Analysis

  • max time kernel
    292s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 07:59

General

  • Target

    BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe

  • Size

    3.3MB

  • MD5

    18cb4bd70e87ec73e6162dcc9ff91d5f

  • SHA1

    be430c6d7abe5207f046ae2c226c25082404fb77

  • SHA256

    7a757c8154b6276d2252762ea7b829e10df1931366f6cd65e51b7f23c43481b7

  • SHA512

    3d0b1f0b5d60ba27698642847b923224412595b6888df9cea2ec455e74b0b352eed03a5120cacc20a689b9c99aacabf7bde74031d4815ac6ffc47d9a0ec50315

  • SSDEEP

    98304:6zZljAa+FybUJwNNHFt1EmU4s75HZu0HEMg:0D+aUJ6dFLEm3AHEMg

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
    "C:\Users\Admin\AppData\Local\Temp\BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/Team_Pentesters
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fb6f3bf0a6248d5bdabc3ee25d2e3ca

    SHA1

    94a3f1a5cb05a1e3ac33a21dd3afa2a57e317e09

    SHA256

    9557fb1e42a48f4abfec596b9496a2ddabf4640529a79e9ab6340eacd664ee08

    SHA512

    c6b695bec31c1c7f8c2115e6f92bf85be376fae8b6756a8eec93940fe04cbbeadc88ec114b5eda7fc10493db14742cb1ca0ab466172bf9ce95003f722bbc5d38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    933b511146b482fd29d41d53cc7d0665

    SHA1

    bf31fef86a43d9cd2ccbce189dbae0657d6b3f46

    SHA256

    1750240c6370c795281d2988ad3a5001df051b0e50ffa972c815c9cb01190218

    SHA512

    23317ea2ad1ad41b308040345c4d0e6a11e62506e4aed4bc575d9752cee94c3917138783be81329114dbc2858302f23cafb68504e5bc9f5b37af104a00e62419

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e7f659a9da975ba15d3e31a3bbba797

    SHA1

    7ad2452b2206f1f46d6e34ccd70a4013085f632d

    SHA256

    52c727eb88a01346429f0ccfadd0c1ca51f00d034e673d245cae7536ad2cfd44

    SHA512

    cb259a1caa81dae55d3eebcc442f8784c9ac6b71ab3d713fcd2060ac68c597976b6891b471197969b2dc8c90c9066e4afd9fd6d2490752dfe84866d2f8427253

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b708c70a9dc8287c07008f61e1a62741

    SHA1

    47f8541b94746979e1a1ed353602dc961e18c5eb

    SHA256

    7cb773ec527405dd5540c38d869060b30edc3218dc45f1007b8b37351b547cfe

    SHA512

    f7af447ac1fa5dab60714d459bc7076c4dbaa4b4b6a39963752e389524ee8906238047919d8dfcc6c00c3d02936ca663aa29849b93596ecc1d6238a338485bae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e47cdc194a29583c25b5928ef74bfab

    SHA1

    0974759dd2a9e522818eeff245745490919a202d

    SHA256

    ee50407cc040ddf99dd1756f768d2a7301f5e1f78c708c74cef69ac383fc9dfd

    SHA512

    64060bf43683cfde86bd66edbaf60b723262ccb879aa312c0f024d79ea28b18d7018477687fbc5e0fa4079cf6cb3c507f7d59e056c5cbcde632675761575affc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01981a7067ec28f3ab45958ddcf6834e

    SHA1

    45c9f77aafe466f99103b80703ae990d356f6813

    SHA256

    93e2b6569fdf551426df409f4db24f0135183f12e17e7409edaba9d47dd8b479

    SHA512

    5b77f45d6f9131a778685e4b0eebe3175167693ba952a8884287858406bd7f2e4f1d0dfbefddb1772bec25b2b59a03624c5c1bf1957335efc8876f5d0c0b0068

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36aba7fea3fe8c3abfba55851f8cc413

