Analysis

  • max time kernel
    120s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 07:59

General

  • Target

    62875a29851dbe7d5ab2b387aa80d1c0N.exe

  • Size

    66KB

  • MD5

    62875a29851dbe7d5ab2b387aa80d1c0

  • SHA1

    b020ccc5250fa0489def13370b247e9b36596e2e

  • SHA256

    7abf75f85edd8e5ddf31d7f3298dab91f323b979d9e1cdd868fed7e17fc05f1c

  • SHA512

    4874d926fd9ba69aadeb3e1aef34155d182c412b18de9ac9393de4c51d6cc296f5bae447948800bd9c525e14dec749891b39e86446405ffa6d89742d666e290d

  • SSDEEP

    1536:sr+Fum5LMI+WTJjcsnXMcpm/zOxJXKJkC5:sr+Fu2II+HiXMcI/AKJF5

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 60 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 26 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62875a29851dbe7d5ab2b387aa80d1c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\62875a29851dbe7d5ab2b387aa80d1c0N.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1668
    • C:\Windows\SysWOW64\drivers\winlogon.exe
      "C:\Windows\System32\drivers\winlogon.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops autorun.inf file
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\AE 0124 BE.exe
        "C:\Windows\AE 0124 BE.exe"
        3⤵
        • Drops file in Drivers directory
        • Manipulates Digital Signatures
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops desktop.ini file(s)
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\SysWOW64\drivers\winlogon.exe
          "C:\Windows\System32\drivers\winlogon.exe"
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2000
      • C:\Windows\SysWOW64\drivers\winlogon.exe
        "C:\Windows\System32\drivers\winlogon.exe"
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2576

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3b522d6b1bac2eaa9a3acfaa9e0d8578

          SHA1

          a0e77e6e439c096dc9651e3a2d562bfc38bfa688

          SHA256

          992d284ca55ef9d6f84c064f113982f6ca6c2b21f1a172d73fa3b23fc4cced9a

          SHA512

          1c2a5fd70a60739359488a6c2706b1fbeb052934160630f982dbce467ea2e34d8e325c425a2e79d9ad082f60b4439b50c9febc40406fb4cf360665944ba92d8d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          600bcad48b844ec2aa6bc49a5c55f5c7

          SHA1

          ce427fc4307cd53bf0c19278a05ccd00c4e48112

          SHA256

          9d18536ce51fea96f8dbe55dab379fe75ec64c4307602ab85117deaba455fdc1

          SHA512

          8706e7df7e02eb4d56ca69af9be610a0f94a41cac9d94ed1b3d0511cdd8c58ee6cdd930ca75b81bac382d0588e26b9a2e55ee6683858b53d1a8da0957a39c825

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c31bd620b67322d60b6d79dad7eaba19

          SHA1

          0bad30a84fbf748b81ee68371a94f4c4b38b5bf9

          SHA256

          c19dd358dd33d42499e1e47c321a47994e2f93c39e67c62d1ce6439759de8a34

          SHA512

          42f7f4ab796d24d679051218f7515e99f32dc4d944947b44984e9477549a788f4fcb7af752e930d056cf68e94eb15fdcfea3ab97e8b759504c7ea5fcfb029082

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1c19cd2d1426667cc384c048651b20c0

          SHA1

          e9762b97b1d9f9991f261fa6db5dcadfb9108c85

          SHA256

          f3a5f7991079301567c639e17e02b672ec006b1677969a2efaab9da46f1a9e1e

          SHA512

          85d10225be08c46da5574a4fe9a96843c04e167199fd9202c5cfbddbd9be136cf620c148232bad248a5c19fd4dbe6b21b1a0eaf2f1788214d388638c9bfc2428

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          958c1222c549a89904b9cb139d51e0bf

          SHA1

          e04085737615459bad368fdd1e63a14baca79a6d

          SHA256

          6439f9f6f191281ae172a902b00c2366324ccd28e4463558e2d2d39abc19ce40

          SHA512

          98545d05ed68a7310e19bf5f888f33cd9c6eab1f3c42cf038e16ade6e42d32cf156f3f904372e139d186af152df8daf25d193baedba43cbe74e795f6b73667e4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b1b484c43af28d8308ae259c5c1b1c5f

          SHA1

          744da1acd12c36d8810cfa79bde7e1ed3f373a68

          SHA256

          93231d3d38f0ae1239f870e07533f7f04bb61afd57704b2fdbc8d137bcfd0c4e

          SHA512

          fc7ebe0c8adad0ee57050ec1c87f33b86ac431ff7228daf91b9334f073834bc3d44aeb39c34faf78c0debfb5319ca87e8bd4fe44322bd099f335fb3325f3cf38

