Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 15:12

General

  • Target

    Honeywell_2023.3_M-0.exe

  • Size

    46.2MB

  • MD5

    3802a5b33067a06ccb33a613070479fd

  • SHA1

    98b728d169d7dd3d59b8ce2f2d6d11265dd9d1cf

  • SHA256

    5ef5935b0a5603fdd6a8c3eaf48bcafee4b7e63449b098595241c08a851677ac

  • SHA512

    c3216a15a637f75d95a9321f443fcf972a3e99ab48e4c43e54b8e9e7b983dcc988ee6dbdc2d1289812b7ca3455d78a41f48eec273dffcef645bdb2688f1b4953

  • SSDEEP

    786432:5aAtof5Kv9YAcOOHibpUuaGrTGr4NOwkrET5aObmo1bSjNZIV3UGb3OXEJh:CKeVOwiWHeTQ/65afNZIV3U43Oc

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Honeywell_2023.3_M-0.exe
    "C:\Users\Admin\AppData\Local\Temp\Honeywell_2023.3_M-0.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\DP_3E58.tmp\__ExtractWizard.exe
      __ExtractWizard.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1728
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Honeywell\InterDriver\Installation_Instructions.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Honeywell\InterDriver\Installation_Instructions.html

    Filesize

    17KB

    MD5

    03cf8b630ab78d2379fa5b618da1d8ee

    SHA1

    90e01e7a006e739fae03c4db8f3144604cf301a8

    SHA256

    75088216f59fc966ae98104dad4c95c6b2c8966a7ad93ec9e112db065a19b00d

    SHA512

    4094a89d6ba8b35745e3acfa20e4a2e118deb284469681e2f6f3d1ae0129491225f5876585f2d2c4984185a9aa52b08369d7ad0977507ba6bf9565e214aab190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ad484ca97632ed841a2bf91cee579b

    SHA1

    658e0cf44a045645fbf2e31625060c17f88eb6be

    SHA256

    a0a91bc111f07c02307223a6a1f5f522621eea68bc9a31c776d99274d6c0391a

    SHA512

    89036440ae4603a44a5f603d1e524e87cd078d1c0eae3a7cdb40b60ad1fb5328da5349b3f4cc9900b0114926e5f688e32f19d583882e4b9970929a8219c8ffaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63e54167255169b8e1eefa35e1c777c4

    SHA1

    7a00d38d761681ef2b54a370b8ecd6cbf08dd2a0

    SHA256

    ccad6574fdd9896fa892140c8ff311b035b21449fbc41d8c1f9d6800f7ad116a

    SHA512

    e1b05c9dd388098554be20d3e0ab922696399ca48629d4f03bbe4377f65a4ecaea34e66103c573d7e639d887d66e48867d0e442998ef0eb805c8f0951b7c7cdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df758884d2af346d815c9fb716159d3a

    SHA1

    deaa83f67966e272c5beaabcb5c2219f06392186

    SHA256

    127045a9e8efd941e5ac275944f322007d6faa6a7aa03d672616c06c81089f37

    SHA512

    a2afb7750b3dc6f4b13db1a13d4de147e825da8b0683f4f3d75d721dd1068eeebb1fffd57a89a2704b960367417d8fc5f349cf97709856c4ec275614b23b6065

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fcb47a2972678f191da4ab173602a5d

    SHA1

    5104a46747113302afcf5e8a33385f31e0ce6894

    SHA256

    e7b9d0c5eb8c458a237ae6b9f061ec4aa352351f2eaea072eb398a224984eb7a

    SHA512

    3dd66777521654feeb4c1595f3d15e51c9a18fcde2635893c869f66a666cea0ac124c2eca0b398187b0adc19438d465d992fd9ceed75038bc519530010f87bac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d785bd978e86cba6c0bf61e1196da11

    SHA1

    83a556603f8e00f9c22fb73a8222fbc035b04435

    SHA256

    82ba9f0e4814b022e5edd18131024a96130245df7784278dc641706e964d1d36

    SHA512

    f400309c692ad5a685dee996fe1144c634ce275287d8c475f1b014e94f7bff91ca2e5d8cd0c7fcbe0e670440b28d8c42cf7e561761de571ffc7a0b5f8d299e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eea7632d9e18b24df3d83950620b715d

    SHA1

    c4bcacaa9c768512ba609b81638569bc905417a1

    SHA256

    2772511f2e3684ced3013bb720d62413c4a5ad346ff0cf4dccdbee095c56d213

    SHA512

    9e1ce6beb4aa10b0c4990090cc7c182b1d51f5a3cc78a373e05f54938ef3c158c78ec1ffeab0b666126e072a2add1bde24d2517d3e51ca9e0cb5ef1af8680c18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d288ffa04a9ce7d0390d6585086af90

