Resubmissions

13/07/2024, 15:51

240713-tasleayhkd 7

13/07/2024, 15:49

240713-s9tr3sygqg 7

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 15:49

General

  • Target

    MADARA.exe

  • Size

    699KB

  • MD5

    6f6809f59effeb683bf84b15dcf1c2c1

  • SHA1

    100ba07752ecce8c98b980de2d6848445f058a0c

  • SHA256

    c1bc0af0c55281609ceb3d51ca277ccc703b7b9acaef219a8dd22933c0ad3ff0

  • SHA512

    ba2fd5746475398d59bfec006e036feaf4ffaf73d17698c02b16766a1e85bb590eb02f9f9a80cd04e54f828de2b32c18b3fe2ba4dbff634ddaba1f7f066bc56f

  • SSDEEP

    12288:Kh1Lk70TnvjcHW06BoF6NobATJlLY8/zm58Iz/fFOeDDtZINWXKSaQA:uk70Trcd46bClh8z/9VDfc0KfQA

Score
7/10

Malware Config

Signatures

  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MADARA.exe
    "C:\Users\Admin\AppData\Local\Temp\MADARA.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://affinity.serif.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:7588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7588 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:7652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          702567a15477c3c91a8221b7efd0d9ed

          SHA1

          ff196c3acb0804d081938a484031a9c48e3d429a

          SHA256

          36dde46206cce036241bd9329b0dacd5e2d991b3884b2c14278013dc1f21afe5

          SHA512

          77a715856c5eed72e9d3f795ce7a7f971ff4702444b3494780464309773ae387025ae8941e61411b9c92e82d073e4c1b896e6e1c07f0d7a400b9ac2522c277aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          64bf6ab88342056593ac1560437b9004

          SHA1

          6d99d3943479277f58f6348b9f943db917b1ad1b

          SHA256

          7867e071037b17fe9c73109926736b10b23d21916f635239547656431c62d8c5

          SHA512

          ba7327da0580acb46ce98665d88cb54694541509493fcd7f7443bda32d9b080cee6dfc5701e19cc542a4656447d0409710d0357861caf1c19405275658685508

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e0059d965f2315b84d7ef146959fa2a9

          SHA1

          75aa9a79e8fa31b7c7c6f97d1a16b99aa1803fdd

          SHA256

          3240c76b415da37382fa00c8fd888e5b0e2ee809c0fc9443fb70ddab60a9bdca

          SHA512

          647993f8356fe5d4b20ec27d5daddf792472f4f49c5e0dd78d8d6919b6ed728239aa64a307ab86493fc98619ee4df2bd6e6c0eb612158657c7c8a71e7049c330

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d9b469ca42a3d9689e3191da02cc9d36

          SHA1

          b675b2e52b1cbe8c86310b307c8f4cb4045fab3a

          SHA256

          6d0a2afa96e548ce722a1dd23666b9c77c62050ad56fdaeab0a89d9b8e3a6298

          SHA512

          7461ff8bc62d26089cc313ad91b9a1c0a4cfe98369efbbb0000613e9a430e7fc482d378703d265c18ab57395fea452ce91c5ad15191d41a5793dcca8d0f67157

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b61e2f16c8c3cd591117b0b3b457dd44

          SHA1

          db5d8fdc022710ca970770a0f4960f71e2ba72b2

          SHA256

          8bf9a36d033d914e9aa326444b07edea898130ae86671ee0dde06d2446b892c1

          SHA512

          1467c7a77af35701e03f886335d615912cc431987641dff7c41825214a1338b36240182e83f3bbaedb6858b0d5e8709eb9aed34d89f35b9dbfbfc403f16dd902

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          659371c2a016d6f15a05f52ab75ad0d1

          SHA1

          52b8dacffbfecb6e4e6a16b778779552dff555e9

          SHA256

          cab29045a4166e2718ce90a475083cf8299b22a2f8fcf5758ab6c05ff21c08aa

          SHA512

          e1dd32bd57046062b470515b96ce395203b88a2b8468c954673897b1f0379418d6707e351568b16318978b82ac2b65dbd03047820e7df8c3af209d7f66227c00

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f08029d5646cebc225c74f7682c78059

          SHA1

          f7d5ddec89667b18b8ebf73e04925094b3c7ef22

          SHA256

          e1f4cb55fd4e484ec84b11cb5ff4143867d267cb285297c2f4bee6cb26678dda

          SHA512

          404e9756d380d42431a0d95b323fb3175dbeef69ce06d921643736ca45dd6c63cca7538f862e001231b0967a6de6e42ac14b42168f3dd35bc7add18e8f88557d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fbe2482fdb6502a1edf563aab712635b

          SHA1

          86da28aef2d02096f40c1232e9ad02a7dd460fb6

          SHA256

          97b7da4f5f8b2b155aa3384b3a7275d019707e91778666e2ec8a1061642b1117

          SHA512

          8c6fc8bffc851273c4ea0ab85b0aa7ce9098e609069d284afdd009bc76f8cfe2ff296c29c2743b54e803b2728b88813a6db5487f2d3ceb07518bee83b950d887

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          be4e976a7c7d8554de45f8de124178fa

          SHA1

          baf64f2ade0f61bfd1688f0e3de929e3f62b7599

          SHA256

          0faafdafc953aa6d62d5550f913cbabfa7c4ae887795262e291f688b3164a7a6

          SHA512

          83aab38f1fb44b7c953bb6b7fa8f0ae42ae515ac741585cca7b53df1a5521a1b1d6956ca5075f917f23b73716279d1fb5ece868bffd9bbec423ba92a03d498b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e6f29374594ae417102b941a27a49555

          SHA1

          8e866f4b5c32d5505bc8c9cd0720fc7085c7f18d

          SHA256

          ff42ac94bf73379de43cfc5706612f2e0b15b4cfb183e918266c3b441c5f3cb2

          SHA512

          0e90e006d13436a75f21046757837593e7ac4d64b1bed05da817f717263f7bbd503ab5672d35a02cb8031e0cf45839a479a78907f86b2ff91219617b2b3af5bf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b70e61b19a93e5ecb54ca8479922eaf1

          SHA1

          f87dce1377516bc25b0d7f84b62a441060eb68f3

          SHA256

          716a279898b0fea8fd2581a6bdd85e80caee3e9213c89798b68f36e28aae1efc

          SHA512

          2e01fa129f4091ddf3a43a99e8a49cdb62b144cbf94e15bddc5da349cd4482e1e6865d7be2f9d220924b96b32534ba8e465273362d05cd7d5669aa2077335f81

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f89c460a650ac902bb658dfad0eeff2d

          SHA1

          eb3a24bbe0dca6136e45b2922abb9bb4f484d59a

          SHA256

          96a4c1cbd2b0922273541acca9728061709257f65b9915d33facccaf1af288f8

          SHA512

          d0ed7ac78d6089c32bf0519cb099454acf4b192a2f55713d9ae9f632f2599545462b4c38a829d866fc959e467f7997c66fd33a5fbcd10b10218812ae0ee28569

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9166b782de20e7ad8a9d8647e388f452

          SHA1

          139ced8bd7aafc81280a1507330a1c284b4c2416

          SHA256

          1515949666085a72937b4ea90cedb2e8453773e0373c9b5afdc9702bcd867ff9

          SHA512

          aeb96f35108681f8c2610ada81c86abf6eed8f0d333f5c41c36d2feeaf703ba44ee80c226458598af5680309d9895ec6e806b4d6d6347dd4e2245f019345d42e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          22918f7711c4bbe002d6dac00a42a23f

          SHA1

          985fde273f7425bc4f3ca4409c01e671971e4646

          SHA256

          0b4c636c97d99c3bc90f7ea8ea6a63a6fbef68f0f6c269f8dd2c5e15e836c34a

          SHA512

          008d7cc5dd6401204b10061e33d791f9836f05f738d9c4aa18cedd1efb30e9e21214a63bed7f00282c9e27f5fcf1b92f57461a88ca4df7a72ae7e42e78781590

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9b0f6cab43b5e83dfdd3e6aae8b820d8

          SHA1

          247a4c4c0e38a3c9ed001b43b5bcd5d7ebce3fc9

          SHA256

          4bd0a784b7cba229ac5ba791ab3ca6b058e0474330cd9324d03955eca5681819

          SHA512

          f5f7b486fa3b43f544073a2faebe17bf317d60da852026b20d0824b3fcf788f609272497e714412acfd60c91f6cc2c929ff610132d9ec3f51edac43e6e7c118e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ab7a7b45ba735e39a428d6ea26b44aba

          SHA1

          9f24b1ab76a61a6bda976629baadceedc7154e3d

          SHA256

          3ce18d30a208ac11415325349e0a9c29d4febdc189be5dd151f2ba8bbd539d18

          SHA512

          7c34ad8a28ec5c67cbb9d6260390c8eb59ff8247d8949175f8a82d68808096130be5888758fc02eb3bc2279bb5478f0d05cd878ccfec3d1044442dbf4ef30c7c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          479cd2052cda943e42c1a1cbddc61ffc

          SHA1

          5fc8cc86c52dc8a9e066c1f24276bc8aad4b15ee

          SHA256

          e64fc378ed1e0f64fbf2b3a4fa60e93f6cf60223955d9f34799a9285d593b123

          SHA512

          5563398eb2bf22ea6e09c69dbcc907a74b36e6ea8a2933c1e8644ec743e7c7c330926c0e84faa3cb05348dc90822295408a7667e09aeb04035c0f7f31e3e18ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7fd78857e56248ea9e24ba40115d5e61

          SHA1

          c01ac2171fed5d971bccec685a9c157c1f79264a

          SHA256

          80b2eb7ea6342d508478208e78d6b3b1b1d4d2784d103cd2a6b5e8d5934d0b41

          SHA512

          384bd1e0690421a6ffae2a0a41b2a87f2fe87350a71f7cd79efd7cfa30737a50098234b34f1aca06b08316164c29702cedc381ea36e758804ad82d63d47094d9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          151f9fd87e400e4a00620e85aa3670ba

          SHA1

          ce3bf1b35dc80674d51f8a6127438522076677c9

          SHA256

          bb37531d133dfc3441ef0bb3dccfa47acd9ae0936699fd87ff475874d291cfe3

          SHA512

          7b9e4876b01e90f25256faa9969bcdbfee6db2028c4350bff6feabcdfa4ac447d2097788c3a1f52936d9cd3ea3970d6b4f8d2661f47d12b920ed2f72bad6c1d2

        • C:\Users\Admin\AppData\Local\Temp\CabD231.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarD2EF.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2464-24-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-1643-0x000000007435E000-0x000000007435F000-memory.dmp

          Filesize

          4KB

        • memory/2464-34-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-40-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-42-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-44-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-46-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-48-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-50-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-52-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-54-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-56-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-58-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-60-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-62-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-64-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-66-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-68-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-70-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-1641-0x0000000006490000-0x0000000006592000-memory.dmp

          Filesize

          1.0MB

        • memory/2464-1642-0x0000000074350000-0x0000000074A3E000-memory.dmp

          Filesize

          6.9MB

        • memory/2464-36-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-1644-0x0000000074350000-0x0000000074A3E000-memory.dmp

          Filesize

          6.9MB

        • memory/2464-38-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-32-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-30-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-28-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-26-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-0-0x000000007435E000-0x000000007435F000-memory.dmp

          Filesize

          4KB

        • memory/2464-22-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-20-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-18-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-16-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-14-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-6-0x0000000074350000-0x0000000074A3E000-memory.dmp

          Filesize

          6.9MB

        • memory/2464-7-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-8-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-10-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-12-0x0000000004910000-0x00000000049D4000-memory.dmp

          Filesize

          784KB

        • memory/2464-3-0x0000000004910000-0x00000000049D8000-memory.dmp

          Filesize

          800KB

        • memory/2464-4-0x0000000074350000-0x0000000074A3E000-memory.dmp

          Filesize

          6.9MB

        • memory/2464-5-0x0000000074350000-0x0000000074A3E000-memory.dmp

          Filesize

          6.9MB

        • memory/2464-2-0x0000000074350000-0x0000000074A3E000-memory.dmp

          Filesize

          6.9MB

        • memory/2464-1-0x00000000049E0000-0x0000000004AAC000-memory.dmp

          Filesize

          816KB