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          04bacfe7048bb99441488f08b710e1c7

          SHA1

          9528765b5b577e52912a89fa9636868782813cb3

          SHA256

          0c1c79cb9c99eb2c64a295967462ea34f045bacde45f12c4d0b662e1900c5a6c

          SHA512

          d43873eda457c14b019a1165ab829dcaeeb92a25d733dc88b584758b424fc08841608732a648b9e9025be9c1af04fc44cee87c689b34146e0996f6c52dc0f2e6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          99a19e5753813b454cc52459bff78911

          SHA1

          ffa3a010a0341748404120e650207eb150422886

          SHA256

          bb3c2f2f2adf3ca78282c3b10a514245e3ea73b525b38bf599ff6afc71df252d

          SHA512

          5de3b9224b5ff9c07fbee7afdbd9af2f808acc5e89836b4958bce97d2f440c1cd6db176f27a9700d1efe8e979a8a762e954af7f0e1f824c7b049a7f7bf3a5667

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2f9b600667654eea0ef39ff149c49a7f

          SHA1

          a94d506db0c5d704179fee05b2a61e45607bbd26

          SHA256

          bb0f039382d2dfb76c632d1b4dd71db65dfca2c5cfeb58c0dfc29bf25f9d710b

          SHA512

          b8f0aec7106484c27bca98fe99ac54cfe6d92eb1ad41fcfcc26c68aca8105635e68ede88e55865310483dcbfb76c1081ea5b9413e10b8ff94ca2348441c94338

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bc5f771876742bf6cbbfae68e7f4591a

          SHA1

          97a61caed0f899425534689caedf2f9e40182c6e

          SHA256

          a764fd2b1da33c6c8f1146b937800995cd405981a268de99b3259307a6694473

          SHA512

          3b2bab591b48477124278a423c5897dc7fed3d633f20d8b194f3f0fdcdb6e2aa0bf9fae3c183de94c76d9f90cba77f8453d79910c719d66608a7dc1ba622d8fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          64254fb852df988fa9e95b0bf2968a5b

          SHA1

          b0181ac35bee88275cd5e5c0ed836d41240a6824

          SHA256

          0f9e40be761a5c0ea666103097a3d7bd1c6ecda76e96ac704cfc8682a3853a87

          SHA512

          1e8a70fa4ad7c73d768305a618ae839f04e3726aad0f07b96573041644b98ce1fa46151374ea88729a179ce1c3fc539c576f4ee0c0a28f86d417bc9a7d6fbac2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3666618fbb964eee6e11468bc32ec045

          SHA1

          3984961cb047cb6027cb4bed72b2beaecb8e4124

          SHA256

          95ede407738f1f4e94496565e4cd53d4892e00f2cc1b6c1efe5b01cef6c47834

          SHA512

          fe63519ec2285c5faa567e13a1b24ef74c04f0734e5dab2551f50013bc127a9dd42cdbd8d36d080ed814d0ba69b9e0e11a5f8c700953f439c82bd8a9f5cd14e0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d17517fbb8b4e6f7628fcf55fc711946

          SHA1

          a27bd9a32f49a014bea0e4456d293658123530ed

          SHA256

          552ee6e1a4c4ee54f1625cc872e873a49b0d0da5de277f47c0b7de8cf4a6c3b5

          SHA512

          c0c0b9fed8eec08d47f261a1698e8c7db2465da28468e3e8ecf92efb0de721d15fb53d0592f800c13968aa4f354b9a6d5d3ee1b24ecfdf7cd8298967af5589f6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          815a12effdb9d52502877edc8f78ac90

          SHA1

          3bfc17e0a97c24f19d5d4a3405a1323f8d63f997

          SHA256

          cbfe297e41489a1a973af4ea26c04cbad2baf797406b72a941869fad0b1a18a1

          SHA512

          9f430c03bf4b75c884731fd53e0bd3cadae4f7876a8d286e86332ba24360612356a6d6e8072adab1ce960b112f887217e3956cd35e8d73709944bf4bd6761dbb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c09bcdbb8663df410f4717a311c91c0d

          SHA1

          09de1dff7b0e160240d5b2226bcd9e3b0774e91d

          SHA256

          5ff74bb7135d5906146946e121a02a6152ff28a8eab9573c0ce5e13c07ba4b49

          SHA512

          4173933b11c5e2392f572d00c7aa959fdd90ace3b7548acacd101c6e4c3e5d513d6b0541d571a78eae239bc1ced743669ad258f13b3bc71312b9e7d0d4f24ff0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          52d2d89f061d2da2850797b2f9828b39

          SHA1

          dee98cc8c0542458ed7b774af59a84b8d391613c

          SHA256

          8cdbea4705548449c4148f37c45ad10b736a90ed61f6e91536d82c0025aa5083

          SHA512

          e53ee84265a50670f3da93cb746d7fd43f67c4b360bd42b49b4071b1f9c23fa5a52a0002b67055132b08fdbd2bece0c2e0e0a1eba286caf2d7a8972466108e6c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          28792c94ffeaab1d3b80c8e5e73cd1e4

          SHA1

          441a8abc27fa3326c5e222f5ac037f7b9cf1912e

          SHA256

          bc71ac7bb6eea7a01e590fbd3f07ef717f30b3db69dda90e4af8a37f49b7b203

          SHA512

          1c975773c591ff9a6c7ca1b2567cd9f4291055faf750064a0f6100557874481135b58f3c5e40cdf7d0386aed6f896534defc65b9c4a34d10c9fa6d43e17a4c81

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          301aee5f1d27c1d3bdf768c2e00c8a5b

          SHA1

          411fbdbfe7415a9f63ccbc89c03c83fb31df8447

          SHA256

          13c6a42f13013fafa9d60a6807945fcd63cf5fe946f7a0adde489f0016706d84

          SHA512

          4a0cf745382464f37aa706325f7553afd87e8325843621838df924a0398ddd7bdec156cf8696997c1e81ca2a2028b61ac1fbe9976d6460ebe911e302b35893ac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c95521d20df14a9303274c2e9a6960ed

          SHA1

          94c5ab35915b52d355d7070e2005662ba5075e3a

          SHA256

          d63f29cb050b733ed681feb7cc1840808f5189a436f4f6a85110a2f158c6cd71

          SHA512

          7a2d9789de1f029bac89dd828541782aa766a5b9ca9b34ae51b0910b332c2faadcb7ee01d6d2d4fa6d4fcb5cb40d0fbb4b2fdb01e3a6264290da9b1f0d2f8080

        • C:\Users\Admin\AppData\Local\Temp\CabF625.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarF695.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Windows\AE 0124 BE.gif

          Filesize

          66KB

          MD5

          ad2188b9f362f756a8dad27d6c1c72e9

          SHA1

          c9907382ad5f50a8c1e3b6105ffde092425e06fe

          SHA256

          104ff040f63a77690a2eb6ea7e3f2afa6a001139021a5aee68a929a9ead286d6

          SHA512

          7aefb8af478e4f1d37ab6d9acaac8801be5a1e9d34c7cda32f73d25f89c0b1201f3832a208bc8b70df763d5602658e79ae2247f64efdb7251c06bc221f30cd3c

        • C:\Windows\AE 0124 BE.gif

          Filesize

          131KB

          MD5

          431f4a0b4060e6b184f957f56c4b9d98

          SHA1

          c75a99de26d3ac46b9feac9f7203ba02dca04dd0

          SHA256

          759a0c5c17e4c1317a882b56be46eedcb0a873e36bda6ca0aebd369dd5cbf526

          SHA512

          96fdcef415efeb9ce31d20aa2c6f01d04b21569914d2729c78146972bace5b1e00d03513e681a77ed9333fb79605d97ce002d4bd84cde5cca51675d22ad11438

        • C:\Windows\Msvbvm60.dll

          Filesize

          1.3MB

          MD5

          5343a19c618bc515ceb1695586c6c137

          SHA1

          4dedae8cbde066f31c8e6b52c0baa3f8b1117742

          SHA256

          2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

          SHA512

          708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

        • \??\c:\B1uv3nth3x1.diz

          Filesize

          21B

          MD5

          9cceaa243c5d161e1ce41c7dad1903dd

          SHA1

          e3da72675df53fffa781d4377d1d62116eafb35b

          SHA256

          814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189

          SHA512

          af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b

        • \Windows\SysWOW64\drivers\winlogon.exe

          Filesize

          130KB

          MD5

          acd62030071ff249fe404dc1dea4052e

          SHA1

          4f50a7b24ed43dffd98f4ad9351b6eaed928d5a6

          SHA256

          88308927b19d9c9d6e642c4785962190c71ecaddf2616ae0027924f1ac99afee

          SHA512

          b19add5e9b436868b7cfecf9369996a21829a1dc50971dced969702331466fd1577f88c3bbb9b2184371ed5b24328d25f80b585ea5185289760e1ec553a4bd2d

        • memory/2684-510-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2684-1209-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB