Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 11:11

General

  • Target

    TGMacro.exe

  • Size

    1.1MB

  • MD5

    2368fd2a77dd36baee219dbb8a16ac22

  • SHA1

    2b0bae5e104cc3b38723a1fad8fde1ca8d7a6d45

  • SHA256

    7004a782e420da3203b8ac8ded5f734531f9f09441f94d12a4b042ac2d29cb94

  • SHA512

    798b9d007760688f785ef9cb4e907c662f45c39ce693d6bfd889b1467db79c6c2474afc855538b443206e73c8801afc5fec5e4ba05ba23d7986e2b8b1fed366f

  • SSDEEP

    6144:7QwOjoW4HfjzLHAf1M1vHEqW1LymFEymFEymFEymFEymFTymF8ymFYRM3GWOhymT:71OjsHfr81M1EDkssssjajRM3BOIO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TGMacro.exe
    "C:\Users\Admin\AppData\Local\Temp\TGMacro.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://trksyln.net/Download/thankyou
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6a1f702ea3c5c0a2345a3403d3e9593e

    SHA1

    5637105584177f78ee50b6f5060d0974f2fadc0f

    SHA256

    b13f60136ec1b8f6eb8ebfa752ed69368751e2f7de4d1c7f560c425db5abafae

    SHA512

    982f904f7a87ea41ec6534edd210c62052055257038f6208b45e762f98632e3b9e74883e0f93005ab77a043d72d71b2879eabf85748803fadff9eccb2f883ac1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    387348f1eb6a9915d572b5b6375053a4

    SHA1

    e32983bca4110ca36be997de8a3303f14cf916e5

    SHA256

    b0947d24a7b47b35ab4d98a265d372f9f725728febae4d2b5dea159c68d0143b

    SHA512

    cc290296ffc2cb4a50051c276cb25e4e307030360e4df51b525a62ed0915490e596adad0d772c386f2b67a4604b63d42ed11076284add757f4fc8a776d857e5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c097f9c782e17b4f159a03011119a08a

    SHA1

    e9fa3ea1aa04b860a3ce99d91c631aaa90235132

    SHA256

    8ec8195d2bd469ff1a2bfad7220a962f13f55792e26e259e8629869f24696420

    SHA512

    585c666a6d5854a9c4fd8fa7932005e11293c3b0a55ec67af72d7b0864a186abf6ea15c81814ce1c056bdeceb92a0c790e076af7f3e9ddd12d04793964ba3b54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a452842690c5f2d3c3d1f65605bb8145

    SHA1

    604790deec14a50073dcc3035f61cdedf88c5976

    SHA256

    99e3aba38935fefba4d697db3fa4bb1dd7abc437d2118780f42343808108f530

    SHA512

    e8a5b790fb6d517819f81a31ee224c939bad1828315862265a16025b4a79e2e7c260eee79410c61342c7bc32d045596f1af521fec3ee37ebb69d15ea85f496f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aa3f0fd0b7bf411052396530463ea20c

    SHA1

    a029c8a67adef3b255d3ea26bee33249aee25bb6

    SHA256

    a5452b0f54e192aeaf201d396288bd2b1a7cc1044719f7ccef09f5ec5869a130

    SHA512

    0db410801b308a836a58b7c19fa12beb9c4dd5c958ef1dbabc14caaaa801d32b954b32e928ee1e32395beb57ef5160d68ae1b3cc24f07b8c46ae7e8a1cd9d8ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    89c7eeab1aa35445e9d731384284e6ec

    SHA1

    b38947be263ce99d7fa09a517cfa14bf71e82192

    SHA256

    7041e032dbc45c5bd959e48ff5a6ef55b33cb30fb255512eaac0530da01ebf3b

    SHA512

    66f23097913c8bb3ccfc11f1997d481be3d743aa74d20ea1704db4101fc7db74b3a88033a433fe555ecf18a8dc0cabe1996e81994a70a21bc0af57d5ed764a7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ea16b7078a97135c65f42b6a9b9f8e61

