Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 21:24

General

  • Target

    ef46259a9729cecb041effaa244cd5f0N.exe

  • Size

    3.4MB

  • MD5

    ef46259a9729cecb041effaa244cd5f0

  • SHA1

    41eaf77cdbf529eb1cdb47ebc6bdf6e6aefd76f1

  • SHA256

    c384aa233a33f7a564f7d0011c381ccecfe92201fc7b17f7cfa38940ccc068e1

  • SHA512

    5dd3baffc40fb3004464563ab935ac0c159400895326ebbc83125a5959b4323d54448c36ab825ecae8a8cb4e7e5e542bee6f43c6798cbe210b57d8de4948fa9f

  • SSDEEP

    49152:Bdx56xYcIcuHcKAH2IgGXikE2I6wdD1weda4NVk4aZ2EqYI:Bd6x/IcuHcKAHfnEqwdDioa4Nilqx

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Drops file in Program Files directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef46259a9729cecb041effaa244cd5f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ef46259a9729cecb041effaa244cd5f0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2648
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2848
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2548
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:603141 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ea7b088fa5e2fadeb7a5c27bf6aabaa6

          SHA1

          f75be12a14a8b092b50840925b4c6b6da1372c9b

          SHA256

          8f809ee18fd08e6a663194fdf1fa5c3f1c36d7529ddcc911c76b6d8331782566

          SHA512

          64d3890ab4041ede08ae066672ead94c1bec8913968a2c44ce2348eb58aeffed64984d521d36a84ceeda4ea923a7b790df3651a210bb1583e37a54bd6474e408

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          978bf3bd2ec5929317b7186b390e6b00

          SHA1

          ad47aaee7994c20dd2eb283387960e3485a7621e

          SHA256

          274ac0471d2db69469f61874834fa231516dfb30ae7591e79137993612134ffa

          SHA512

          14ac010b933d2743c3b908af2e3ff63923c2efa6d4f0e6549e4d17f1f124ab5b4bb953b78adacf08aa7f036a3b37f5b84f1eeede92cae01e2e6ca9a3182eefa9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6f9a546f6cffabe30f28637e06782d04

          SHA1

          b9cdb20aacd058f322875b80ddefdce1ff9e1374

          SHA256

          5789bbf1a0350dbc5cbd285c39d139859b95cf0ae85ab98d968b48a9d59799ea

          SHA512

          8c3366393fe153b003a37d9cc4a7ecb15539bf927d3b123d6d2916f5767b3cd319c89494da0e2daacabaccd35466a26510ac90fadfca168e79bb26e9bb4f69a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          163633f3313a9e0f7c1c8919e6a146e9

          SHA1

          426b72cc85961e86e857410d263eeea5f8ec730d

          SHA256

          ac9138f6140b60d1655424b34f94241e98a78287fac51abab4ec8c0b40c9cd45

          SHA512

          ba79539974181f97e8b95f82a918b053d75a1a9d20f5c1642a7b84540ba21e948e59bffe4dc5cdb2fc6f798340976564b02411c532efa0cbacdecf756adfc6c8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d4160d40ff7fe66f5856a6da250e37b6

          SHA1

          9dfbff67d8f3e1c7f89bcaf5a08189d6a5b0667a

          SHA256

          ab39f634b5a7839f597f69d4b691355fed1f1e7d2f89384da856493da5a9e8eb

          SHA512

          d2131f6ebf939e772fc94daa714c0e1336771e5a247134d4370c8db737e9b9623874d756b548f7b1481dfbf0b54cfef496b933b2b3eb3c69002556f88350161f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97e994c0bf2f112c77452ec41503ba23

          SHA1

          cabcf1bcc55ba7ce1f6c7535fd5f04b8bc35a713

          SHA256

          d36fc23fbf05d19c8f406965de010a0323cb15157abede81a5e652ea47a23c1f

          SHA512

          1e3db32b589d09bc806944b17d443d45c4db1b3248e295c48ff62901b5d506a4ce3918da7aa48d5bf715cbc3cc5aff03b507770975d06f1e7d15da3ff33f1c1a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2086b1be0af4c9a52f73bf68f07e8106

          SHA1

          837949d552c06283d701252cb4e26c412f7218ee

          SHA256

          b7593f57b67b33b7741b1003d66b7bfdb6480504ececaf54e912788ddbbcfeb8

          SHA512

          330f0b448c8140f51c46049718a0ab8d1da3c5b0eeb926963436fc7d5d13b72cf72f6f3ec94c1a482165c2e7277341adf0273053ff399dacc6d5f9632080c602

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          de8a6d028991427b6ddd9282dd552921

          SHA1

          c4789a2c50ce7a1ae269ba30b98ceeb6e34b3b68

          SHA256

          501a0ed182b3ac7c29f13ef4f9dbba72a5d66c76eeb3ba0c1be1254e4f9bb8f4

          SHA512

          f5a52c038a3657ace7329cc9c9e9ef83632466f40b6748536446d3f2cc77148c12c3eeb2e19b5679e2cccaecd7e7c29b3e5f0382466a374b724c94bb7d21f0ff

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c09575c7bc243a75ca81ad8d624d6617

          SHA1

          20b73c41d432bb5942cd15d6370ec67e7918738e

          SHA256

          317ca756fce20ce8acb0975b8f0e218f2a5835338622e63a5bafeb59bda520bf

          SHA512

          09f0b4c6a283b6fe45ca81beec8804b9d851f2b3ced3e15f5b116ffdc2c1d7733f3ad3fb934fbd78a54543b2e5072a1e98a334723e09bd9a70fcde4a276aea7e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4da5a40594844de70d158e7d2a44edf5

          SHA1

          c16883d2148fb2c11d0323ccc0c95af9ebc7cac3

          SHA256

          9a0a1b04c5905669eeec1e42de152acc9d7d37413bb3219b94daba0a51e0448d

          SHA512

          de45981b132d49c0dbb93e035d387d8cb460385a6a6c48cc40fae5e878a040e5d71cf6cdbb2863c00546dfbe54ef5c988eea43ea0e982c588576c4fb9e435b4e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a508971c6e451eb9dfe3c6f98f764cf9

          SHA1

          e169a85333f1f3a10fde1885d19428117bafb6e7

          SHA256

          09b5dcf8bf5c6d92d910712cf3a313c1ca95098027cd687ccd42151aa8a38075

          SHA512

          0b256892cc80942308068e073fb09c1caeed46f0b936a265e5ab062a03218babbc35ae90fd51c12f1a94bf56c659bed1d4cde9daa19032307327a527bbfd7280

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JQ7VMQEC\bnGtDMBWK[1].js

          Filesize

          33KB

          MD5

          54285d7f26ed4bc84ba79113426dcecb

          SHA1

          17dc89efec5df34a280459ffc0e27cb8467045ab

          SHA256

          b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344

          SHA512

          88afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df

        • C:\Users\Admin\AppData\Local\Temp\CabB934.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarB9C4.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C6Z2SH6L.txt

          Filesize

          123B

          MD5

          87c11e64c581268e78931277dfa9cea4

          SHA1

          78b48e7016e0e33e0abdf751f9a6dc19955b7b5d

          SHA256

          97660cb13a187e40c1ebcf154bcbd75e8574474dfe25e17e5257e09ade90ddfb

          SHA512

          e2141ae14faa83c4049612fae8adf2f79a3b883c21a908c4eec7c4ad685c0b1b36e71b611f48347918c7660d5f2b6eaeeccc0d6fdc5c90fd955cfdee6eb9674a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XNRLIABN.txt

          Filesize

          107B

          MD5

          7d2def55ab4f2567849b2069814190b6

          SHA1

          a97974fe75e59d610346b709614cc627ae50ba0d

          SHA256

          a8ecaa09db03f53f33f3d5165cbbafb36513cbc329c1a3220e09422378b2c02f

          SHA512

          68befe29b1e63b49b7095401f38c05e4431ff4db4ecaaeb9889c4ed32a6ad6b500c7d13d3ce64f541ae60240dc1726ea764f21b83eda909ac045d8a3d5f5a170

        • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

          Filesize

          3.5MB

          MD5

          258d2a8b8119e0f5e1db8d95b0fd90e0

          SHA1

          c58bfb3262d5405a9822200b8f2a9a58287a6482

          SHA256

          37058b40d5f12bb73c8183e272526eb2eb68da0bd2c2def490661ce006b94c92

          SHA512

          826712849fdd340a7673e981af0158802d2fde008b09fe4e51585faf29070a498544cc14b1a65a53d1d686a8f02fb3c2232be6fcdc1acdd0a048c18e29e1ad72

        • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

          Filesize

          3.4MB

          MD5

          88766757cea9ba75ade0a31354a20a88

          SHA1

          c9d995597f61dea123c17fe40c91da0933d3e7e8

          SHA256

          18c2c9a46b3bee8abfc36cd9215769993353b8bd60d90dbb8613858b857f04d8

          SHA512

          b8bc5d2bef4c0319ee48f3208e50b2f730b74bf68602e45012af006268f3317f0a02c4d9ad8a4867d68865c01476d6b70651f0373b54b47ffa0c22e0f5894ecc

        • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

          Filesize

          3.4MB

          MD5

          0c6423e2cc8a90e44613bdc0bb7fe351

          SHA1

          c00676dad42de7c44e4e5dd8973f220f4bacf5d3

          SHA256

          b1706195625904bbbb9274e82e41528b4d77feeb4b68a09e871c211f61ca0bc8

          SHA512

          db9d4434836e564b69169d2f0ceebec509c9d82b40461e05cd129129a707ab2819a3765b568c535a69e1e9f668ffb644056bf23565597f90196ecc368124b84e

        • memory/2060-542-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-539-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-75-0x0000000004A20000-0x00000000053FF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-76-0x0000000002970000-0x0000000002972000-memory.dmp

          Filesize

          8KB

        • memory/2060-1000-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-72-0x0000000004A20000-0x00000000053FF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-984-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-983-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-30-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-40-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-32-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2060-39-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-543-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-527-0x0000000004A20000-0x00000000053FF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-525-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-540-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-538-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2060-73-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-74-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-526-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-42-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-529-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-41-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-31-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2548-50-0x0000000001140000-0x0000000001142000-memory.dmp

          Filesize

          8KB

        • memory/2648-96-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-38-0x00000000052A0000-0x0000000005C7F000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-24-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

          Filesize

          3.8MB

        • memory/2692-25-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-2-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2692-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

          Filesize

          3.8MB

        • memory/2692-29-0x00000000052A0000-0x0000000005C7F000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-0-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-92-0x0000000000400000-0x0000000000DDF000-memory.dmp

          Filesize

          9.9MB