    SHA1

    7cf6e0dd6935ccc744ce488f40617d557850da4b

    SHA256

    884fbfd91259971f0dfcb979c8ef68c26331bea7cf3bc266aae3af6fa4f52a27

    SHA512

    cb0be48348b920e2e0cdb10edfaf737a039bbf8447c16e9c57ca784e382306b113e2b132823f4d4146daf131db43e56a81e95f9775346cd704cdcec94e2740d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03a67538d68b0bc53d190184bb61e288

    SHA1

    0a8f7ac70261125f9610faca526ab0c229969f42

    SHA256

    72d96c39161612dd922cb9aa0c61c72abd0ff40b26e6c8b213760fa88800bab8

    SHA512

    b5ed37c07378964acc10addc6303d01bde5372e890b0980198c3db14f640ff23ed680256ef21a58058bc325145e30a0f16031851d969332fc03d73e3899e92c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3b47f2420215ddc391a0a6c2ece5c06

    SHA1

    a04987dd8d09d3d131eae2e67e09144144c84108

    SHA256

    e2602af6f91978f9e4b008ebe9e70680cb9086c4c8531d79cd4a227b61209be4

    SHA512

    de58dc637ac1bea623aaff5797fe8f92048d7c19c626ed5aa550cefbea62651f28eca160483fb5a6e5b38a0e0597110b07eff81ce6fa7caaafa224000770dfa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f79483e644b97c338163d1b4ad31337

    SHA1

    f301ad3e32d42ae2f9e105b89e0222dbd4e3d8c5

    SHA256

    7b024b112df9225af6cb5884d39b8c45ce56ff424948a1c3769cfec2be29b1f7

    SHA512

    e994ae654a6eb540a78c1791945b9998f2069b2f48edc4ea89c794a5d384205f6dd402eec6d354b9d3d5c34bd8df66e55c3e3e359c35c6a64d1f1c1a9247e101

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f64ddc31ba7544f07566902bd97cf851

    SHA1

    13d52612ab83fd85c747405e8be9cbf8e04c15e7

    SHA256

    73dded60e874e003b212ad7638fb09a782c229cc4d5aacac62d985eb667f2a18

    SHA512

    a10e367ffbac5ace3650783d0a695fe7e454a80596191df95eb46b18a51a447b0477949d65b35de4b80bad6df2f277eea286a4f40340bb1e99f2f071ddac50fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3b1aff12119a981b41f20fb4893d3c3

    SHA1

    c60fa84eca43e3bf65498b926836a4f8bfedc33d

    SHA256

    fe08abcd719829f6bd0d0fe7f23b676d251e4793ff7a15a4751705f8b66cb156

    SHA512

    49344b1eaa15bd0585ecc3d954b06e4726afc5b12785ff1eab0d669dab2a31083f80ebd0110ca6e298f6a4cb9f014354abd5769bd30f5c22c9c8f833e0c6ddc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fddb834b439155639f020f842eeef0cd

    SHA1

    26b63bf0643ae9d0f80e0c1c0aa49b702135372f

    SHA256

    88f9868eeeff22b58e6dcc1fc34686192515bd17b17af27cc93b76a4a8a0c726

    SHA512

    9a54723ca732bd6e7a2f82c893d04d0d12b72fc10e4bff1a47c266946d46db67fd795460c9dbe648fb21f09e82ac620926998566a0ddf635a58abc7ff1c458ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f8c0b36c2792ddec405f462dd2c76d3

    SHA1

    ba2bf2f8f4bf434d0be88d68cf936a2a23f07da5

    SHA256

    5c6f0659b865bd5da793693bd6356cb0192749e4228273365b75586f42e37890

    SHA512

    26859b58c08de4a57724bbe1db59b84cd7fb9ae4e440a48909543384d1788c4437a66e61fdb8a4e0fc005ccd4dbc4dd09361042b5bc07867805b104b7e2a767b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    779906b95917a03b03bdae1d26ef89f7