    SHA1

    be774d97e1f2bb14f68c0972d6538038a40f21be

    SHA256

    4c2ba248dfafba749e3c989e4b938c1c96e53492a61be9c8b32396f831fe195c

    SHA512

    93a1a714b744ad4c5051b23a8428ec78948f69428a0d67743cabf7255932ebaa779c4c80c49dafd57bb3d1cc1bd7803a1e468fca9d7713d9e2f2359687945397

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    24abce957108be46a88a62c0eec8c4cd

    SHA1

    82c0c6eed935bac6555cecf395626f917e11614f

    SHA256

    244f9be178be212ee659f8564ce3bc5d8660e9972dfe17d817db89d5d592586f

    SHA512

    d030c5a81dc75bb690f752b198d84cb690b012ffaaf6f1fa69153733ba672106053a7a242d1ff01bc11c928b4ea33b6f13204b4132dcde72e02c69ef882a05bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    497f2398f72cd910fab44e550bc19fc7

    SHA1

    90d5ee96d3174c7c903c0123bd4a1fbd32be0681

    SHA256

    d35d64a49847b0e4ce86a38073378b1a56d1dc306b476d1b9325df3555c2bc5a

    SHA512

    4afe79b266fd12fb037aa10c47673a4e48b8f4894269d9c6ac318b0fb66483da9a91b5493bbc62281ed9c5c21e56ccdf55f5505b211daaf8be8b515166dac778

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    31308f0e37955866b2c3e5ce99c27d74

    SHA1

    dcea72c691a6bf9b7d6a30aadf51b0d810d3d3d5

    SHA256

    b83eacfce744b4a992226f660a1c001328e0aa3b1db5d4d0fd6311aff5f26551

    SHA512

    15558f4af1609b8c31956a1d62bdb546cbc5bc8b16702038a7a3e92d9d79728747c3496ccadf3e969010f8bb1ab31a139f9d1cff242299af959b6e0b57b84601

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8825738d45936b71e973a430a860904b

    SHA1

    52c4e83f6b4a37685bff4c47f96f4df22f4660b0

    SHA256

    b387ca55fb185dda7aa698190b090eb54a5517212bdf28900cd5dc361317b300

    SHA512

    2f43f366f8ca28cc7936979fb9a00d9c0ac7a8d1e1deac0e9c7e19c64518fdbf4ecb7fb65ad58c2a56476bd8906e36ace46be4b181dc8bd2c216051532613382

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d42dd169a47248e2959c4aebd5749a50

    SHA1

    1e759a68e55ff632949c12a723597f4ea1d36eed

    SHA256

    b04eb0a8417d8d70fc8d848828ae250d0b07df5c791545bf44ad53ebd6b12313

    SHA512

    e4c3bb8cc2b0d5943c54479dcd48244bb5203e298a45ade176bc72d6288a16a8b9b14711934f125591ad8d1f8561bcf59e87a2595ebadcec84b1a50b9e2a37a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    604056cceba317ecbc3dc295161e4d06

    SHA1

    59f1517941c3f6cb491a6c92673cb943f9de973f

    SHA256

    fb79cb69399056df8692c5a2993473a7ba7a34efa3d11ddacec9700e988a9cad

    SHA512

    73fa5b17e7e4560f2f354989d9a2f04ac3d4b675704a2ac9ccfb834e871bd9fabd15311d91bc95292687c6456f3a236b88b7228ba0eb570f625078922bdc57e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1466018eea1b8ca161fe373fc7a3f6ec

    SHA1

    6b61a245c9a93cfecee1ba3ca0f688f651e16865

    SHA256

    1f95c9c8c2191d326da22d6e1212b4d8bd4dd0c638374856d5bb1e6069f59096

    SHA512

    2e9c9f0ec55ec4462f092436f05a70ab1fb24e4d1cb7322af47d8e534ef0ac4d470cbbb08069b8346920f50773c7a86379b3ccdcf60075d99d1f69cad308304b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d783094519f448bdc601d8768c5a1ce5