    SHA1

    1575b1f0cfb98779ad2eee78e4cb08330ec38552

    SHA256

    98af800b3355633f6da05688e7e7164bedf5cfe0ae534794d76ddab4ecf5b46a

    SHA512

    0c8d78bb87c8e9af9aca49bede2da03e72fae4215eae860e6758b6c074aea621a4d027b2fd6d75390d36a89d971d33828d45786afa75f00fda0b09299b4e09fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cad0966b34a166983ee75845756c8cbd

    SHA1

    1b450314ec7d609a10415e4566ea84aa6115676b

    SHA256

    7985e24e030272a5959a955fa5eb786a1433ec18ca340d127c51e3cc26765c72

    SHA512

    7266d044b99119ecbca518acbf5ac3dc51bae156edbf4f3f84b83a476f20ca2e6a455960acd409338a4e616af7c9db679154528cc4640b154e3b3052e00edeac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ca320f28159b096ce91e374cc8d453e

    SHA1

    c8322aeb1c20d05b9bf03065afe5a753399dc977

    SHA256

    1e0ce9694c23e93e04b99d1f2c0ab0db620e54470eb6ed3612751bbc4af347d5

    SHA512

    8273085dde0953eb2435a95a5dc83d841bb544707775ac4150eecef76be98284b7bea9bfb871444c19b150fc17a428959e30d3cbe05f8893f6dcf242d4fb5a23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd1b53bcc0e9968d6ef844d19c345e93

    SHA1

    527f40b38ab05611151df30993e1a2fe8086af15

    SHA256

    dfbb28c316c5ccb9db91242e2982b07702e1a149f0b6896856f51f68c1a3ca4c

    SHA512

    a5972cd4f162aa176eed3618327f8b6eb7892aa515d8c95baeed86c5ae1742c675d64fda2f9848b82807f5339ddd1b333040f72fefe2c63c29f4887dba5c8b3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d95f0d0f180bb991700b03850aaba6c1

    SHA1

    d9d2472478740fdfa89351d5fa615b50723fb99c

    SHA256

    e2beb2f44de4c8b5a72f88310cb394aaec058709d16064e1f5f4dc9983b81230

    SHA512

    85e8d8a7635598cf8632b7e37db15af9cec33cd5ab3e5b8842da45def66596d006783b147ecad0521c388290117dda25b2b8b94215d503d0a440c2c84adc97bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17621e6339813851c555c99915a099c7

    SHA1

    f5bac3052d38504b4653bbcf3b4feab2fa6f028e

    SHA256

    af452bd276b85ebbf23ebdebcaa6dbfc9b18e3f86478e0871db6c8dc45eb4128

    SHA512

    3e25c2d70ef8fe6772545665b9eefa824d588adae80568c72436a0e317efac72f46c0b0d321a226b6d6cc8ce50160dd7509c90dde3f0ba787fb28801761e135f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d011cb2b137daf34655b84a5a821fbcf

    SHA1

    d4472340a0d98225d267534878d57467ffd6bd55

    SHA256

    b1c4ac649b43d97fb6e9396b9a99c409f7284fcc85f431622f60c285a7a3db05

    SHA512

    eebabf127ca176cb603cec0dd463aa7d85f22eb1cfa9f53299dad37a915e80d90863bd79b9d84b1eb79b8f4e8eaeee2a9de623bc60036d892ee84fdd6422a96f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26b7e5b66e25468d3b23dd604e37c841

    SHA1

    62c9a558cb354723abfca402b504aa3e4d6ef3f6

    SHA256

    a8e289f6c141fec2e4091075760488a954db29be97e3841d8da2aa39fd945206

    SHA512

    cea554795bb388c056f74152a2e4f0bcbc57e9b7c2d4689bcdd3a6c795c41e31af1ac1daafae190ec76a9439110cb7f874a5274110ada41ec4917a7cc831dc79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    939e89b7e391aae78bd10911b599d8f7

    SHA1

    b3ace3284bb3ee3b98eb0f9393c3dc48a09a69f9

    SHA256

    4d14d44995a8e25b8d130b0a88c8a5cdbc0e9df870d47182bb460fd20b1fd51d

    SHA512

    1bb23d8a732bd43a16c5dc776c985bb56b13dabd14a4ceefe14c6b18486a28a6bf1fe53e211a832c71b9f3ef61f1eec3d99ff7b4a917d344a5e07a4daee19db9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0616363e7eb38274d3ac4085ddee724

    SHA1

    ac39050840141d22c26f5462db42c29bcf4e7f91

    SHA256

    f98943f45baa267a89e5a5a85dfb35541f204bb544de40630161ac2197b2514b

    SHA512

    647d7b7cad3bcb65d44f81d2ed18f39727cfe0b71287631563b53ea156786eba3104a4594ba784eeeecb168e48a880757a257ff5513ac8aaa2ec10cd7689788e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1031a3ee7128163909fdc5f892194773

    SHA1

    3cde830377de6eab8d33ebb04e55bd106e739794

    SHA256

    1d2773b5aab1d464cd28d6488ba3a54572af44977a3f0d48299c33b47e5ef7d2

    SHA512

    d89967cd159d824d418801edf92e133fc8352279da085018e1146d814d82e931efbfa523c6be4dd9c1c1fad46ce1daec758def97c0fb35e771504c1ddc90eb8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61d945cb4d1a0f14c615c9945e7346e6

    SHA1

    a68975cabddcefea82b332fc0f82d93f3964d7ce

    SHA256

    7d899f989fef8dbd95cea36bd675d643588bfed93b5091a204fb9708076a0d7e

    SHA512

    ff525b7651a4e1b15da6986eac62e0de879c7473f347d90d0aa3d655aef0b7552e6c8323b103d7a86a27a4dd750246d95ff13dd87999a6c111ce588fe190176d

  • C:\Users\Admin\AppData\Local\Temp\Cab7755.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\DP_3E58.tmp\__ExtractWizard.ini

    Filesize

    249B

    MD5

    3820c0389a15aff50ae83d12b11075db

    SHA1

    f1c2a6b52f33ceb6916d2c1ee2c9ead427c0ddb1

    SHA256

    08ff6c2957e281894bd560bae92aa6f73cd93a05a886d78d0b8c663d657fc3d3

    SHA512

    f7fda7613c451cf65bbc6bddf941a437cf5d7c6c40c36cfd96f80e6544dca17f3d69ca5ff86785a95b94ee40349d318cf0e348c85c996e75d4e4d7b048a3edc5

  • C:\Users\Admin\AppData\Local\Temp\DP_3E58.tmp\__ExtractWizard.ini

    Filesize

    294B

    MD5

    1e30a78ca8feaa3a10db3c663e252bed

    SHA1

    d5ab5ed45044576f3aa34c0c3e8b6af4950664eb

    SHA256

    04755f553bfb7b5d8bb9f0c4f96bbb671ad75f9f9ea72dfb33ec0a517024ed77

    SHA512

    360cb78923820c6631258c58a6733f505f66fe84eb66eb007ced0b15366910f93a173db72281ae537019a4a421908ea81cc8f04b77d0f529043603ca40d7a9c5

  • C:\Users\Admin\AppData\Local\Temp\DP_3E58.tmp\__ExtractWizard[enu].dll

    Filesize

    37KB

    MD5

    90586eb1e95bd78e2f9d13c7e7a05240

    SHA1

    9c76d2c2ca25e22ebe30ecebc1ed8ca3d7fd21ba

    SHA256

    f7c7851704068db0b32f712af8202402a5324971d36833fdc714cabf8313bf07

    SHA512

    9d49b3c3ba8ad5136a20e37215d0645c5144dc60924ebd6ca74ef726fa099796c83bf8a4a08d39446c8abff5e6394945f873aad3beaea47599de9aeb09763f45

  • C:\Users\Admin\AppData\Local\Temp\DP_3E58.tmp\licINenu.rtf

    Filesize

    195KB

    MD5

    ab901db197657111ff3d6dba3f9418ee

    SHA1

    80904b82e4d37d2c0a622adfd6c06f3e72bb0842

    SHA256

    c428096e255882ba1823a2939f48b86938865981a8b4dc5a05f56cbb9baf0bbe

    SHA512

    36b1a555d541222898b6c8f1e794d582bf4522bc3453647cee1ef7c0c160c2809069245cee3241e6008746be092aa68b3689f8bfff6580e3467e60f88fc75f06

  • C:\Users\Admin\AppData\Local\Temp\Tar7803.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\DP_3E58.tmp\__ExtractWizard.exe

    Filesize

    411KB

    MD5

    c45b7e9b6e71f81b67f1077fc3089d5a

    SHA1

    6c3fa97500fe67629365699838e29a152523d6f1

    SHA256

    7fb3050259675d734d1b18b88c767216250d2b80dfef328edb62b53250187626

    SHA512

    36fa9fb22b78584ee06a9e89f6e1210999c6df76b8b81efa78cbd4b66a9b07fef938d2b551f3ebbdd209252d01d4f69f34ed9ae20aa6d7323f67996fe1ae748d