    SHA1

    76c852abb12c9884568d51f30ba9fa57301ac81c

    SHA256

    184aa26f5c710a9bbafc955d70d05d137cdd1933e6572483435151c5787689a1

    SHA512

    372fd62e62490b8a49db3186a47dfce215d020f8a5d224583ad6ec8a2ad95648488d25838c84cf6c19f2910dec57203b81d8daa12d265d476792bba19440f765

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    800f8cf4b0266f4c5cca54c161b72cca

    SHA1

    abcaf0b25fb0f104c7367e856eb7e73a97a3d25a

    SHA256

    43e9d050ef29d6c1f2f3b57c710dab27a759f6d5c2c1a9086854bb80fbc5dd6e

    SHA512

    917ddfc983990552fc3afd7df7bcb932ddfe2812accf359dfda676b45138ae674d8d3ad885319258fd7aae017b8b46cd713ac9a97eac032921bc64e84b4dc17e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c56341c0b232993f6ca559a2bf03cc48

    SHA1

    13a39d8cbaf40da0e8e96385c60b937b8428e46f

    SHA256

    e25f70eedd4150aec1ac3600f7dd4acc0ed8348fac3c3b5893efe2a268cc1651

    SHA512

    8bf23d8d0d42bf41ff0a3c0e5da27bbbba1b791ede3ac6d8a11195c32100dfc7bedb1ff04353acdb83692826a0264ea1d623527a496c004574e06b18f40f5f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fb4f47adfa3c3b2fd28692743e18d33

    SHA1

    f1dae717d1a4811a68ded3d4480b274a54ae1dcf

    SHA256

    7e012c77c1707ad2b4a6238336346f08df71919e8a4a134981346e92f9d2652a

    SHA512

    d6fe45309c9d86b9441e93eaa6b2ad06c2df66d51349148339bf782af103102528453d0d5b02f3b48492ed938d57b93c2c8c901a056da5fa63a21f9c7f434455

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    339b42241cd3da758b8feb89faf2df06

    SHA1

    8df66572e6273165a6e3cbfc100507cf3f0bdd4f

    SHA256

    6496e04c9149a70e3cf967c64d27c973b49a3e87d21820dd4d5542c8419d8bb7

    SHA512

    f24db15d13eae8f002c65c12eae5cd49487448808904d5123f307c48b75a3afe055a9513adc53883265d66fbeb61efb6a6be63f93602191f7c741f01e5622ab1

  • C:\Users\Admin\AppData\Local\Temp\Cab2924.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2996.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2876-12-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-472-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-4-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-3-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-2-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-27-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-31-0x0000000000800000-0x0000000001088000-memory.dmp

    Filesize

    8.5MB

  • memory/2876-33-0x00000000002A0000-0x00000000002BC000-memory.dmp

    Filesize

    112KB

  • memory/2876-34-0x00000000007B0000-0x00000000007D6000-memory.dmp

    Filesize

    152KB

  • memory/2876-32-0x0000000000800000-0x0000000001088000-memory.dmp

    Filesize

    8.5MB

  • memory/2876-35-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-36-0x0000000005380000-0x0000000005430000-memory.dmp

    Filesize

    704KB

  • memory/2876-41-0x0000000000800000-0x0000000001088000-memory.dmp

    Filesize

    8.5MB

  • memory/2876-8-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-9-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-11-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-0-0x0000000000800000-0x0000000001088000-memory.dmp

    Filesize

    8.5MB

  • memory/2876-13-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-14-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-15-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-16-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-17-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-18-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-19-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-471-0x0000000075DD4000-0x0000000075DD5000-memory.dmp

    Filesize

    4KB

  • memory/2876-5-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-473-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-474-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-475-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-480-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-479-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-478-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-477-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-483-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-482-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-481-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-476-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-484-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-485-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-487-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-486-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-488-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-21-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-22-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-23-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-24-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-25-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-20-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-10-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-7-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-6-0x0000000075DC0000-0x0000000075ED0000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-1-0x0000000075DD4000-0x0000000075DD5000-memory.dmp

    Filesize

    4KB