Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 21:39

General

  • Target

    6b8de6f9f7a5d8b0d84ad25eb4925a80N.exe

  • Size

    621KB

  • MD5

    6b8de6f9f7a5d8b0d84ad25eb4925a80

  • SHA1

    d39f2eeca2c0e2029639b6252d173eb7e3005584

  • SHA256

    282e7020d1a793c9ee6e34312a00552c11641bfd0bfc248b8df1b5fd6bbdc0b8

  • SHA512

    6328265bca5a84326aa86e78ba2eeb8a26718f836c6336531989f2e078668613081798f7e1d46100121d1368c40a042303fb28bfd38e9de0bbdbe55132f227f2

  • SSDEEP

    6144:1mSUslh44d5nngQFZpX3gP7vB9ap0txtu7oRM7MzIaXPAkfEIC+FDnxpEQ7oIr9B:1mLsla4bgWXA3KK0s+ygQi14B0tS

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b8de6f9f7a5d8b0d84ad25eb4925a80N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b8de6f9f7a5d8b0d84ad25eb4925a80N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1952
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1640
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2924
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1512
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2496
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2776
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:537606 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b29efb5f2563fb7283acc18305e0e62c

          SHA1

          cc14edea804b2b53316f054258a397a5935daf0b

          SHA256

          37dd6d91a1a6c867cd3723c9325923f169e0f6ab7a81bb10221f158e4fcd6560

          SHA512

          101263205bf793c2b00bdf3ec3a7d0427a03ec3486c282c200c7861df679ac8809eded4aeaeef681ff38645c12f76fd704d66ac99307371cc80c2537679a8fe2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c2029da59b19c20f5dc846769b9f118b

          SHA1

          6db1575e7968ad3d0a287a24947d68c7fe9007b6

          SHA256

          2f3364dc0f5c4eab9476d5a7eecd09a0e619ef764e1b9b063b79cde27178f843

          SHA512

          cc68514fbb10b4b796268cc635b22a4e327733e3f641e2911377156a4890da96435e923c9d48473024ee80cac97cc4a47f9c70857cde767852fba5d4b6a2f420

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bfb1407ae5e09e04e73fff716d75a041

          SHA1

          970cb8a5df79a5d08fcb42918f9e90d4ad7d948c

          SHA256

          951e5a977cf04df40e33c558f36f56a733d9bab7cc4fd4ce835f04d40f15e27c

          SHA512

          f3ac6c0b7806fd182956308ac9f5efab363fbccd82b8342db8a038d798d5660f6210cf1e461b33616090eec7a88465883fbfdc3c7b2468bbeeca2be1c57f8286

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d1df88045b9eb08dbc99b02bdf07705b

          SHA1

          41b2dc954888c9712e45571bfd32b136be5c14f0

          SHA256

          f7252a6fc2f011ef25f19f04fcbc769a9aa2a2210476b7ab10a3ad56e4737ddd

          SHA512

          d0bfb6f5a0d8b6737472af7435c7017459567c8c7d0cb33811d38dd8cc16502d7a766f5c4d3cb9ff7f43a7a003aa0aa8dde558e2f20a4afd3e5c7485350f4575

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          34b71ea7f83ddc13977c451f0b603624

          SHA1

          d7f8590a9bd40990060e099885f36eb559c47ebd

          SHA256

          5dad54bcdb58e0490cde240f1fcddc55ff958f574fbf14d0b9e9cfd0011e8550

          SHA512

          7373c95ca2bf713467aeb3d0743c35398dfc04b2b5c97ec3aeafb6df2b1c8c9b0327206da0c8cf6465093320cbdb7a0e809e616c6d1aeb0224c3875b5b143879

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          18de4a7e09e3bdb6c938e57b5beb5f48

          SHA1

          51b1a8d49f7f584c02b3b5059181639a1dfc87c6

          SHA256

          33fae202b546631d005f80916d3c32add2489ae1870492a363fdf40b903f056f

          SHA512

          6790b1f31e5e7e45402e982bb6251327894504d341d325a3eb28a1da5e855ef28c7b111310a221ce3c887056709845604851c20e80f6e964ee00d3417b1bdceb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b60b1048f8a2ddc818964b13ec29ea2b

          SHA1

          21e2dab4636c87561f20bc1091739c4b82e6bb0c

          SHA256

          c6a6e1cf97b4b563f27db3f3ec36b678cf8859636cdaed4ad7092af01bf752d9

          SHA512

          355c6c92cb7ea7ac0523c3cdc6afb71960e3e8d3ce89dae786f9bbfada6c38b21f399f2569906d4e337501e0fff1b7c0e4354005fcae838b104622bb61e72b8d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f4ceeba3156323cf87b747c9ef52d28b

          SHA1

          e05706fd89b3b92e3b008ff8397edfcdead51788

          SHA256

          8c273ce259ac8fc77a891d8b07aa5f4706272cd085b3d39b12d5c20d8c870a36

          SHA512

          296fc5227da64d4dd04d6d6878013899af4a8a4ea4de3d9c3616dc163d895ad29e90b9777a01c8f2db23982eed7bc99d8c2d9e3f18f221baae7ae3d40f1af536

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b79961cfe8531b46a108b92e57fa6209

          SHA1

          8901471545865728471af7df128ece7a94e59717

          SHA256

          377138bd667e575cda5ca671cd5b769e6180f35ad0271bf27a8905d78b452a15

          SHA512

          686d4d55c3c293d877ec31254518bf8f08c5a12b815272942f9966316258ea8390df374bfd8326fd533790f03d80844f663e25a773d837070ca6c1a01ccc7e60

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          89b3a3a69f21fb035f2f7d54c153893e

          SHA1

          b578e869a3af48c9ede66b3174c6d61d9d08eace

          SHA256

          81c215fb14a20e216840cc072cc78b6eda2abb00d7464361f75841a5c63c9d3a

          SHA512

          fcc564b5527ac0bbf390110ef5bfe33398825a6da3bb006bc03dd2f8fbd947071e02e5fefa7da25df49603498aa2fec5f45d1e7f198fd845f65e1fcbdb74324a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          72a9bcf447ab49b053e8a0240d718d0c

          SHA1

          f1a3219d87c7be95f7f8e1ca7d1dae57e4ad5c4e

          SHA256

          686cfad826901a3af7ac85837c127cabeccccb9f706291013182a6b67ecd44ac

          SHA512

          24e714dac98e33cbbf13f32f3b09b435184c3214ae1c521727ea77b7a5a5028c7a45c8621e1dbb43a0f5ff7fc0e5b92f92916cdae6ca15c9e82c92a5dac55495

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1a0009cc7688be85ff30c4d5c62de8fc

          SHA1

          2f3732c6cb14d078106583c83cd600a0170f3bfb

          SHA256

          1c151cb4c41d80d1b0db0f2f432fa548e01fb126e9a2d4f656fa332fce68c385

          SHA512

          e0d21fcf3c545b4617e19f9000fac78077d08fa06e8e94e290b1370eb3641656df396d5f29bc7883019186b08851a74d03d362b54b2150f82678abf0e356cb15

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e2cc8f095ce7c1c0775d72a10f518ddc

          SHA1

          81c99517c99534ffa2a54aa51448c0fb3c2f947c

          SHA256

          f967a4304ce96890dcd1801af773c173059da1fb6415ecdbc605aeb51cf742d3

          SHA512

          8e33704fba30c9a72354778191049b6db2e41e4f33a23b90bc3aa9cd703fcbab2bc68a0f3eb5846b3a0bfc6eb1570be84c63d4b49d8a2bec37c22e0d988e6275

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          437dc1d9b5b285c15728156cb10614c4

          SHA1

          0891ba2afe1d9d7a4e5ec82706c3c3dfedc0031f

          SHA256

          57a285eb27fec2b35586df6a2425a02034e9572ddcee79c4e7bb2473c41d2f64

          SHA512

          430dac4a205cf9002f2d9f9d1242d1bae07e515df1ed748c1d421cd98eede1f22bebe6c33e1dbac713966950d1dcb7d70d415d0f4f7fa5e36e72aa9edd1c4334

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0d7f430ba52eb6ceefd2fbf813459ded

          SHA1

          2cd641e722473aef98611b1d902fb6ff05edf115

          SHA256

          469375acf7e4eb8737140769bb8213a53026595c39ebf846559215c4744df494

          SHA512

          166a79d65e6095068fd52ef563eac0353b9213edcccf51aabf5da02e782e2216df011d2e44e58216d01280f21ec45b4e367a4973676f3aa805e4e6653973f9d2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a1acedb5a80d5d6bd2d487dad9b1b4c7

          SHA1

          6b01127a45d465df4bcbd7f4453a403080eb236f

          SHA256

          c0264c1191e1d389e6291bf9679e6b8a5980aab2d2eff3e9b14c91cbc87f19b5

          SHA512

          6b5a9c2b26375d0dbb1af5e537d49e180a1bbb78aaf754260f4b1e46ead1da8d499a5b94c3ee496aaa21304b1bd8400c0a79a4377384bb5f51e44bee7b724e8c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7616200e3aa610ade07fbf8362403e70

          SHA1

          9b311538d5707d096179a14abeeb7be5ea310c42

          SHA256

          457bfb7b88df741d90558f455090d9ae34191cbc9402b029cf07b6f0d9d2b7dd

          SHA512

          d99142691ed1edef3281279680a644eb5770de0fe45590f2fab16a4f9bd66b5d3a3f692cfd59f49ef830e321a4b1cc105b8df2889c84365fcaa78234fa7e5db0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          88563be2ec3779fed9dc2f1191044d8c

          SHA1

          e34f0727dbd863061d462b8b2c78504a68e5d829

          SHA256

          e36f4faf5743aae8379a63b9d3977df4071dacd7941910ff057dc8a6b2d45c0f

          SHA512

          f8cdeca98e90c04fd12b9bb92afe1dbace835d316b5e0f4dbff29e4d428354418a516313996006e5a6c6a22708260e95dbe859e09b6a2ab210ff8d56adc6bf82

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\bpBqFLctn[1].js

          Filesize

          33KB

          MD5

          54285d7f26ed4bc84ba79113426dcecb

          SHA1

          17dc89efec5df34a280459ffc0e27cb8467045ab

          SHA256

          b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344

          SHA512

          88afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df

        • C:\Users\Admin\AppData\Local\Temp\Cab399A.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar3A39.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

          Filesize

          628KB

          MD5

          a5dfb00d7183a32df6c831dc7aa4ead2

          SHA1

          1a31ff159d855a3e3d28116516f93dfc1e0a49b2

          SHA256

          9b165e78bb36fa7d60bb1019c96053fc27a8e2c61c8a286b60ef09cf0c15cd5f

          SHA512

          7bae08eb00d7e250758e88c5c174eda52131830e33c95637066fe296007652eaa6e0ab0f607f2af69714ee6588bb23e7f4cde83963c7bda5f3e805c6a11c873e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\450G4URN.txt

          Filesize

          123B

          MD5

          ec34f015b8c7f4e1115f90212e87ef60

          SHA1

          1d0fa416d5fd999e0092dc991adccd35e5403c3c

          SHA256

          5bb3e74e48b75072da60ae18b76734a75027e1cea0e05dd200664450412067dc

          SHA512

          67c2f5bdd994660e27fa807c0fb2c85fc8a80ba16183ca0a16dba95cc03f58c6f1dc75f8ae703842e4318711fecc30d2db6d7e840b6ecb2513707110a26e9627

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A7CZZWIM.txt

          Filesize

          123B

          MD5

          473c02e8be76e8f6fadcfeed9f477375

          SHA1

          ac5a951d322bc7368702117d9e8c0ab7c8c16933

          SHA256

          1a3ecb40ac8252e7601128462cb710bbf9ef1bdfa23ae37ea1e8ef9006e7323d

          SHA512

          2aad2692588190ff63e1d820546f59c49f75d4bddd34d90b596db505da01d79340f84dcb404bcf1f6f3efbd84972645eaa0e07b6311167e5718a74e4df148eb1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EKWO5DXY.txt

          Filesize

          123B

          MD5

          6c6a0506da80e00621b122b4cb089951

          SHA1

          75efed86c598bb1594827d541ea3bdad17007411

          SHA256

          4bd378425c655cc8b6d167b8ad2be421894e43d236f090f91b6495efff102000

          SHA512

          86a29b77c3634cdef41b67d920a8fb82fd176d567539e35c1275c1840228eedf483fc171a40ebf6235f9a5df6caeb728be4cae640119182180f77c28fe85fb1a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FTCXYFQV.txt

          Filesize

          107B

          MD5

          dee54027c07dfc1c2b7214da611ebd70

          SHA1

          33990133b6f2677916b84260ca1977788327e363

          SHA256

          cd71c4ee7a78d8fbdcc3e8adb43b85bc12ec10b0ffabab3dbf7f4ce1de32c035

          SHA512

          56e1bf1578265eb3777aea31c2771c9d034fefd7924c402ee785735211515c28d7003b4dcdf4aa3e37b06463ea355f48f6db68e5d564cbc08b63f6c3bc01ae84

        • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

          Filesize

          645KB

          MD5

          57bb3e9de656cb91386a4844aa056a8b

          SHA1

          b9c602bd2771988e70c93189b1fa846e4d698c62

          SHA256

          f5ca90c4d85a82ff561f48bfc90ab01b00b318134f7c78c5dd75da4b74524154

          SHA512

          3f9113f1390227975bfa17212f41f520bb0cf9f6bbe5412f199158af52c2e80441c50f8ebfec9d7c7b638841de17a594ddbae4db69cbb8e3e448e26ccce73a88

        • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

          Filesize

          645KB

          MD5

          4f6950ebc955456809cd3993b1ce0d1a

          SHA1

          0139dad6be7d3cf8ac6c8eac9ae3d4364cd4340c

          SHA256

          6dbd6068d8aec6839d95188847dbd69ecea91810ae32962c717b0394dc256b70

          SHA512

          7891bac7f3ab8e31678d710ce01469151b9e1824d6dc6d9a13c7dba69feb88badd6aef93e975bada45a589d8b1520a8840ae491372060f5ad29357be983fe861

        • memory/1640-22-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/1640-49-0x00000000003D0000-0x00000000003D2000-memory.dmp

          Filesize

          8KB

        • memory/1952-0-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2496-35-0x0000000000290000-0x0000000000292000-memory.dmp

          Filesize

          8KB