Analysis

  • max time kernel
    1565s
  • max time network
    1567s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 08:54

General

  • Target

    f354148b5f0eab5af22e8152438468ae8976db84c65415d3f4a469b35e31710f.exe

  • Size

    217KB

  • MD5

    406cf11bdb84c3eae3e61f66ea596a46

  • SHA1

    b6acd4fd42b3dca2c2cb75faf48025c2f4880184

  • SHA256

    f354148b5f0eab5af22e8152438468ae8976db84c65415d3f4a469b35e31710f

  • SHA512

    c34a97b5d2854d862ca165136269302cda613833d83b8c9ec1d72774dd8717b5174a3077b69654435459a94d2d3f1111b9b3973bb3ab35c8826075fca0e126af

  • SSDEEP

    3072:PhXD6M9my8NbPYOBLujYx5I8XDZW0956w/J+UdSZWa/rnV9Yxcqz3:PhT6+mntYOJ9FR60hd/a/rnV9q

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f354148b5f0eab5af22e8152438468ae8976db84c65415d3f4a469b35e31710f.exe
    "C:\Users\Admin\AppData\Local\Temp\f354148b5f0eab5af22e8152438468ae8976db84c65415d3f4a469b35e31710f.exe"
    1⤵
    • Adds Run key to start application
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Read Me First!.txt
      2⤵
        PID:2700
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c @echo off & echo github: https://t.me/temon_69 & start https://t.me/temon_69
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/temon_69
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2956
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2804

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f71a12bd15d610e5124aa1e926ffeb65

      SHA1

      4d790302cd4d83d4bfb32dc1276d957273e64e2b

      SHA256

      5abfbc03c47fbfea2462ebc1e83ea42e781a5b45b10572a6abcf7ab3bb3279b6

      SHA512

      d784b988bc7868ae17076f89db5a29a5cfec87d36fb359847b83213ba027bb7df76d6f1e37e175256e594defb48d0dc2c4076bd5ae125ccb4558471b5b985c7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7a1e145dcee715f65c3b3b98f8da4654

      SHA1

      94012b4acbfe28c5d5c67498ffa3f6830ad38795

      SHA256

      bb29907cf17516a9f66d7a5e8f0342dbbd6bc926f2cbe37b0100129183b0a352

      SHA512

      09393ad225d35ee50ff5a63af7def9b61c159eb0fc5e12c126e01e57831c34ca0b889b31216be2eee59df19adfa260f7d69b70d2499dc60cbe2ac91c4db74185

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4c9fdb921128788b18e61b2b7423be5e

      SHA1

      349398d53a92c6f48fcc00ee01358ba84689bb54

      SHA256

      010de63e1d36e9c80fb9e5aacd1b3ead367e6f15327ba9755257c8f7e3c762d9

      SHA512

      bdbe3a32c205f4784060d2d65039b32130d24897cf1f44673c3689f69a8e2b06a50d52596275680e2e0689cc1ddf5a48f8045d83f8951058f96c60a3907bc4b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9119bc3c937d2b2c8ad7921c77202e43

      SHA1

      38e116bff08eabae6978ba5d142441e9c697d552

      SHA256

      62ef6a8b29c724a4e715cf2e7a8c067f3ea91652645a748986bdfb7aa65ee682

      SHA512

      9d8da544434817da900203192c415cb543300ff2d18d62eeb707e39fdd4d270922ee937acb4aa27bd534dff1d445887ff5ea240f1bff284e0f81a51fef0b3aee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f0a13f87ecd72c46da521b1515c2874f

      SHA1

      fb47d37a8f8bb98cb19cb92b77156eb6453bfb7e

      SHA256

      0c4ba1b54db9316be92293d0729565a247c7640a2245617894f3868e3c57b563

      SHA512

      a1c58653d513c82cb4428198f55995dd1bdc49f4f9b92730fcc9254c63badb94bd41a68fadb832fe4fa879377fcfd73bf5d24d4aa7fad9a1d6a50e0043133a75

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8c7a4e99ebab2f91d988c2ef0acebfe4

      SHA1

      a609fbb54f17f37ceb0d604e043428cb674494ab

      SHA256

      531f7d3766837932081e4da2bdf811f5901d3c0d5db88a2b62f05f20b7221e00

      SHA512

      d90a8ac340b41fca7c237a37c8b976999cfd82665dc5546594ae05c2342d6f4a25488e64ae40f8809e4691a60729e93dff0c059aaf2be4a97e16002db594d319

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      30424a6ac44bc0c55b65a113c568129e

      SHA1

      29510792c795ff854067ccbc0e75b1155fa2b924

      SHA256

      180b6485763fbba34171f0bfd918493ee4de86d1e4394da9116c1036f16d8d00

      SHA512

      78ea381791ae4a17164c53a780b1b970d684b1cefe33d5a19442ed8dabafd9439f97c3892f01754e359adedb7ff14aece9c43a6942df7518512979f62f6adb98

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      56b7c922ff1f280176150c5c491ee2a9

      SHA1

      3dcf4428fe8f749fc179e648119f680ece1befc5

      SHA256

      d3e1c889af101c5c74ca2388c5031e4ea0049c76860bcee6ee7cb3f195afbe44

      SHA512

      2a0327bb92e7619b09cea6986d88a738a7772de7229dd0938945837e261a171c48e61a035e92b0bb5fc2d3118b85dcba4f5e0ec881f05b313d42a667366a5e70

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3d922c8f69c9d5610855d2f37d4a3e0c

      SHA1

      caf486bb94ccd59df63dc2b03d83faa7405ca4eb

      SHA256

      9df0501d72d88ba2ec2f0b26c6fff7b83d89688c1760afba33cb9353cfa391aa

      SHA512

      a3bd2db4d986aef7c34daa149378f655546efd9c3a7dae5c91488fb6e05934bd5e9cc0b4d5bd0d14fc50d1621be6574262ccd31e0ea58ac96d9a446fa139e7f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d9b34e01b86d09171a019991430f3439

      SHA1

      981b1ceba362405618b445e2ea35ee43176733ea

      SHA256

      93e7510e29e123ac870337cf13b7672cd41f4f9c630fc208e8545e1d6cb82dc3

      SHA512

      c364f8026ec5be7bcee7bfa658f3a8bfb07122386a1122b923d22afb10a79c21c4c6327307c65359b2f3e26bd9e54a876692072b5d4fcd82e5e54019c3db9fd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8a212e60f103a27a9662af01bba25d12

      SHA1

      904654af117a6ad1bd116945f2c732ac1d8a395f

      SHA256

      034e67bd94fc9545dac500074bae74d9d149580b6894357dab7af0f7fdfa6f0f

      SHA512

      63a5824227ba50a0f7bfdabef058472d67da0f916700e2cb2407cb6ccd8594cac90582cf80ad9bae9bc100b0442238cc4b55516873d7dff7a1c84c0cda650078

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0b8fca5df688cd3206e3e13883ca1eaf

      SHA1

      e023e8ee337479aabbdbdb93dda7ac8fe21e274a

      SHA256

      b8ae91027834e826c54628d6ec0b22c8b8f0d64f366afb6fcf72c8f9b2075ab4

      SHA512

      8eaa5c048db61aaebabfe8a6bee235f2de22fa38b47feed852c105d66e76c36a86687e1bdd89d59be8c5efbe6167c3f33f4ef5b86181358f02037c85bd1df065

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7f594c7f77523ed0855a472fa5bc0bc3

      SHA1

      e96142725c1ac9454fc26ea9df2aa80d0b126768

      SHA256

      2b429bcb559748aec61ad689105527f9dc25581b71d73a98d596048013f8de2f

      SHA512

      534c471012b02de93deec917af519ac9f3471a79223fb0f2dd22e79b2dfbc86168f60953b2dd854af12e1f3a67d6c4a912655ec802cf4503ea337cd86cd47205

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      26e681c39ba6e0dfafaa2da8a603e327

      SHA1

      e8612168751119c0b56db3c1cde6ab2690bbe7e7

      SHA256

      7c96ab03e17fbd2a32122887439094846a71b870bfdeeddcfe901c257a6282a6

      SHA512

      360b835b539fd274716b6a4fdaee288addeb86cd49b7ae24ebdace7c3a7c01d07f8841ad8bc180f3a76f9d8a35b3232f2a892425e818437d29b6823642f1dbdb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      eec29fc5b2466f944b5505b4f9732530

      SHA1

      6f1dae8c147dd2e20f95365809df58609923e55b

      SHA256

      bd0d4d255a34a4fa4400cdeb64df3f25df189e19907b5e230e1faae579137bc4

      SHA512

      0e8162bfba189c5e4fefdef27f9e5dc65be26a87569fa30a4373d9023e47c3ab8b6646e7e6fee5cbd232abc4b6dfd5b18bdec80f82e61029243109ed1782bf63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8b517eb4fb6c4d3759151f81532d9a8c

      SHA1

      ff5e87054d9229715a8aff4b9ddb1ef8a15e2cab

      SHA256

      73ee497aeded5afef24744577fa71ad91cc1f639e7093a4585a76ed1d665f65b

      SHA512

      370b8af30b1ecd31b4190d628a6ad56049bcb324f6ff3b57e9d329be9f8eae6a1b4f2d2bf079807e5b7f5352cf1b31abd6d4bd9e4afe4ec0a609d3cb8648a793

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9116d0409867cbace5d5f7a6bb258da8

      SHA1

      d726b20725e403d38a4a0b5d3bc0874c6334671e

      SHA256

      4e39f44c060cae32d780a88b88b53e13f9eecaa627208f0d92f554d53c1c4220

      SHA512

      00c50d665f95c45e5a0aced29eba4e378a7c6963ebab91e3161b7b488ec49e9e9c31d660f6bf4f1562572b51c3c214817be995ad0dbc5252749673f3e9bc218c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d63a79811c698525ef04dbdd8681deab

      SHA1

      a4378d59ff4bfe5594fe1cdc158345675c294cbb

      SHA256

      86f4d5d903e2d19b8b9944049ebcb448c0d7e620e2947287fa6cd22fcc2a6337

      SHA512

      daf31a40c808745db81967f0c174acce565b2de2500308846cf97016d179509e9ba6ef1c820680f49cfa77ac2c9899c0ba7cfdb3019eb950b6b693702cede3db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      344d861c4e6654d4ea57ebef4f9e9d89

      SHA1

      f0f73b70549758aef6b725b696fa177f08ca7a67

      SHA256

      eeb4e79ef17446d8ea4c33529a0f2548ea98e5d679cea5546c67ee2a6dd03c17

      SHA512

      137efb0e1963557996c1c6e80d5f02f7c4535c1cf7a09d705c3dd282b49926d5caa793fbf8e05b72da802b38bfa6b74cae9abc0a2a5ff98c5d9b70d150b5ffba

    • C:\Users\Admin\AppData\Local\Temp\CabE350.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarE410.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Roaming\Read Me First!.txt
      Filesize

      99B

      MD5

      1a17a3c217bc5f504586af0ec4caee22

      SHA1

      dfb396fb5cc735411bed8e75832315f796acc024

      SHA256

      db6180dca4a18393ff9ffdf9d1e9f1d0ace1fdae44b4f4ba712164ab63cebe24

      SHA512

      627ca1d41bddbf2f5885e431536217e711b75c17cdaa1265d257a71e370e4f3adbbce92d47a28df956e05fb6967e1d2f08b39115527a0a1a303d651d70f595e5

    • memory/3068-13-0x0000000074D80000-0x000000007546E000-memory.dmp
      Filesize

      6.9MB

    • memory/3068-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp
      Filesize

      4KB

    • memory/3068-1-0x0000000000E40000-0x0000000000E7C000-memory.dmp
      Filesize

      240KB

    • memory/3068-2-0x0000000074D80000-0x000000007546E000-memory.dmp
      Filesize

      6.9MB