    SHA1

    0ef02f1cf2679d068a1d52d1d36a6996a986cf80

    SHA256

    999a154e21797fa3b95e139b462c5534b0656fe5f3166e023e88c1b70341e27e

    SHA512

    32e65074b89630868b3d8c074d839dd77baba903a0933a4d2fbc4aaa1d1449cba5d5cd5d86a5bdfbe0f3900496784ad54f49cf162f3b959fc72cc29e3ba9235c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6edd49e0f814850db1bc252e6ba3ee3c

    SHA1

    ae4cd3cbf254cffda1860f65bfb54c9d397a388d

    SHA256

    0fd9ca1db378a6b082a11c9327b93babe5b2e73d956a6cdb14288a1130eab0a4

    SHA512

    00c8c81b3640fcb1402887ce304380ab12cf0743887adde01825ede0e87a20fb5543ab33cb5179fffa823ab7bcdebccdf95fe8057b41f637deb29b8274326c46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bf9f08388a245b7308111a69aae66bba

    SHA1

    92a67522b8c10d648ba10cce7bc2ca4ab1b82b40

    SHA256

    38c17d5147edf6c55490224e66ba2f6ef34bb6abc53ed8518fc840c310660707

    SHA512

    f26d004f6cee3426fc89054fda39f1b88a3d0355b5aa141620d901669adc6b96df109f760e7e8b04947063eb3ee9d30f5d7d241ef7c81f19054e090d8fd7d61e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4f4bc5a49c2df975aad41f169daf74be

    SHA1

    7d317e2abb1ce2f3c230a1385a25347b2f26d2b7

    SHA256

    228691b3ac1d09b9e4d69a9fa2176b0a358ba2dc0103ae39dda0502bd7e34889

    SHA512

    9da53b3088627f708b5d74e3467800b4b95f3764d0643ca479ddc48a2dc95915f802b545e41783cff02f5f0765a7f74a453d7a258aad882792b769d82670f2cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6020bf036163a054a8517e28381632fe

    SHA1

    9fa2c35ba21920164b7afa12533e3506a583e0db

    SHA256

    c6dd0736475ab17f8a1d28ebc4f7a447b94e839dbb9fbc01be6e7b05c62ddeaf

    SHA512

    1044e658cc98f96dad684993913c4fb7f2ffb9de1a676262cf2f72b9d10440b5382045d7b4324069a43d6ae62d5bb750b48ede3df04ff1f5dae4a39d7a8ef55a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c0a23fa9e3d11336fed55a853065111d

    SHA1

    8d955dc8241bb4bbc84d66c8df53382b2ef2f66c

    SHA256

    ab5a5d48dce45977452cd6fceed10e563aadd62acc6aab31150d451ebccd30cc

    SHA512

    598c8ea0ff7731b46487cba96acf8bb7e492c3a82f4ca304a7139ffe5f6a6cb022d6cc37a4f4d192ac0f44c965e9a012b1f52f8896119fa1358fddfa5e368be8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b82ae29f315f44097e04a6880b20965f

    SHA1

    9bf1413a87e756b7c71f57e1d0dc24a47f9c0d14

    SHA256

    27d0df3707a495a4b370244d4e2dbc50dca2c4f2d10da5e5d4509bf591ff444e

    SHA512

    aa9e328b337094747c78426964a2cd8560213a81706d773ab1b2e14fe182dd3ecb0796d5afcb106dd68012b91d8ac4b0c57664f40b30d34192f043941be84dc1

  • C:\Users\Admin\AppData\Local\Temp\CabAA37.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAAD7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2120-8-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

    Filesize

    9.9MB

  • memory/2120-0-0x000007FEF5943000-0x000007FEF5944000-memory.dmp

    Filesize

    4KB

  • memory/2120-1-0x0000000000E40000-0x0000000000F60000-memory.dmp

    Filesize

    1.1MB

  • memory/2120-2-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

    Filesize

    9.9MB

  • memory/2120-3-0x0000000000490000-0x000000000049C000-memory.dmp

    Filesize

    48KB

  • memory/2120-4-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

    Filesize

    9.9MB

  • memory/2120-5-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

    Filesize

    9.9MB

  • memory/2120-7-0x000007FEF5943000-0x000007FEF5944000-memory.dmp

    Filesize

    4KB

  • memory/2120-9-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

    Filesize

    9.9MB