Analysis

  • max time kernel
    137s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 03:28

General

  • Target

    NanoCore 1.2.2.0_Fixed_Cracked By Alcatraz3222/ClientPlugin.xml

  • Size

    9KB

  • MD5

    5d0381a56563b1ca8928e3cf087f1625

  • SHA1

    9c9f15ec3bf3f91fae6f327df558d335f790ce3b

  • SHA256

    0497b92461c2a9ce3101d9397fb3079f60979164336a16653d282273d3085bcc

  • SHA512

    594de3e1313255902524d11b3d7a89d35b2db2713d01f7e725cecc5959227f18ca856059932b809be420bebd478199d48303a71b66fc3e48d835dcac133d3d04

  • SSDEEP

    192:E5cL6liTydwvbFO+y2dbEBhVR6SHaP0sJjpCZUV1:ocLBeKw+y/BfASHo0uF7j

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Fixed_Cracked By Alcatraz3222\ClientPlugin.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7c7f87667fdc3eaa3155a36851ff370

    SHA1

    0afb82ea08f089e65c74f926a9493120c0d8d969

    SHA256

    6e31a76289e914fc8a3a45222f48335383e027f19590c4cea4060eb160fe96dc

    SHA512

    4ed82610914567b22dea39dbfb1a4915f9561fce1bf3a92d346d4ec233383bae141bde7c1ff61caebad537c150771aac64281ae7ab834ad8f415511be888c841

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a5c046ee07f7d2d68e8e75e18ef43a9

    SHA1

    b5b9d90875ce3d93674957849bb241c72bd5e4ce

    SHA256

    2972cb521cd50e97b04b6179a613d819ccf242feeb6ea4beb5a744a582122064

    SHA512

    176df6407e626917d8f0b7186eda9ce8061662c42ff826f8fa0898eb1b98bbc9b94db983b35a3172522dbe3cd5b4151a5f7baee7198b7b03e6836ce00801cfc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6886be79b8af8209558541c7304d177

    SHA1

    612c4fa8193c6e73f1b544ecde1bfc5e33b73d97

    SHA256

    65cfa7e6b90b51936bc40892f01a5ae5291550c69a710686eb19228d15294941

    SHA512

    f4ea4213dd93226dae9070c5f5c73dd605786d4546e9945e351b84f16e6374506dda0aba12a34761242d43434d8936a388204a611a1c9a2e7f881e8052442d60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f520116d1cc665518329226e7c21b705

    SHA1

    26eae553efad1ea348034f8c2e5a5f21fb734bbf

    SHA256

    b6164557bc99ee86dc6371e11eac72f87790a3571840a6659321130493953857

    SHA512

    c8c3c980515e118156da805931b46fca3a587dedf9a99565e080c954dc5c6ade93ae404c8e568742d8a2f5c0ff8259b6bc5389dcebaa3c0dfc4e5e4f48bec132

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d3d23691315e0db6dffcc61323da424

    SHA1

    ac53e79533e634208084c9f9506f5348f8ee5083

    SHA256

    4905e667fe0df434dd7c642f029eee0fbacc74780dda696f0413fc61db8d0265

    SHA512

    a8a4451b1ff2b121ccedab32e7fca9a0aa250b7bcb36b224f31986a125cf843e68d5a59379add9a3cb78b5f93738892ebf1f19d60660ddf809ce5739bf50ac73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffb0fe73aa0894b428bab94aeee82d69

    SHA1

    c1f5bd848f74ec3d5ec9e7d49ccec8e7a42c23e9

    SHA256

    94d249d7fa8c8d18c9bbedf4685386fcf0f8ba70cbd37fcb57827114f6a98013

    SHA512

    2fc0d7aa4c9ca59b33d679fcd9b9988d7b68eefc6dc1ae8a550239b40958582690e5f137e6c9e76c88cd939d5ba5708153e812bb5ce5cd6f91033aaf87373680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ee9f15eb61eed379bf49a16b4c6b3b1

    SHA1

    e01577d7a7597a48e5867e0b4eeb126401ab0b52

    SHA256

    b0ec2d0ad6e75f3d534505cfb0bcf74c61f34775efe66e26731fdecb3277d52f

    SHA512

    bfdb2c944379167edddfc9cded28d63d8fb4487d8ff8bf20214a8a777f7d92467407a242b168762eac53eb2a822f3ce54573fd2ddd0d3b2cea6896a8c7e1f278

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3939227a6c95d77d30b67e6b3fd1d04a

    SHA1

    ac8f11e1a71d7e5434e19963ef6f9af8023b43c5

    SHA256

    d8e236d0cfc76a58af4ad5933d30fbef3ae22d4c82f05b329c8f845e9c23a40f

    SHA512

    318f00c48d9d350d6efd22ceb29f5ba2f5e42ae0e87546c998e6a945f1bc627516fcc4658b5af5eb3b3924693ca1514e7ecdafa1e9604ebf1167def2d07f2db5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eea58aca5a416d90eaa91956c6ddfd71

    SHA1

    68808eb962b247ab80a8454ede4e462f44063d06

    SHA256

    94ba55cf873d71bdd40e7687bb323428648cf23c5569ca028934564eda39730f

    SHA512

    8d090e857de5a981303b1d490ed50ca8c51402201b4b5104af0ce834cc71632a3b3c6d57527b49ed541cc6dcbbc815a06825c6fadbae7284d9a34375d81e4426

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    924a6510074d1e8f610da85b18e9bc30

    SHA1

    14087f6d3c0667ae7f34b79c583ea2a9f62e5cb6

    SHA256

    4e8089715c58b69bb23f8c5ca8efaa39700cc5d52b27bf7175fa2adc074bf729

    SHA512

    1694252cc6f0e8409c2e6c94efe6b10a054c28fb24a6ad4778e85dc895cb172ccb44866cf82fc266449ed26f7e4e276859fc655ef1f95d3c37789ce55a6e3647

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36d82d28a1431614a03a33f8f7de7538

    SHA1

    11f7d19830f9f14e024d12be6b029f56a1c233ae

    SHA256

    b5befb603ccc8e49dc5b603c90dce1e68329671b543c96019925dd2f86b3c72d

    SHA512

    c3a7e885c7dcc262080d42599b2957a79a015fd602ef64f71885249ce8bb08f1ef05c92ac74475bb06f225de18fbb94761dfe9abd1f44d882ae95ea5be506307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2615ec29572db9c70afed5cd58df5ac6

    SHA1

    8dedb3b46fd539c48104da3249fe2216975ee8be

    SHA256

    3032695e87b4635bc30108aa05c67bcbd4c6ba06e69bea0521284a5cc127bfae

    SHA512

    d73416925a61ff71bc003385d3d80b50116ca7802a765d66547befa0c3355daeb576871e3fdeff9b2f7e086785e222880cd4938dd33453565dc7dcc7575671bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc3ab51e983fa0e064293947b2f59ff8

    SHA1

    c06f901c1f9c1b0f618f4f981244500208324644

    SHA256

    62dce365fead1bed935c7c07d9c14966d04c489a103bab15a7eb7f4c5b774cf4

    SHA512

    f4ff5e25522a7a83bfc56932f01e50a1070d405cc2c3b2e4fd0463336e5438979c3dbb0c31cfca0f73caf90bcb2810f21a36ed46ffbad2e5be026cc8e5adad70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba69a28a0d8882b04da43e00eee227da

    SHA1

    a424b1524cc450fe7e5f07310e3bb0abf1c27ff1

    SHA256

    d4f4214db19bcab742e459a65630af6dc18885fb851cd483949684e83dc12424

    SHA512

    7c4fd85d47599fe518a230ccd931ee38c07420911b31b8f1d33eefa42ace69ebd798b6928d418937472e993734aed3c10fae0c3e1435471f2f229fed997cc2ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd0a54ead065a5d82b940aa30063fdef

    SHA1

    02143cc91beac7f83907d327fc2e9b5eead9dda0

    SHA256

    24d7c0721a2e90bdc9a4b0f1c1951437b5f6d7d6f1846dfe3264e3d0fff01120

    SHA512

    7fbf3c4592f298a1ba4581c409d74314ed4f4535d313025bc334e9361e7a11d37009c5ab09fcbeea87bf48904da2c714680dd0b302d7bf0df0f98bd056e73891

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8233da5db192efe06bbc26c9bedd1c82

    SHA1

    17212a393c17d6dce2afbd799642cab46491f722

    SHA256

    14962e8fb8d459f5d0c15707cb055a56d13528c7d64b6fee2c065fb6d9df04ba

    SHA512

    fedae728d573abd8f101c508a63db28d08044c2e5e0c3e18eb62ce43261f1e514ebc9b0a55fc7cc065a9361ec6c496acf7fc9f4db379635688f402679f4337b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa37def74c4aeded0335f85d0aadbc8

    SHA1

    553306b389bd107f1d9c5ad0ad0ad4e5b161138e

    SHA256

    f8568a290ff5796f6624dd912ca76765d397d53e2c6367eef5c4f8bcda239ada

    SHA512

    1b21ce06c074eaa6dc9b23a4977b4f9ed8194aef3b312540bc8f543d633919afd12ea1d44713f4af31922cf17f1e6f78581461d2a57dba148484e1c33a00b262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    615c867e686b56ab04e56ab0a0e9a4e3

    SHA1

    70f144a3b7ebf2bf0c533f5aae415d2e39b8129c

    SHA256

    a0b3d913d350348380fef74069305cf18f269d5837b6298ad150deb893055a70

    SHA512

    6f35c0036f079b00f469dbfd3c5fdf344814a3fcf86895c6c0da187d59e96214b31c3ee42a5e028c3fc51d75fe2c7f02c849286966ffbd08ee34289e5ca57fb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f6914c03ce259e2265ff9042b43f0a0

    SHA1

    a62a7513494ecb3d8e5a1a44b8440471a6cbcabe

    SHA256

    1b65a13d768cc41bcd6b3d9c12f62974109ae5e66d593f886989f00dd3118e7f

    SHA512

    3a6489d6436f87fd4ee7aa9d31c1ef6dc768e7e45da3fd19c189bc7f2d07dbd732fcf80ec75473fdcb7aac7786618d5d3549088d69d019c33093c5c21f226d9a

  • C:\Users\Admin\AppData\Local\Temp\Cab2C9D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2D7C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b