Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 10:49

General

  • Target

    73418b5720597583f954a3cbbf16ab00N.exe

  • Size

    1.5MB

  • MD5

    73418b5720597583f954a3cbbf16ab00

  • SHA1

    334afa9c2165e873c4094d7e32460f3db894d594

  • SHA256

    dcf667e3c221f29a0d5c0fd487ba5b096de02fe2d9a6a5d27a9c35cb0422800c

  • SHA512

    911c44676ad1e7458e706fd6fe905df9e5659499cac6e4417670d318f6748a584c9603cc75a57d428a455762b143538f6f0ab1a6d279c9f696891dd35f0a3b6c

  • SSDEEP

    24576:WhMkxlRSaiPDi3qs3J4uNcmb607P4zwqAgePKOk7331:9kkP+h5tcmmkRk73F

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe
    "C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00n.exe
      "C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00n.exe" C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\73418b5720597583f954a3cbbf16ab00N.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2704
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:865284 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    1.5MB

    MD5

    53b33fcbed17dbdc238d238446bfd9e9

    SHA1

    a30c6f44f41f3187d52655d58fcb56f8ee4e07cf

    SHA256

    53e8600993b7ddbe1fc020f31679bb37902aa1a821715a3ee760d5d89fa2a28e

    SHA512

    1a6522c1e2698bcc0b62bcda253517e6ccfe1a0b0660000501a31050299b4be6a53e833bbc7af14ab7b92eea90ceea6b95d122cd082a8d5caf73d0fa65665cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8502bb3d23fc3121d95c0b5ee9f46929

    SHA1

    3a30cd1dff8c637123a21da3e9bfec8bc388661a

    SHA256

    1f034ba3b5ea9c6096f1276c76a0c2024b02b097c5a83554de9b3997f7998260

    SHA512

    ecd249f9639ce9f5dd9f451de954e612736ecd8f7c8cbf1f61bf4e3e6bd88af454c0c4cb59dfc6bd78dd05d57c1c8bc3b7d735f99e9dd08b53844a1996dc1d31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab26c33b811713664ca4720666a1e0cf

    SHA1

    1f05428a249b10eec46cb7e4a3cfcf245c25ce31

    SHA256

    10c61559a37e1f06df8764ba25773c5d40f8fcbbfe839894f8911c6c385cb16c

    SHA512

    48afdb58807a24637a953cf8fd19f64015b8ae075986c5afaefb697d0335184c404976ad9f023106569f1e47cbc1468cd26c5a7064de05e1843ec7473d985d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08ab1156071f15377e73ac39cb6bfda3

    SHA1

    4c11469739c0daafc116fb6499caecde9e2c5390

    SHA256

    b7d3d9c9cc4650a8e814ae41a53b941b2674ff9466d9ac9bf16b6f1722edf464

    SHA512

    3afda22d638aa0139bbb10330913d87706f557885a6d19bf1cf6582cf89aabbcb1daaafdb9a5ce2aa1ae14c8562f5c7177556eb8db9c477676d7c698905ec274

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2de3b881d3447967374c25effba0516a

    SHA1

    f83da891ad92132bac7971acf54894ef238756d5

    SHA256

    102389f5f9d54eab7fcd901e8a0497884387570cdc89b233595ec13942114e96

    SHA512

    88f497ab039834cbcbeb4a766a6d5ed92b52ccc524f8c0818331df04c05f69ac19b57dfa2bb0bfa9519d3afb5df242c4884d5b8d65653ef251998967004f3aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a60867472de55ae20bf0f5187c37f64d

    SHA1

    8f2d9a5d18c3ed6c9bdfa9e30a4fc8718416fcdf

    SHA256

    5b638c97fce393434b58cfb2c47a0c3a324072d0d6db23845b238e4c826dc5a0

    SHA512

    7d3c62e874c244c09a2e9103964439057d59abd2fe9ecaed72ef668c51dcb23b30b67df431f9dec190c74831dca7c6d1495c61d371a2d5532959f46e2582a06e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab17a6f7be0872bde9c43598b975d4f7

    SHA1

    77fd42796908ae80405196c08c508d6573492c0d

    SHA256

    85bcb0dfb3dd7f61db9f442990657aec55313afb2d419a0eb8da42e7994d0ea3

    SHA512

    a165f9ae1da9e16c3b7d167f5134e0687dd6c274031bdc580bbb6c6e252adee804daa67711d42a5106ba2ef9740dadfdd21d057b9762b30dcc30820c9c7e72c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f02c8341f21f59263f082ac3b7f92c15

    SHA1

    81af3e32857f85446bea0a1f35e9a3e719ecec57

    SHA256

    51636f8d6da26d5654493c85293f1be6478dc54c68f019f66e0bcc3a2f0ee418

    SHA512

    b11b4ffc9015eb421c64703df912142227418a41ac032c801ce45f97242a5e06fca8c1f6e5d0bd0b00e78e030da066390417c5bcaac0b24c6739a196f32bca49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    275b6c07eae42026fbc9ef030fd8862d

    SHA1

    a2f0e6c590b1428075cf226e775f09318e431d0a

    SHA256

    f43856665e9f31ba06ef4312e4824036bd2c0504c6e653ea2a389353feb2e515

    SHA512

    b672f39349c471d85c654142d0355fdbb6eb9ffe8c992484284f6321e25afd3be8c525b949496f63c7d38494a6c228d29fde7fba000285fdc97c404ee7341269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    497ab3aaf2be665f7fd36ac8dfd8a9c8

    SHA1

    6e336bbaf004380fde09f38712f0d7dcc7002feb

    SHA256

    29c8b7011c6cf1daaf2dcc823573e686505b99eea77b34d917785f53a830566c

    SHA512

    03ff0b5bca4b6758c5c1c275d5b4bde50ecf802f5878f4693bbc7ce8d5680b2ac4b63d6e04183f7fc8d6ee02d9ee9adc8c1fcca7a5080f59bef529cdfafce9bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    889957686087fbc7bdca551e72b5a692

    SHA1

    242daabe2c814bd4f3411d2b146a324ec21cc86a

    SHA256

    e86f7aa441faaf88f3fbfec418af1919ce6cbe69ea0fe9634f14e12bcfa03c9d

    SHA512

    f4237456b7012cc571262f94a6bc1ce4b307ee1094c5c6f6fe887e222e1a7825141439f4f398691fa88fca0edc6bd13f9702f8157e84719e7710754ee165a63a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d5dc5ac9e7ed024ea5d0ebfcf3b6fd3

    SHA1

    37c0f2b2ae54e87e15c139e762e81949280435f4

    SHA256

    1d58ac58734cc1cee26351c9d5c4520860956d8fe3904c209ccd431e5ca5c8c3

    SHA512

    4f95dfb6d19c9d362fee59841f465656bd25d17da2f5a953d5417bdad8d2dca8c304f42841b086abb0f8d693df6a73c462eabe7654ceab8c4c7fa728c4f91a81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56c02cc41a51996cf44bd8f11b198365

    SHA1

    e40973d172452f1daacfb70fcbcee02bde8100f2

    SHA256

    f48393abd31aeca0a13ab4b5505c19d65fd509db329fa410cb15bad22a554f1f

    SHA512

    c1852566f3667cccd9c3b8cda431f4eec1ea98c709dba1e8799e1c600952fcbce2feb5b1fffd1b7fe35ea200615e5050733388e5d63d74dade336b1590c06400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4654eed12993b798a61d1938998b77

    SHA1

    d05d74c905b07d591e028dc239d5d354cb54700f

    SHA256

    db718df2129064de281fa91155cf448f1464005aa5e0f73faa540871a8602c48

    SHA512

    9873bd5b090e8c46e0f1cdd41624e10069b70167931add4cd7de0c4444ab9002feae35cc31dec639dc66a799b19e88e1ae880990549174ec2ea3fbd98b233731

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    137176da32e34c91531a958c6b11ca59

    SHA1

    226b54ce1d5f9ed6eef0a353a427aa8b7ff30a0e

    SHA256

    bca958d2e77dffa4a2f57c1ad1b53429e286cf56037ddb9810bbc5b448fe7c2a

    SHA512

    4012a486d08255e14e22849451ff43f2d2098e99ca49c23e876ef0a703a3ea68edd744615d0b16af356b3ef37c2ae751245a9a73f52869ceffed0010d3505fef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42a3fdb87ce2b39282739fada21e2396

    SHA1

    20d3015a52404838d5ae40c3c66b4a3f055287fd

    SHA256

    dd5687cc6002a1dd5ce5772572a8b51830437c16054e7d1b6fdb581289d7e92e

    SHA512

    af757f8c4aa46d328c90311f845c830f50aa3f856ea580f79f6302f1c386c4d00b0347bb16e57a21a74cfbf26ef1d19e4d20dafc77218fd555882c10a0094fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    487ea4a9edde447be5a6b49e8b12c0a6

    SHA1

    e8c6dc4c42178a2fda93db432009e3f543c17e2f

    SHA256

    3b3ae7fbb17c5784e76adbe6d84240dbe07d0cb6ed6dce19fdcd0e232cfe2b6b

    SHA512

    20ea51a28adf2ab5ed9237783f27789ec3a4e6a8f378141d83ba48a4813b74a35656783fc94c19eb8630314d419e653280ed27465a5540ca36b89fd8d101ff3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eb65affaab018419b2919e86a149934

    SHA1

    3e79981d2a22ecf419629ec99c227983d902d2f6

    SHA256

    41dadcd74f406cf1439407950998930867af36306075f1474556b2f6ea880a5d

    SHA512

    4799146ba0044770997492e9e7bb92ae86a659cf842784d93eabe7eee93d784e54486617631a39e02069ffd93e802f7139121a6e2106517205ce4a56efd52c5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    237a4e3d97c4367f27a02a98a154e640

    SHA1

    b0afac506479cb6bc6dcff14ffc6eb2a060a21fe

    SHA256

    e469967480193c4b5bfd857d02ff7cd5e48396c50f3c0d444568a366800f199d

    SHA512

    6c01ff07060cb11a1e8552723d20d1de0b514e7590dfc6268e9513f0014261715c2940e5ca4caf63bc7b33e6a930f8f8d594d3e46d3fd4c1c5ebd1c34acf4375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7868f4104c04aa331f56ad7d79827f29

    SHA1

    a54aa4adc9c7d5a84688c7135210e04ebfd8c55a

    SHA256

    c19f5c6b1395fbd07ea0969dac2e707361a0bbbc467aa670ddfdcb3bdcb78f4f

    SHA512

    3279638a1d87ee53e8b56e2d64636904b02862304ba31a202e83398658ff6e57b100c42548aa78d7dca3195e9a537e47bb1c2994803986892f49f9875215526f

  • C:\Users\Admin\AppData\Local\Temp\Cab7F70.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar802E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Program Files (x86)\Adobe\acrotray.exe

    Filesize

    1.5MB

    MD5

    c4696df0939a61825913ec9eef97f379

    SHA1

    80f64b0df2f44c9e071eede288b4980c51a2a929

    SHA256

    3b2f6967421a2dcdfc8661409b6a1b9051ec09fc8a80d73b19fec3d1e7ee6f48

    SHA512

    71a67cee37081778bd35a787871f555728b6be27bef6374fc7a02d1c68b81544a81b84b90eda8caca5a79e48a0a0427e851658d1d10111c25b0ddcd0a6e54da2

  • memory/2452-38-0x00000000007F0000-0x00000000007F2000-memory.dmp

    Filesize

    8KB

  • memory/2452-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB