Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 09:29

General

  • Target

    0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d.exe

  • Size

    217KB

  • MD5

    e307123c3012248c4f7eac48b5c803c0

  • SHA1

    13cad899944c5267b1de0aecd6a6964c3e2696c2

  • SHA256

    0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d

  • SHA512

    c8e6b07a9dda7e71417f185a723b9874e7564379184c744f547f32a6108f18d18e0e81c9cd5520e1bbb0c98453484dfec92b041323c7e67eb64da9edbcb08e63

  • SSDEEP

    3072:phXD6M9my8NbPYOBLujYx5I8XDZW0956w/J+UdSZWD/rcV9YHcqM3:phT6+mntYOJ9FR60hd/D/rcV9c

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d.exe
    "C:\Users\Admin\AppData\Local\Temp\0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d.exe"
    1⤵
    • Adds Run key to start application
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Read Me First!.txt
      2⤵
        PID:2776
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c @echo off & echo github: https://t.me/dme69 & start https://t.me/dme69
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/dme69
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2408

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      280f52ff5fb80b1eb4c079f641c6afa6

      SHA1

      b7fd881f68620118f8be2532cc185bc5e31b1880

      SHA256

      10037377c4c9f7a701a5c2418b695883a6a250f474fd614831d14487c66b9eb7

      SHA512

      fe7c04fe42683551e77826e1313976ec8f129b1bc820f6330b63ee0ba10d136d466c00d20f10c905e9fe64b77872dbf4ec8fb50f02b6b283970bbbb7946b533e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      49801930b8e4cbd4d46da98c958c6d9b

      SHA1

      b295e2b8c3fc9bb701871fee08d3b5bea1657c1c

      SHA256

      61440aaa698459811666d6cfe069ef0f2c328ac99dc69c12d88640d397757589

      SHA512

      3f5aeb8e504377ce48ee5b1732828f81a8bf62dcc7c4cae7b79b30c573071bc12cfd8bea4a38ec2616eecc6f967e1b6cb9c3dca1af836fa805f4b563e3a7a736

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      94d96685e51bf55367c7f0cc21f23942

      SHA1

      a4718ab599cd1e142b213606766aa1143af1ced4

      SHA256

      96cc3980e1eedca432362c6b743d0f89ef618e114936eef5a07b0e19d147d53c

      SHA512

      f2fdf5f836706ffa27c6170bacabd7133fd87f92e0e052ebd8d4a0db2bab745928b337263182f90c2b7bed1977bcdbdc17756cadd2c041141b5b6471e633ecae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      40ce7b2c92bd8592a4b7c930a7140ae8

      SHA1

      be5c4e4155b6ebdb86b8e386b56c66af20d9860b

      SHA256

      80f738f2caee11e7e0a9a16f5167235de46e6e5da3edb6d941f9dfff47bbe997

      SHA512

      7a54af6fd45e6ed1c2f54c83257c747b36f56ea2d0aeede0bd782c53ea22f93a3761eac6eb2f23c3532723a680ec340dd76b9f7d808435315581af89974e83ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8829d4b2fd51cff6a10880e8e1c34e45

      SHA1

      a7165ce87363e87694cd23f247824f59c4f6d827

      SHA256

      b89d3169dfc2a8ffb7ac2d0ee52aa9ead80521023b44c64c0911bc48c061deaf

      SHA512

      c999945be3aecbdbde32b9823798394a0e68067505bc32373a589a13750dc52b2f516219c150bba4abf02d95cdb0d05bf909e588e7239ab15a1f431923f9219a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6c8677bba570cda9d8160f9e8a405012

      SHA1

      a81dfd1320229c453ecae8b0ca3d38002e72c81d

      SHA256

      76c9f8800ec787719bd8da417b0d277155bf119bc10272ca64a38f631fe27736

      SHA512

      e718038af030aae22c68495347655c4e3215e962064f47f506a0f4994c248d260ba9327c9c8327d2ca0f81b769f176d51da02179d7b49c09487a9bcbac682711

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cd7a2029e915ab52f8feeaf322ac36de

      SHA1

      ae6dd4983209cb52b362c9a63fa7bfac63d1327d

      SHA256

      ec68db46f2ba7ffdcb537634a02a3a01c3b42ee32fab79eb198f533848b0be88

      SHA512

      8136c694eeb9f952d6ade93c7e9f40608e59d5e6003c99d23cfba5ca0eff264c74a6e9c3f8a9279d02f5e59e154355c65ff5a93ef9a818e4bbaeb8916d8dbc0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e782a8192e4e3e8d1f118160aab96f5e

      SHA1

      6cece7c04560de38643bf8258ca4b07602fd8a47

      SHA256

      6e87f223d700ce226cd784548f1bb105db95ef97180727b1a54d09ce550822e8

      SHA512

      bb140199dd5f2dee1bbca53bfc7f3c4308eaf7d21c9acfd1fc93098a7c7835bb8954a799cb4abbe811379cbb07cfb9e3c337a53ee879a66d18e186fe562caa84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6cdf61938c95b6c4933257419f3c6da7

      SHA1

      412a50a056033033f5efc3fca32f75f00c10e1ea

      SHA256

      f4b627a86f97ca3d0b3da3cc0f633e984c47e05ec3f21267ed706825b8750af2

      SHA512

      e55a09a0bc29982bf192398309dd0699a63ad45c059c37f88b5a24fddce1d07dfd93a8f0b13e1e01bb2ab510561ae64eed31227e474da463e866f798249da066

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2c0475fea46e78896ff3a102c7bb769c

      SHA1

      328d42c103e35908902ecfc7b63f72f369e86d16

      SHA256

      bb2b8a5555fd9b08f0087ed86fc94a9ec8e71c00c1d4cb863d663239b0cf8720

      SHA512

      de42ab579444e44de06e6df2c5c2280987b8e1478786be5b02ce3cef263ddce3bad7c83456158cd9750090a514e7dd1a19e0a485a61d85a8d2eef9aa7fb69a26

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3a33a67560d180a4b557502ce73a079b

      SHA1

      691f84e7ea72f12931b85451c5bd3e712f6bfb6e

      SHA256

      eca4001831c42c87dd277a3ab0295edf396e9b1d7967052ba6b2b6d5062366d5

      SHA512

      f3e4a87a710832a5e16c1bd1655c89b8022b369bc12984efb560390360032497082fcad5b23884819c59be25996fb7470af34318490ac1b0937eb8dd8707ed7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      909a2631b8369eac4e0e032a1498c494

      SHA1

      3536d18cc2f360c71f425b035657c874244a8811

      SHA256

      2c50ba04ee6fdf7f501c9acbfe1f7bc236ea90800508e4c6b74c15eb5f970916

      SHA512

      2bcfd46b6db4f64c082cbdba6b7616a73952a512e66c977518eebc7a66da19c6b0cedf8117b32e4643db39b461db8de9d579c53a440d7d9b098d0ff5be770298

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b2b9fa8fb81d001cc1c4690e4dc95d2a

      SHA1

      3c765647089b72742b7734437b96f71fd91f7c93

      SHA256

      91db54913aa3a6c21b52d1c1c3b0412272772c4c42384a54143ff8a879e78d77

      SHA512

      3bfc43c12bd0c281b5a80c95cadbc059a68f9abb4c8e19b040c362c60fd225a7a0e6cc4abec0eddcdf95679810241355797cbc99860207e8bd4ffbe7dcc3c43f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cf72fcecae4511a79ecae4ff8f5d49ba

      SHA1

      8358e4c7607b855aeffc9ca07fa13f1e434e28cf

      SHA256

      ac607f97734380d1c24947f5cd31ce88dba040582c0c4cf57335a30b338a2bd0

      SHA512

      d1089726669b1a072a752f7ce2af3d8da6b51eb8909647fbd640cbcd7854df169fd1051202c2d688ee0adece679952d6cbac6342e43c1077770a5570abf807ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1f568d70526b4a5ad45f8ead1a43781f

      SHA1

      4d1c2c3ca062a64886e1916b831f97e43572ab34

      SHA256

      0aba44d94170bee8f8dd525767b686f00e9b9c1579d75526c2c0478e72d70313

      SHA512

      67d3cfaee7ab38bede7c4d03739c792ca2a687714868e5ecfd1d345e6b9e4e3686bb166c7f1d1007de35474efbcc8e32acd4c0c0ac38345a1b2175c86d1e9071

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1d692a43232084fed09ce0c7f2785336

      SHA1

      0ef9b5bcbea9c4b6ade00716a686ca9ed1dc9eff

      SHA256

      980d45649b0ec5d973dfd446a18b20876aa0e2036178a18737bfc7776e5e9321

      SHA512

      677e96e08ddebe2986c59003454ecfe202f32db8d77c5325ec70c5da9350720d3b2781a0298d9c262e675b45561636f2148e3b645ac60ff43d7963bf3d838d8c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      747cac7f08553186264089d77b9adf4d

      SHA1

      03b42f8d3cdd3aecfd2f54df94f78223e5c549a3

      SHA256

      802545d72460fe519f1006b9ff27c1ddf2d3538e4a77b5bcd6adfccef9c0ada2

      SHA512

      c76e2c0f084d0e168aa26e095b56690d10574610a6f869c8395a793259d4ddcc4d8320a4997950a8565c7184e2ca670cd6046ba196702d9328281963c3942794

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      17c0ed30f752ff08dc258682e32083d8

      SHA1

      59525fe99145d543928cf7d661c3748c52dbb623

      SHA256

      8a86ba80fd360e8c249431d61ef91b876ab22152843c3098201fcdcfdda180e1

      SHA512

      2247922493cc1c0fcb081d026425f5901d1ba32c5f77b2d6802b8fa9b51c2c6796b7829311a2d2a927c2e3c0f218600f70cc04a78d3b8048753e9185e1d8abd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      476882eb3694704e10d1e30696c0934d

      SHA1

      03611c408d31cecdb96fe02d6d4120d4f324de5c

      SHA256

      cd4bbc64a3921966145871abc79c44bc9100666a16671175ee701335ff2635e4

      SHA512

      ef55527af3bca5eb3e5a69390c2d3f680c90e8c40125b9abe49fc0c4942ce87e818a63cd90aafe30fa31608bc8716d13a442a583dad33aa82536470baf8a9b33

    • C:\Users\Admin\AppData\Local\Temp\Cab1739.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar179C.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Roaming\Read Me First!.txt
      Filesize

      268B

      MD5

      bc7ee9dffb2cf55f5fca0b0602a5f933

      SHA1

      7d7def061aa3ae9c0467cf5f126fa76b7b167482

      SHA256

      b2b02392520557f11412437591845f013382f25a7df3c5528045ac2ba400d711

      SHA512

      2d7bb4718a22669cbe96db6ec712c958c2154ef18c3d339262a89ca81868921df14698669f1c8fdbfbeb908b37784887c0383cb7663d3cbd6a6d4594597b3ed5

    • memory/2648-2-0x0000000073F70000-0x000000007465E000-memory.dmp
      Filesize

      6.9MB

    • memory/2648-0-0x0000000073F7E000-0x0000000073F7F000-memory.dmp
      Filesize

      4KB

    • memory/2648-1-0x0000000001280000-0x00000000012BC000-memory.dmp
      Filesize

      240KB

    • memory/2648-35-0x0000000073F70000-0x000000007465E000-memory.dmp
      Filesize

      6.9MB

    • memory/2688-36-0x0000000002280000-0x0000000002380000-memory.dmp
      Filesize

      1024KB

    • memory/2688-34-0x0000000002280000-0x0000000002380000-memory.dmp
      Filesize

      1024KB

    • memory/2688-33-0x0000000002280000-0x0000000002380000-memory.dmp
      Filesize

      1024KB