Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 16:16

General

  • Target

    $TEMPImg/PazeraToolbar.exe

  • Size

    2.8MB

  • MD5

    4d14c69f86a74fc25ad116c38f8f05f9

  • SHA1

    bf8399d5f22aec7e4db7b4c385591ed5d42e71d0

  • SHA256

    db3119182761d71fe962e662aaff8aba64121130f3f1d39ac548020f26deec77

  • SHA512

    2f4acf84eb9e588ebe7a1c4731a472c0664f280982f90ec104c04021fbf6e9fc1c4708ce639fb1433ea014954ed24cd79fa94a5d3617e13b8b2e2058cac7a4dc

  • SSDEEP

    49152:qKmU/FmbvQyw+Lx8GtekgJV2cEraOdDJLQDwydRm0qw9d/YDTn3UOesiX9iYvmEd:JmUoU+LSGtYJVqraOb5yds0tf0EOevXT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMPImg\PazeraToolbar.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMPImg\PazeraToolbar.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso2D39.tmp\ioSpecial.ini

    Filesize

    735B

    MD5

    020a4e621d678e6fa67b03935e39fece

    SHA1

    325d506d247b6751233bc699adb5ee49012ece41

    SHA256

    9bbe0f48fd44097617e681f02b07f33e02b4db48ada3ce397e55d898d5a426e5

    SHA512

    bc4f488507c5e719e0041f1894577c38e4e799e07bde836b6f789c439142e539990fa356614e07e1fd789569709e409ae6b306270ccda1680b2e46ff0cc2a0a2

  • \Users\Admin\AppData\Local\Temp\nso2D39.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    1d5c649dde35003a618b9679d5d71b92

    SHA1

    0409bbab3ab34f8c01289cdd847b4d1a32d05b18

    SHA256

    0f4d3cee24e3f310fa804983c931d3628613988a24f0be7854f63a9309b8e45f

    SHA512

    b432ebcc52905662d61a3f17e08e209a3f9d836a9071b3b5e80070af7ebcf34cf66c44426dda041c2a258fda4787e5692e2b35acbcd73288fb84fe3c977bbfd9

  • \Users\Admin\AppData\Local\Temp\nso2D39.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    eaf5036ef8e7fbdfa76d42c18233764f

    SHA1

    acd9f46c0500b00648933c4a172ef258ec64a1f3

    SHA256

    74a4283da525512b7fa14d40cafd905e63a8c2a3c9faca4d0605ad71f1a05a7d

    SHA512

    93d3e698c5d40f28c9d899f95f5b8ae60eceb8e96e57000ed458b9bffadcc98616aeadd4d6b930f3f91bd2a822681ef284dfc0eda6ae776ba1b7cc6ff87704ef