Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 02:40

General

  • Target

    59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe

  • Size

    9.8MB

  • MD5

    31c3278d6e3de01677e9a75c6719b7c8

  • SHA1

    a92d6737e3d6b5a69e49e1d64086c1dc822c6875

  • SHA256

    59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1

  • SHA512

    7a32d0a0b399fd09743b6a05e6b326e194a385b0efdf23d10088d7328f9efbac8a4449fda30d4636df0240dd8229cebb921e3c5737c1a35feb619db2bace9b2a

  • SSDEEP

    196608:ynwReZJal3OuIMEgF3EeS+tpxH7qGaRQV/BTGDa+q4fD6Bnl/MGxPB5gmtj:yQez4+uIMrF3EeltpJu5QV/g3qBnl/Fn

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe
    "C:\Users\Admin\AppData\Local\Temp\59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.smartftp.com/get/Client?osVersion=6.1.7601&platform=x64
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    8a6d54c1e8c7bb19656f8e4c1808ff16

    SHA1

    0b8045a8f2962d014f32b0c5391d2a617fa6f6c7

    SHA256

    d0e3f9b1a76ef12eea266b8a6a30e87174fba6b1aa98d372bdb6d011226dcd96

    SHA512

    e58ed18436b4191cce5af17165f652dcb3433c7138764bef3fe73698f21210e73cf8c9ce6b09b924092e2b92b307f09957cda327e6ee52b806019b99b143d68e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c2c8b5763a86187512cf2758b3c0e76

    SHA1

    7a2a57eabe7c08d8bb1826692d664bfef32fdb9d

    SHA256

    6fd8b64a84ee06c3c10ce43a1a250e0b7b8d8d1a72cf68426ddfa462d96157bc

    SHA512

    4e36ef438b1afc95f1705487dac25088b2311b2c2a5029fb7ba642b39dadd8a3c272f40caf8913d3a03bc18f1ce60b1f5de0f1e5a6d1284ee7a00cfb0a472338

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a9f5da111f7e90d936da665845a46ee

    SHA1

    e426e2818630bcc4a16a44837d9323317134306d

    SHA256

    ca32f2703274db159aa74e64f81b27ef2805627d125dd7a99f4cea56e650172c

    SHA512

    d014ee035937d585efc1a6c610da54b79a0534a315bba900148d5e472e2f8dc9f18798eda20d2acc7512298e81f3628865d3a7a2bf5321a56cfa0e9162269be6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    789878bd35cea07f36d29416720dbc94

    SHA1

    96ebccc02bb5c36111876e3f9b7831e5ad385672

    SHA256

    9bffb07347b24e56154741c0d15e9a5c7072bffaf14c3c8f4a76d1994545417c

    SHA512

    beb525d5b1912d9fb78dcff84eab6c84ac84aaefd442c61905e5a28e2a8e960f1098f998951f17c50cc5bd0f4eb65a9cc618105c5678df8b4578400b6f0b2030

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f5997aa36afb229cb493a093fff8bfd

    SHA1

    a09becefb421d6b06b38dc64e9d82d0a2e0f4d2e

    SHA256

    c854d11063f06b534cc52943d6a0aaaf9abcab5744f456130318868f86c5d6d0

    SHA512

    133b4d51055c16fae1bbe7a6cfb471a62fa0eb2b59f24a92ce31b80830ad630d9832e68dfce3fa480bfab4de70ae5f804d76b5140f049fff19503a0ba5d78987

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c087e73c4eff8d73973796f094a018b6

    SHA1

    19d7ca97d238c6822fd3804ae0b53805dfa6c714

    SHA256

    019b785f31cfc242f7af198358362120dcf975b04521f34cc4fe66d9cd140244

    SHA512

    310355b0a6f5e99035e922e86df8079c8ff1ebb6efc819fe6395cd924bfc661cf64c51b224d39bdd8a5d56cae94242b1fa2c15193396d603bdb8ce40745c25d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eba63bac1b824866973d57c53076ddc

    SHA1

    89a9ba9d047628bfd1ffa94b2e09b3da1191ed49

    SHA256

    19e06f70586fffab642ff76a4f9711bd691996e324a095b701d0de1140869de2

    SHA512

    f260e8f2c75855ee59887e42a7559c247868a778013fe5084ccff0374b8b5871697dd02479b323964799e139b91e3af5d86695aecb8a1109f7f10489bb0decc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f3ca67fa7a5f8b47012672cbc6d550a

    SHA1

    4286a46354f6449b69ca4862d4b175f8ec5f6ed0

    SHA256

    5cc0f8fc2c81660dd61fcb980e1b60acae5be61f315ea00fc21f32c1a0c91ec1

    SHA512

    23456236bc88dd1ea63112ae892fe9a7c8f65243301ba02e59ee35961119ed7c017edc694cef16afde8f3f157f7a5e96aaf5b2e7b860099843e90aef32b1d4d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7ae5aec1a32f6d9e414bad76dc30de2

    SHA1

    3c0299634f99bbe7ec9f73580a94c1a762a9b61c

    SHA256

    c4292b6f3bed47253d02c2356e9598e1cbf4d0a81b8ceb12284d8f0122e61c0e

    SHA512

    f4280f40cc3c450857bed615502539fe7e46b95d4c5561921622b772c4735f4d602aff5e436275debd370aff1dd8aacd34ff739033979967bc6f49c1c0e3c7b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42d77b402e7d1c93055bb8996dc1b47c

    SHA1

    3df9c2048bf13497612492cb668ec844483beac4

    SHA256

    9b2514e4c2767a6b5696dc802a1e9edda770ebe527cccb0b350e6c7ad60e0b5e

    SHA512

    8e67857696899cbadf3daf2ff47b4483f6d28d1d347d34ab1f8d21755f4063817152d9ada6b8df3ae98e81c253e56e20cf532b8fd8bdeb6557aa1d5f87823d5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebefa0ed1ddb0bc670e40820f5d3c9bc

    SHA1

    4a129fa22780eebd7cbd0b3651ebe7fc9b96885f

    SHA256

    821c0f2cbff1f5c6b5f8bb5e7ba81ee03d4ac2b5060c7b66d3acdfcce79374a8

    SHA512

    ef9a2d198038bfddc8949fcd653bd08a1b26520d1db700c2a6e9220b183e21ededa945531981f9c9e93c83b15f73126a9ce1bdc89da0e16c512d01535c9c36fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ba7aea7aec714f0f4df7563652b0dd7

    SHA1

    c63bddb09acb6c2ebe4fdea2f1966be2ab200723

    SHA256

    f83d0f29a55997e815837ddce9faca5e7ac471cc76dd8c2d7294a30626037e0d

    SHA512

    631926910349a18b9d80a063e0aee1a9ecc98e4120b52ac4ef1fe52c588cbf3d26db595177b75a5f32db7be4c5a415ea626c419c2c4ed485e02fa4a8a332465d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad1f19a10eedafaefb7d48de527ecbce

    SHA1

    aee801cd3d0b56cf26028d4bd5b53c6235ae030a

    SHA256

    a9b12d1fc967d266efbb1a5b2475c0eabebc127a580cbbc9ecc0417b6ba7673b

    SHA512

    5c2ea6e20a19b6cb375d2cce3af994190bf32e539d2c00630e2c59d53562dfeb8d2bbf2a42323a9ea198401b6eb433c2ba28fc950a9c582eda36b672bd140264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    947b8c285636d69bd34cb4400257c2b3

    SHA1

    1f24187ef5a41734d02f5e94825c06396b701f19

    SHA256

    465a8b90a1834f8b1beec123a0e7ec2b896574d6cc951d41e27751632af9bd77

    SHA512

    5d2af1d4eb3fe1813830e314e1c268bc6e55c40bee2397a303716497937f282c022a4e3490c25abefb10c1eceaecd5ad3fe8a9adee55c97bfdddccc33fdfbc52

  • C:\Users\Admin\AppData\Local\Temp\Cab4175.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4188.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar4278.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3028-0-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB