Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 03:47

General

  • Target

    F2FMedia.exe

  • Size

    2.2MB

  • MD5

    0c516804417525905228919153fa6b58

  • SHA1

    9bd55968e5a1a3431072907d2ba38ea6ab2fb906

  • SHA256

    33d999338da4b3bb2b3a5c19eb2525fa079e4b9cdcfb0eb133927107330213a0

  • SHA512

    d2f0954d81ed819cc13e89f49f0aad258c3f9f3ec7857738f91b3e0a55e7fc2c96c10bf885f76d92f8c5db028c3aac55fcf3a8eda8bf009ec61feca1300f10d8

  • SSDEEP

    49152:NRrv2yECBq+UIEtjuNea7W15/hlMDvHOYrbYUviXQ:NRz2TYq/pta7wJlMDvvQUvsQ

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F2FMedia.exe
    "C:\Users\Admin\AppData\Local\Temp\F2FMedia.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F59A01A8B782D93EA6991BC172CEFFB1

          Filesize

          867B

          MD5

          c5dfb849ca051355ee2dba1ac33eb028

          SHA1

          d69b561148f01c77c54578c10926df5b856976ad

          SHA256

          cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b

          SHA512

          88289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          245000a5eeddc8f53167b51755c391a5

          SHA1

          60ebca23de25d7fb5a2e424f99260264b2f0421d

          SHA256

          1e976f917dd2e0076af2709b2454d3909d3d42628e9e9d1cac7be1d79c0bb09a

          SHA512

          c82d552843018777e2d71a7ff6f32f037fe81666866c0534c716e8056b433305e8f02ecf711fb84015f2718d21f34d42ae2f1c36644eea7c72171e28a14f778e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1

          Filesize

          242B

          MD5

          e67a081f02d151a247ce508f76d775ec

          SHA1

          cdb3d333552202704c39e0f8840f025868427839

          SHA256

          0420aec89a0dd1957ada0a66dc7ffff9ce4531667cfffcb1bd7a9a16860253f2

          SHA512

          6831abfac085ef26e6bfa2f2f86c60e12f4ceb26e360eb7f739732fa8a87b22a0803bdca8666f50d0145812f9652a5a5053ccb95e7e852cecac30b29c299406e

        • C:\Users\Admin\AppData\Local\Temp\CabE091.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarE140.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1952-206-0x0000000000400000-0x000000000063C000-memory.dmp

          Filesize

          2.2MB

        • memory/1952-207-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1952-0-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1952-432-0x0000000000400000-0x000000000063C000-memory.dmp

          Filesize

          2.2MB

        • memory/1952-716-0x0000000000400000-0x000000000063C000-memory.dmp

          Filesize

          2.2MB

        • memory/1952-1122-0x0000000000400000-0x000000000063C000-memory.dmp

          Filesize

          2.2MB

        • memory/1952-1472-0x0000000000400000-0x000000000063C000-memory.dmp

          Filesize

          2.2MB

        • memory/1952-1745-0x0000000000400000-0x000000000063C000-memory.dmp

          Filesize

          2.2MB