Analysis

  • max time kernel
    6s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 07:13

General

  • Target

    c36b7bca2e4ba584c2362438c44b31a0N.exe

  • Size

    340KB

  • MD5

    c36b7bca2e4ba584c2362438c44b31a0

  • SHA1

    0c3adedbb2772046dcbac46c58badac418d7198c

  • SHA256

    d478cf1a5a00f4831c25d32b240d5ce0cc406a45d144dbe29e4d463d7e574320

  • SHA512

    39ca7ef5df8835c80cfa7033f6ad4134ebaad665b758bea08febe7f0b8afcb9f422e76046adea2a1a4cbe85880a093d7ba7cd9877c1d45944c75e29f38ab17d8

  • SSDEEP

    6144:MRVQPKuV3eIY8uwJxuaIFtkxOd6HarTrjCP9sERagkL9:fKuV3eZwTZAUi663rWPzkR

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c36b7bca2e4ba584c2362438c44b31a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c36b7bca2e4ba584c2362438c44b31a0N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:900
    • C:\Users\Admin\AppData\Local\Temp\c36b7bca2e4ba584c2362438c44b31a0N.exe
      "C:\Users\Admin\AppData\Local\Temp\c36b7bca2e4ba584c2362438c44b31a0N.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\LKYFO.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Smapp" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2492
      • C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe
        "C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3036
        • C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe
          "C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:828
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2020
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14a3c52dd6a6eaa335ce55acbad30f47

    SHA1

    00ad6f0b262cbffccbf77924a8bd61a71f0d16a2

    SHA256

    bbaed3dd5c66b23fb28804f80ca7ac7559a7b2f6d7efcaf04824001423668f99

    SHA512

    85a929e4aeed5f6a116f774a20c2129090be2f4d4346be1dccdb4e2e202c6f2c904b84d1ffda81438836201da3cd76772c3334fc38e2e97d58d99fa9a659fd08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d384e6575ede7de666d9f3604ab787d3

    SHA1

    751ee8fd2d08af2e32a5d68e411a0ffc245d61d3

    SHA256

    2281527cf38aa233ac57aaf13c563e5a5ae2033cced666196d8a22a3ff679af6

    SHA512

    db96b1fffa51026e64d9daf049ea1e933aa27d1460487a4e363a61b1a9c52b6c45e220f1dd8b94faa7738ae88d937c539af3e01de8e59ce6eb16ce2fb746667b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf4b6e2df092081921b1928d1ae62495

    SHA1

    7fc66e0d8ae88f776a50d16850614dec2ec3459f

    SHA256

    3537a0ac00a8d0174f6efdee80a9eff6a3bd0af9aecf2e197aef35c5cb0fc07c

    SHA512

    a2540195eace6be5030bc99b78e4fa215c237e27e6c9fa97ab1c015c4afb2eb24028607120f7aa0147348922360cc50b6ee6ea2917bd3c9eade685f0505af657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abea38d2fbc296e594a471ed501ab98d

    SHA1

    1f4b401276c732dc69360671a767eeccbf5942bd

    SHA256

    56506161fdc995ae4d3d461a770836f98ce23b2e0add5471f4b2425b36507c16

    SHA512

    30ae6c92da77e11bdffe2362f093eb766a63bc04a91d19e04cbdbfd790591c62ab3e7e1d7e1591b064033aa4b182c76ce2ead5aff6a0d801b1b33d4e91f6229e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bae58b0fdcf1994f3a50aab665c55b45

    SHA1

    47d9d2983309b7df49e33fcd2a74678c4abd5ba8

    SHA256

    5ee6459b3a9522886a3d8f74671f63baf19227b421ef68f4bea16cb20fa2436b

    SHA512

    a1baee1677bcb4a84fb78760fd52cd3db6a50681cd614328ed76c8cbb719773ba395cdcbe3e75b3cfef0559fa62af624407778ded9f19c108b4e12fbfc50fcc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    043dfad25a2775be7d59ac66c0d49aa2

    SHA1

    94403ab0da9f889ca274c846e6386d83c1b7aa14

    SHA256

    1f2b1e1410da9f7c198669b8f5df7927d54cbda028c0842000da7071480c503e

    SHA512

    474e70e6d9ce84fae049795efe5b46a2b1bf28be772a72d324bf4f0257b869108292e2fb0b856c03376d39086953c5a9b38bbe00fa8b011d316a92d17ccc4d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7be1488c6856917ed53ceea7c09b3c4f

    SHA1

    f066a3e0f1a6c47e61b9ce25beace899c2d5ec4b

    SHA256

    a421bd304f2656236af0283714f77acf029c05f535ace68c4531059f328a7dc0

    SHA512

    3d63c7578fbf79e17dcee11a807289bddd54a8f0bd32fc4eeeef3c6adc51754a668eff8098617d16acb191926da171f2ad96213ba5e79eb8f0bb974f7ca42146

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c20b4be563d91873b506a6bd165113da

    SHA1

    9aa3c1a99b0115c2e09145253b5427e4462729a7

    SHA256

    340f2bcc44bbb5ded72fd32611cb2968d5ed6ec550a61c7bacd78643aa033f36

    SHA512

    58a7fedaf6fa8c59ad1d7eb0b36ed34f36011d6d0a60b6042bba23ed739c7a15900783cac367281ab615628930a69565d1aaeb1969b4b770517db14ed3331328

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62b03ad1919f39a35a8c6c52ba9facb9

    SHA1

    9f3223d221bbadb80b3df3bc918e944818693893

    SHA256

    f93a242a153b3c3f12f14cec42d10816baed655387ae9803ccfe390c458061f6

    SHA512

    2b69e3bbc2240e681f55942a84109991faf7fd5960317be42035163e9d2d15b3ce1981a1879b2bd6beb8c1cf6726420d5fac1143e7fc5e8941f07343501ad87c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f54e7915979c102b5715ec85b199068

    SHA1

    cea1bf17c2e8c303b300d17838f8ba757180c432

    SHA256

    b34afb55c3507f158845bd8e62ed250f0da45c1d29c0584c0fc85df9afffb454

    SHA512

    d49917fe71a0a8217915bb9865c5ce0c652cf20a327059b41307e02f81717ae762a11d4c94a82f894c108d114b8f19238820a8fae078bc06bb5cd178a5bbd62b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79f5fdbc65e346333425c1c937d7f048

    SHA1

    817a538d440135bbe8419bbed426ec02a2778a7d

    SHA256

    1da50a1f0957fd08284b5612232b77189891e15093ff5d6b23b9a88abe722259

    SHA512

    8c578117d904168c2a6f2d76e1e2311a970acac63424885001e3a65c715e57a03163accfbb4ab6f5cf15274af88ff2ef4cff50007cffa69e66d4669460f3070d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9854436fac02c3f2cc67d82acf90447

    SHA1

    e7670e34a6ebea6e49ea875cc3ca1f4b6dbcb80f

    SHA256

    88ed2b4330711e24a0613c315fbc7dd04f51abfe914fd6e03f7aa69f37c11990

    SHA512

    e679fce2b552e5ff6e618729369daebc2640f570d37cd1d669e105c4cf78db90df3b5d93ac93208f640f2df44246a9f8f29c2346ba01ee2e9d5e8c87d4d796d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7be0f7547dd0df3d1f42eccba723fee9

    SHA1

    42bfc4ba20995a8e3096a428416ba48426119768

    SHA256

    961b180c0a96a5852616a968fd63c060d0baa6ec5bf691c6bdba75d27a27b7e3

    SHA512

    f5c148469ba9806a5996f033e8911f23aa567446ff63a5595876a366b992f1d04efd6057de312f002d71cfdc1065e59579488df47a6d58308f3be65299c048d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f37799369163bc51f95f2e122f00876

    SHA1

    f5d6e3290b2ccb3873582df3b807cd5e98cd5185

    SHA256

    f773c565282c0bbcc793534ccd97a6f96de3f0bf82986c7b91464e5eb09abd98

    SHA512

    4a381497d3da944280b32b97c420a713fd30a13cd496a018c71c857f7a3065cd7f5228c1051e53f378af1de27a7852e0b880acd1eeaaa80e4e8e408dffcd9ec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec6521e7c4d5dc9a173131b3b79579c8

    SHA1

    94b6fef27f7151e7ca3ed9181dcbda15e187545d

    SHA256

    43287bca9cac06f07e136912d1bfdfd5ba032c9b67b31e4e626fcf1251418106

    SHA512

    651c75f37ca343c798114422d8db8d9d20442c749cd036574dd5e13631aceb7db76a70cc0596e3e6552c03a4068555c135a3fbf39029f948c2814739ba5fa5b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    856fba4481f62928e354b22aaccfa680

    SHA1

    644e96d67257ec8fb59d371c455e30082bd05987

    SHA256

    c563813350b3d1a64817808e35b167dbf2051f62b203647c19836f61f6882de6

    SHA512

    c63007de40dd9929e34dc77f342e0e77b8eac0310c0d90438f66429fc8b06b0d64d5c528da55f3c6d98e1f085f82be9bb374a7411b910ea30de34017aef17129

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ab3775e73d48c5e0afa8f3f6867802f

    SHA1

    c4a3094fb37a5542861b8eb96873b6f021284880

    SHA256

    567606aa821fdc3eb384d0fc1733f8b86730458fb06b71754fbca13c954be2d5

    SHA512

    ad0294cfcb8ac2501a8ad32a3672a103851211ae2288d38ee20c2c36bbf71385a30107f5b1ae3fe6ee82e1f37ad4872c0135d9891917b386855650b599f532d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a65f3c162be56ec39789b9af31ac7412

    SHA1

    9e4fe1c51338d786fe6505dc8f75e64af37d601d

    SHA256

    e727aaa929ac68d0c3803a1f6ef4fcf4e2a9535c4c1e21818deaaad93799ef62

    SHA512

    0352e6ffdfc3c6a6c347567fcde1e7f36b058fa475d416d45e838987e28fcc2441eeb415021518e5e757f17ed71e0b0ee19f3a213896b0791061d495142ac5b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebf49def25be3041e4c4eaae1e5cb5dd

    SHA1

    51ee2c89ad39a91a78970d09b5c02c8d5e52fe61

    SHA256

    657ea78d5d2c0fd469bcd5aec02e375d6e97285fd166f67e8971551eb6d72090

    SHA512

    81845a7a8de6a10eab53f6d5ae2da76e80cff1cf421e055e3e6b936e615560a291ed0772d460b84c5ebbf1e905391983fa3f1b442aba14c5998b06114f59347b

  • C:\Users\Admin\AppData\Local\Temp\Cab6E8E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\LKYFO.bat

    Filesize

    142B

    MD5

    b4e1192aac1ae430ad3ed5f308162c58

    SHA1

    fd18dc99cd6b0d5c4973abb4d69c30d51104ec24

    SHA256

    40eb34eca7a66201217643f2a7afb2b3bdf5a05783a7bcc9138f084185dc8e29

    SHA512

    7299ccdb2764616f0e7b0c80ad5220c1d57f678a8d80463ec349e2afaad131e3f640fd196556e5c8ebd7ca7fe0de2d802460d8bcd65aff1de40b603abf0bbee6

  • C:\Users\Admin\AppData\Local\Temp\Tar7C47.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe

    Filesize

    340KB

    MD5

    feda1ee03923462251f5c48ce7f3dfbd

    SHA1

    128c9929b0a4f60dc442acdc2847bbf95c8fbf73

    SHA256

    c2d85fba85f347dea0b1eebb0755627a44a424c6c42e56725752ba2b2c3d7898

    SHA512

    b2b94815560e7a4dfef5ed88f278770d186d4648551004d1c238599c35cfcae8956d2da7b2f8a6ee06c329adbe21c1b36e17c88861c4b56700693a9dc9c9ec37

  • memory/828-661-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/828-658-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/900-659-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/900-301-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1884-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1884-44-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/1884-64-0x00000000025C0000-0x00000000025C1000-memory.dmp

    Filesize

    4KB

  • memory/1884-8-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1884-10-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1884-20-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/3016-657-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3016-300-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB