

  • max time kernel
    146s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    22-06-2024 02:20

General

  • Target

    0990e32b124536c31ef5d775c56e8963.exe

  • Size

    156KB

  • MD5

    0990e32b124536c31ef5d775c56e8963

  • SHA1

    62c4ccd65452c38a663b96e4a60f3cea471afbac

  • SHA256

    cb261a506b111d4007e82b3e71e4da57b889a1482bfa2093afecd95e9531827b

  • SHA512

    3553a2c0846e0f774736991b424d92a11e33d2594ffc04655a6c7e84ba590f5365f24ffd7173b74221616b41724b5ab4d59a9e77eea294be1da0cb05377d1583

  • SSDEEP

    3072:H0gEMwy3BDoBeIxlegNV4w+bAoO659Ex+kLMFoJMuh/1U1u3:H2LWB+e2j0DXEx+kwoJMufAu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe
    "C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe
      "C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe
        "C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Users\Admin\AppData\Roaming\Ftpupz.exe
          "C:\Users\Admin\AppData\Roaming\Ftpupz.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Users\Admin\AppData\Roaming\Ftpupz.exe
            "C:\Users\Admin\AppData\Roaming\Ftpupz.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Roaming\Ftpupz.exe
              "C:\Users\Admin\AppData\Roaming\Ftpupz.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2516
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2504
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2968
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70e9617c18c25a42d73fc35fd3a5bb56

    SHA1

    412ace2be9d223c6b379fd43862583da0d5e195c

    SHA256

    daef193e3f4675e4f12cc131fe6b225c1a2019a53c160bf2ec35da1158bbf8ba

    SHA512

    eb8a0e3a8df8133764cadcf272ecffe6762d0a8e40f56067e7dcf72a0f9df1b3ca85d7432f42de91b120475e868bf8e5155f6cbbf72720f04ed7c2cb51e102d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abad3371863da68ee8768ed32cf82198

    SHA1

    0a7f98b09435b8ed6ad8fe36f78ff941d94a0048

    SHA256

    bf78565f20f75dc0395883cd5259fa432ec78a3a692a35e7cb2f28af718ec454

    SHA512

    2266fd438a2b0665706cc879ab1cc0fb7131dff2035933bba5ea1dbc5bba58581a0398106f5cee1e076dc0aa42d299d4a1e42c45153f2f41cbaaf5f86798d505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7f224057f72761befc3eb51f52cc8af

    SHA1

    6a458271d3929d635f1f1b8397ebb3246bd0b7b3

    SHA256

    cc071d278d8500b6ad29698d1aaba49804c8f3af1d920bb7e8f2397d3aa1f0ce

    SHA512

    cac1ef3820904070f431e0c22cedac7f9c35afc3c79a2876787e7c5712f658760b9e85afb96136f1880b5519f403d7e35a99ef08c96f3a4f987b8d3e63855704

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86f3a84efc4feb05a9361979de1db742

    SHA1

    a7853a5817e6d7b1597c780b54518dc5ddb1c232

    SHA256

    f62704b182a1146cf21e5d9bc94931f00292fc69abca3a5d81b2208f88ab4985

    SHA512

    fa6e4d2a91159d4057cd8ab1569c1ccefa78c42fd05825ae517df561c59b87081b41f32a6407e5756f406aaeb258b63b204f97bcc121b77723a755e260ec574c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bc401c03e6f511be5e406407398b387

    SHA1

    dfb7084d40df1fe65f0e153ac8e4180245a2735f

    SHA256

    e524ca4319949d67361114b449e132d954b9efa9dc3eba7c6aa0bfb7ef2705fe

    SHA512

    a2b5b4576400c7f8bb0054559e6332734b69493746cf213234a23d65987542bd5960bedd63eb9b02acd95afc155e9fc3fbbff50030b59cc48440cf726d0213ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    212e475e8e26967c8239eae369d66cad

    SHA1

    4d77197378ab44612f22947187812c22e4562e2d

    SHA256

    c38261775f5f5e427cb92c620e4516ab31c15e5eda8d02238913536d01f5b0f4

    SHA512

    2b07de25cd7d97e26c094cb4cb9b88c3507f961b7c078a6561a7302ad16040de8e2aedcba4876f2e1c2d092780d4c88c67e75bea11f5b1833444de9c3cbe385f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    404b73502929fa7e0e14569faf5e6419

    SHA1

    7129aa07dbb3244042a7b8f07a8eb60744539a6b

    SHA256

    1e18381547e935dc122c0d35f4784080f2381b0f2d7d2b25d32756d1f6f68791

    SHA512

    3da0c8fa063bfd2033a778d1cd95bdd8f53831d1222e98147da0ff89c53320d3a379a5e601384951b42f477a98cafe40ba677ef8640c48c71b6931e7be9f3cfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8b50a55ededdbbe0ae9783e44622fa3

    SHA1

    311e2d35a676439675e06e81a62089c404f05ec0

    SHA256

    5a9db8e0f9d29ea9c29fea067745712ff5f49ff58d238149ecc6497907f5fcb5

    SHA512

    928fe8c5a3107fc3f3e2afde5b092cb2661b0060dfa8145285893813be5291319ab1193b8691815129a2766fd608d187fae920d4855f90177bd84b71c075d1e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d0bbf8e546619392695e23ff29e9192

    SHA1

    71b61d25e59a174907e964b846f755904e465be7

    SHA256

    f8fe74d4cfa04ad381dd1845b4bec55baae54874d85f05699359202b00457224

    SHA512

    ad669a85f4b85d43e0256423c36fe20442c801bf6ca182f48eeb724ead198f585002ad9b3eedd2604fd4460cc6a0b2125a288613de383d139653f8565e8820c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5682b7475ac06d8d1a82037bc17d279

    SHA1

    b8bbdf498a523905998c22cf58d8af9b6f3f311d

    SHA256

    423527a362c9d66dd76626739469cb1970743118e9a8c741c8759d96f9c26ef9

    SHA512

    87d6596a7b53b8470220773184f4d05ec6f733bda6723849b2dd32331981fe404b4b1bd1aaf94c20d7b64a497f0fff8ffc6381913106c940ef04071d09ca8311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24e44096fb0585c6653b31a703ceb740

    SHA1

    eccd9adce48d06d8c8f9d85b9b3baa96daba7018

    SHA256

    275c464f2e03a58703be0f2e1c64638a996c9b51d6cb3b914a41cf9f734343a2

    SHA512

    36d0cf8643eeb59b3f5979aee4914c0416c4c548063dcf9892d03f2bf76fb5bea4d644ffc731debfd85513f4532b9b92848bb4c988c30f63e590c0c700bbc98a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c1f9a5afdf7e3a6db07e3bbecbc10be

    SHA1

    1143b73e326a780dcb5056755a245eedea016351

    SHA256

    8f32b02ac29c0c67c7b060e1543e6834a5f6f4fa465e3b50cfec9cd5cb6b3ee9

    SHA512

    3afa3951dade4bd5aa80c5ef4795cfa54d3aba30dfb6059987e9c03a2505532d16bf7781f257683802a3b499a76b4103a8e3c63fa5edbdba9a721ac8ce8a0bc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f028735feb3d658f45fc05bc2306f379

    SHA1

    d05150ce506ba95adb6690f6563ac6beae01f0dc

    SHA256

    9f7c1f7b606eed22acabb217d7f3c60f0b8cdde917fd810a2e1fd52f276c2db7

    SHA512

    542eaba6d453ba89fcf2be5d6876548e9d1a8f32f7c5d3a3f03b0599aa4a24a96f656c80e6a8476f1f77061a55d831ca5e05ca15907c337ab6f70a0136901bcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fb5f2946ceb9c4b08dbd8d6e01c471c

    SHA1

    9929e50bec91fef80dc683a4a97e2653a6e69d32

    SHA256

    923f26a9d3c689b868d9658cbd10467be9eb0b72339483998cabbc0c6a51c59f

    SHA512

    535236d95463e54c2053abae1aec1a9873850ea3ff9577aa1ac3040569d25b25459cc56948645ffda811b5e29c6510df800f2fc3a34bd3fd4ce63b0a800a1544

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7a4032086ff4837f375f123907d6abe

    SHA1

    2c66ef8e5537ec9529e8c3ae1c271ca58c774c39

    SHA256

    f89d8a8d4cba67d8f5e50ad83bae2f6a83d95bd8e8a7810229c186b9b2426897

    SHA512

    ecbbb892200c43fd30cdb8e12d5434d351130ea23334bbb25cfbf4188f7b03a06ef8c24999e58fe8b914e247dad8fca9c28237b8933c598dceb533afca998840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    541205bd66d0c690ed38ea84a68d377d

    SHA1

    51dd908d81399743e58a841d36931f55e87a9b9e

    SHA256

    221e8d19540b32510623cb20a4da52387bbb6f1a2463ac1662a10ec38f68e7ba

    SHA512

    87df382bab5a893b9dfd36462ef9439d52de53a4becceccf8b7fcd61ab786ae8449d2d1855762476a3fbe5b7bbacee136174d745a4edb11080f3058e56098294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abb298095a48b4d2ce56ab7506244ca4

    SHA1

    fa9b0471966c4fc425b5c83f97ecb57ae198e4c2

    SHA256

    e106e5474d5a3c3889acb93d9d35364caa1763c4bf66bca2337f52ec67fb4c49

    SHA512

    a0859d7197b2f1e1ad8c8ef9e58c9762847d0d6be2a21b5c7c1f344da6bcab034fc4ce3b8d7dc3e1b5db36bc6d049d389dc5afb8feecb022279f3b882fe1fefd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f7ce011cf19fec68693432f1a938490

    SHA1

    a3260cb7f87f73db9e4b1b75f7fb89b1ef563f8d

    SHA256

    2c5fc33988c3012f0ef68bb4079928391856106feb8968cf055067d685606cdd

    SHA512

    b412e962629f1d78a4ee0599bdc528601960ea476889b547c56b8830a26f2cc7ae35f4da630ff09df03dd193304685ce359e52046676d03d5d7ba9219a36d8af

  • C:\Users\Admin\AppData\Local\Temp\Cab6395.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6426.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\eKEF17H7E1.tmp

    Filesize

    3KB

    MD5

    38d6eb5672a223ab464dfd0e356738d7

    SHA1

    132e053dadf1fdcec3e4cc72060a2c5f667e6656

    SHA256

    e94c6ab4c3cddc905fc9f36205422eddff9e24badd0e200f6789a40862603a64

    SHA512

    a03471f9d1084fad5f55dd4c1fd701c6ac782cfce45911619ad25e5a003164879dc3c68562e939973ce548438162f37e275c88df84fce84881bf0ee0c835929d

  • \Users\Admin\AppData\Roaming\Ftpupz.exe

    Filesize

    156KB

    MD5

    0990e32b124536c31ef5d775c56e8963

    SHA1

    62c4ccd65452c38a663b96e4a60f3cea471afbac

    SHA256

    cb261a506b111d4007e82b3e71e4da57b889a1482bfa2093afecd95e9531827b

    SHA512

    3553a2c0846e0f774736991b424d92a11e33d2594ffc04655a6c7e84ba590f5365f24ffd7173b74221616b41724b5ab4d59a9e77eea294be1da0cb05377d1583

  • memory/1716-9-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-18-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-11-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-3-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1716-15-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-5-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-17-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1716-7-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2084-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-48-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-34-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-33-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-31-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2516-91-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2516-86-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB