Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 11:55

General

  • Target

    www.facebook.com-20120401-jpg.exe

  • Size

    156KB

  • MD5

    71529ee4591a11462e324d910071bdd9

  • SHA1

    2a927204b588c1acca443840b3753315e3f0a4b9

  • SHA256

    1c6afffa9f046c80e8b088ee1ca2b7aad84eb1e54c4cc9fa71726e2107135a26

  • SHA512

    d1c914c4319cfab8ff39202060909dd6f34ba8ace483dc0b8127e422480d95156947d0c8d1e1d7cbb6681634666973677983697870d7bb0c0e65321aca8d9a2b

  • SSDEEP

    3072:kVUAEPt5/hTXxO34O82OmpYEJHBWvethNVSJ/Hh/ahaaFhnhZRIS+j3kns3LHItA:j3hTXxIyCYqFtFSVYaa7fRCUCL1

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\www.facebook.com-20120401-jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\www.facebook.com-20120401-jpg.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\www.facebook.com-20120401-jpg.exe
      C:\Users\Admin\AppData\Local\Temp\www.facebook.com-20120401-jpg.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c5e8025f61121572c49955f2a4167379

          SHA1

          3e009be6e7c1c6861f914d077f48e2650135546a

          SHA256

          58d5f095fad8d7ba796deab1710f77f7e3f47708a899269a15ae5986e4eaa5a5

          SHA512

          e72e71bb98cb5d0547ce9d2900df472cccec7136bb97a2660f42dc22fc31768a7afacef865f9f9df9241d560894c3c23c0795df67361916ea5fc3493bc6a4ccb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cff6a1a3e8059ad471460a2b25b793c5

          SHA1

          fdfd0797287b9e201948613311bff327f1514b18

          SHA256

          5481d5a0d8906294966609ca44ed167015019a5ba06a1d69fb52520e50f87f11

          SHA512

          aa113bfb6288fee2093203b05ad729d4b3a12ce99d13f4563880c36b1bf13610b8030da9eb009dc0fb23a5ce43b1f2eb599ec7040ae3474136096deac4eb354a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e27bcaac13a0414cbc334fabc8d212a5

          SHA1

          f1298ed1718c2f507481a8e77da5e2d5d3c739f5

          SHA256

          e7ad44034a5a94e6eb3f9ac149ff60b9d63ba5c65e1034e635af1f64fb28044a

          SHA512

          897c1e93798a50208e40c0e5cfc6230d42ddb581807dd54d1c833a96cdddc8937304dc1fcb49f83e2f33dbee92b8e6b513f400e0e26792cc38086749a0a19606

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1cbea4fab2603857c135a4bb93c1352c

          SHA1

          f84a1cd0f3cf36bdab9c25f7ecba05b76d953c2a

          SHA256

          41143ee3fedb43227ff740edd30c24469dcfc1f5908f59764e420790f79ae313

          SHA512

          171d3a0df4e9269d3c7fb487ecd137e3a3fc2754ecaf8bebdc61648e6a16f2449dae051f336d682b5f1ad4287bc936b89839b0c9292cfcced9ec390991943699

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d85c9078974b7199722a4fc38bc5749a

          SHA1

          98ee0e5c4e20836849ac7b32c775a2bb7b7641ee

          SHA256

          9aa1696455bd7af693abcf52a3f283da009bb4d16d51bfafd576a4c45405b548

          SHA512

          a878da66f33a2aa83e04e1bd997b3bba4e18025ea403247afdebc80b6f7a8791983c094f97b21a281625561bb7c73a69bd74f5199dfee85c64c17075b0246109

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fb1455084c895e38727437facce6b97b

          SHA1

          a6875f0e7fee6f1414d5c42d13cea2058c5a4487

          SHA256

          f76558fad68b37e1fd01e6f17da99c4c7ca2a6085655b1f25ae4c40a6f072cd5

          SHA512

          a23c2dff1a2aeb0c763faa0c30b5ae5ebf7d62a7cd511535c4d8f3bbd6df0136275bcebd9b472bc4f9895ad5a9b88cea22888df758fc0ddaf7ad1b5ea98dffbf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d078deac481a7b75974f77051ca66694

          SHA1

          0f7d2d730ee1cb9b028f574cbed46d3984792d00

          SHA256

          eccac9aab4768642bcc4897600c227c269c94db412b53dfe7d7e344348f05fc7

          SHA512

          730cf6a45c160c2acbc0467f15e1c8f53b36537ee2038698ca3882dd56368d7c42b7e646bfcca6ce0de420d3248de4c0e5548f2efd3990de472ffadfc0497990

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c94825bd350db328813e8756fedd3731

          SHA1

          ec4df12a5c72a731d3ac1632369e3c4c7c624389

          SHA256

          1c45d2e211356cea1cbc729cb5b930ea77cf422cccec243677065d96935bb62f

          SHA512

          ef860fd34d00002f0cdc927cd579f17dfc23af573c11835d66efdaab75b2e34aeec8c0ca4036b9dea9a982af92f970850c89a4ee7add7dbd7d39b95331693c91

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          57e565c133f2d8ed9c433748e461c03f

          SHA1

          2da12ffb51a4d486c0044341b6abc23e45804dc6

          SHA256

          53ba3e84b3e906f177e63ecbb326e9a3cd3ba56602140cb836806bb0e37ab963

          SHA512

          5f9a282846c3080d9ffea4ad49a4b2f72b40913d969d6cc2e796053266a030a73720d2d282b40e8b2a6c5c3d95327910a91a56fee97bff5c723361af2bc9502f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          16503978b0d86728b9f5dfb9a8486d44

          SHA1

          0f4e76b14d7628661cd65f63aa5fd4377fc84a8a

          SHA256

          7bfad31b538dc2b45c7a7fb50594f8954653f8a81b1d63c7fae53de41ed761aa

          SHA512

          cb6d75fcbf1cd8896d9197079bef4d4ca68eaf0c7dfa579d38f982ef5954a2a3a8ed8acbda7c42810ee468900f7ffed8483d6ab8d8ce2caca4ed758a5289c78c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c83bd8f6b12f9f20a29442c271e694a3

          SHA1

          a649d9addc516093909d037950ef902084756918

          SHA256

          938d446f6f8b264d0edaaca373d33b79ae75caf0c9eb253d346858488773c8a3

          SHA512

          ef2caa6517053e3c53772bdb12c73d5a042bf80e0667db8e7e4b140d6aa3c24b2580b56d481b0f57679b5cbc2f8d532fd42746377e5fe9339c7468731579edc4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3b62eb3f877a5e11477653f84d07562f

          SHA1

          ce4da04a31a4d8827414a3d696c51995c12cc947

          SHA256

          471786291a958648d9e3768d1dff5cf6055c550f0433255e9f4516ce5b20b5ae

          SHA512

          b6ae7a6d1c443e670742e6b36bd4516753175800fc8a7bc47445a4da43291faa1ef6387f71d47746f298e5451371b62092880108dcfa7a1c0acb724d37ad5ebd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          53a7390086cdee07e46731daccf5ed7c

          SHA1

          99ec1956e1b319372acf077edd7af318d8f4f254

          SHA256

          15cbe813545a380b21ed9430a53ac3a6e1323538008e44d95b137c5e638330a1

          SHA512

          f9595f096b512d2255386eae7c9cf679b73772616769a5d51e03a3baa830aa4c5e2614fcadce5707f60f4a580167abb465df36bd5c1a27d984b3b495189984b2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4490c2ff3b1004d82afb0c67b0a8b40a

          SHA1

          bee744eaa9ab3b49cf1fe5c16f0a4a8aaccac5e9

          SHA256

          ab869f25c1d8191eaeb059d216e28b4f76e16d52f276a0f54f5e0e00bad246ff

          SHA512

          101b151287860ecec18fc3bd6f9d3ef5c699e2e8951b30f08b8ea4f03762ab4bb020e587d525ca4fbb6b70182f0bd2b76e3bd2042651910d58c0bf8d45b67cb2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4f135eeffadd852e70ca6dc1fcd54f48

          SHA1

          56fbd523b14cfcc935c068a7f1844d634a1793a9

          SHA256

          d5008c7ae2f698e7a8e15f40d6420e09bd940d6f0234cb1b8e01388fac2fcde6

          SHA512

          3ad34f4ddfb3022e3161dd1437e2aad1a7b15a1fdfa1ceeb57d1535415888888dbed03434f27c526203589cfbe0a19137a46892e6c449db3c5396497c35fc1fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9b1b7fc6ae1f933bbf3cb8a24744d6d7

          SHA1

          21a0602f0db08874bf195ceda5d8657fa5c93e5d

          SHA256

          ee07219dea3dd0d5b7b9fbf71d66c30e91d8a5a4125d95bdbbcb915f5a0a8600

          SHA512

          ff38b858aea43512b59a628112dfb64886f82112d12d0cc2c1a3355cc9d5eb04835b1142f13523784e501bb374e17437bf06f0fab6302bc4c87de1ed9ac56784

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ecbf2d2f5a76482516532668f78032d1

          SHA1

          a71f096aa0ae7da2c58ab313528311f4e110ee1a

          SHA256

          afd621fa6dd1b8f331147ff10066274dc2e51fd928d788778d2948c3c841db3a

          SHA512

          c42a6db1dc80282f420c9321c7a6f39a2d58c77073a79430fd66d1f4063de2f2c5b55f498e442cae817ed34ef7d6476c0936f3b602b7db80db8069cf83eb5aae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97c6970d14c8775b5cdc9311d7b9b451

          SHA1

          7b4938ee533acfdc4ce2172804eafd882e3a7e71

          SHA256

          0fb3e2901298f568dece5ccfd2735eaef8c619fea8b19d417ce1440fb9009022

          SHA512

          defb9ef4edfa1e36929c39530ea2d891694b834d0e2480d49f591d4cc02b777f37d8521e8ebbe4b7c60c74100e33c539f3e8f73b8951e5a949170489ed720c26

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          73a1bf47d533127bfcd719c329645edd

          SHA1

          035ee0d5d25d16156740869ce0cdb5b45302b7be

          SHA256

          7e3808e242eeb64a673b4d69e9f6ebf9e34d5aa59b89a52caf0b4f2beb4a58b7

          SHA512

          1a73c79c73ca7fda0c052d010cd67ff2b63a6f0738b339e2a88dce035019ac274230b664d3214ad945ac4b5b89b31b0fefebb299e57f9801cbd6898a646102ca

        • C:\Users\Admin\AppData\Local\Temp\CabD970.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarD9E1.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2676-8-0x0000000000320000-0x000000000036E000-memory.dmp

          Filesize

          312KB

        • memory/2676-0-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2676-2-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2676-3-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2676-4-0x0000000000310000-0x0000000000311000-memory.dmp

          Filesize

          4KB

        • memory/2676-6-0x0000000000320000-0x000000000036E000-memory.dmp

          Filesize

          312KB

        • memory/2676-12-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB