Analysis

  • max time kernel
    139s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 13:39

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/ClientPlugin.xml

  • Size

    9KB

  • MD5

    5d0381a56563b1ca8928e3cf087f1625

  • SHA1

    9c9f15ec3bf3f91fae6f327df558d335f790ce3b

  • SHA256

    0497b92461c2a9ce3101d9397fb3079f60979164336a16653d282273d3085bcc

  • SHA512

    594de3e1313255902524d11b3d7a89d35b2db2713d01f7e725cecc5959227f18ca856059932b809be420bebd478199d48303a71b66fc3e48d835dcac133d3d04

  • SSDEEP

    192:E5cL6liTydwvbFO+y2dbEBhVR6SHaP0sJjpCZUV1:ocLBeKw+y/BfASHo0uF7j

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\ClientPlugin.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    592c2a14df3bb5f946343937325c7977

    SHA1

    d866336687b308de8ce1f5386821f31a2f0dc079

    SHA256

    2a9e99272e4811956af01462eda6fa730f2ea71f9231d4a37ef4ba90ee3ae386

    SHA512

    fbbbb19ea132b66c9b0b4ee246c73c9138144d89a9090741df5e14497d891e1ea99aaee54eafc5169395ef5be08940c24aacc24fd3c8210a5da5942bb18ddb3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4ab066d11d3368fddb4f82c691444d7

    SHA1

    7f33f93fa3b1afe90e0765f31de339ce9ec03995

    SHA256

    720cf878dba381ed5478da860b2458a19efa0555a305eaba806504c2dc510181

    SHA512

    e963f29721da9fabe7e855d7ec97355a022f2574f11e25a4923fdc5440f962372a0705aa8be743bb7d2de9565c4c4bf19aed672018b9ad2a9e2f9f95c212d236

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89a3f4921de21c52c935b24acb71791f

    SHA1

    6f1a7c17ea71303314e7ec7b52beee22ef9b9f60

    SHA256

    693fc98793e1f12e283c006665a0446de4b888199fbee9d4bf00dc759628b497

    SHA512

    bac03ecb69c8aa656bd585b9b06aa123477a841300c3d190f667c34b303f6a50559fc82717781f20018606c751e15105dd80f8f63a9af719f32f581846116f21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba8d24fb30107bf1ff2dfdb06127029d

    SHA1

    8bee6c1581d3f000400f4bad1a636efbfcf1b717

    SHA256

    d2f6e5692de7a979bf53ef8b20aa2e37363725205a236e887612df073ad29c5c

    SHA512

    c33b71c5250c4d1e51953e4de4637059eaef7b2da3ee0e16a9c276b3a5a4c228c3daece38f3c5fbc9fb0b306fb9fbdb9d33a2330cc1895efa9fd9a8bc51c454f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9399bfa19260de8ca03b044f3d26438

    SHA1

    c537cbaf116cb4834155f77d7930dda2d23f56b3

    SHA256

    b622fb39f1c22aedc75ff9ecb6083df64c4ca94deb70f0556acf37f4154555ff

    SHA512

    af94cbe852d3017c4e4b82021e2dcf17d15f1f40e806840d8106aee567988edac5ceaadd6e89416bf3f99bec47f71b8dd06450da6c62ef7f32edea1058d13417

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32a89933422f596a7485713a7efd7697

    SHA1

    a17d5caad7d4c73de067a17a48abe17e36c119e8

    SHA256

    f05002e740116e7f0846bfe039987feba5484349e2d953da09ad6175a992ce3b

    SHA512

    698ece3bc8d46289dfe3b6ecf6343acce8508caf4ee00e652b06c7887037dcd7a88ebc4bc4a5cb08f9f8b78b840613ec8bd98843fd72bd4e2d99e60057c32486

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fc76d97216bc118a0897f894f0efa9b

    SHA1

    53ed02f0257e1fa575c1a6cf7e86d547b20f0a37

    SHA256

    87099d4a8050addcbcc5568d78b4d94f648206df1c7e60c257bac700950ae221

    SHA512

    8581216913d4585c906336175c0e8ef81f4b673ed11e239aca327ed885a1cf81b7850c9b6ca29d55eb798d72a95818cb410b129d92dd4f0a7bc1f62eb3a58f26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c5d8e9623b43cd61ba1277b41230aff

    SHA1

    576face3bca1cbfc66a78556511558224d35b3d3

    SHA256

    4a351691a79ee1e95250d189d493e3bf6dc1bc020edf80ebf5718658b7271955

    SHA512

    101bc87a80068da9eda5dd0fef086c6d69a2fd8f8345ae21e088166b8d6b96e89ac7fcd7e841f5eb6aeb3b525e85e7a5cad3b590b373d13da103fc7b5c362c13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e6cc58d296bcddf974b6a3c5a6312cf

    SHA1

    9b8e78a1b2fa51883737345a15aec0fa5698c145

    SHA256

    2698a2bb7801f2f39c94b0e19ae34a24b1c578ac2d323fc4ca432c1470d2c9f9

    SHA512

    1075228c049378c0ffa9eae61a444ce844403a5b5d435566644ecdf59f66ab8f976b9cf63d90cf2f81979cbdc132a7e68d7df61d4dc586e951ad3ee8c7b38708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d527b083d3d8a38babfee831445c46ce

    SHA1

    3933ebf30d82b80bd184de1653f0d41a5253bf4d

    SHA256

    3aff350d87fb8cbe4a8240acac8b6c4b3e325d51ca5bde43cad3ca6fd2b25ce7

    SHA512

    ae522e96b0a6e0a97c3a68aa91cda4f5a7998d636ab09484b1645c8f464215843e03597ee237a9cb5508c1fb84f1f383ae58d6eb0786438ed3f24f01c849b635

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccad1a32d389a2dc0b29b4712ef7917a

    SHA1

    c303216679583748e41990d1c203845dafc90b61

    SHA256

    5c87deaac63d4744ee69374eedd82f1fdab60babe3255d600c884a1add8801ae

    SHA512

    d2267220f2ca33259a4e8e3420c90479c1ca4ad0f0fd1e6fd936cc9de18f2ac6731bee1e8be9b1c53d9e46c913b36c92ec4d4bc0aeea3ade86ff0bce42709d1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    094a9c2baa54cba5ea74ea444065f42a

    SHA1

    0d85a2c938fc3d7df753bdfba7bb9b530c1e9421

    SHA256

    2e598cb61db6636fa66f944d791519b6e7524a40909211f4922f0e51527388f9

    SHA512

    8ce877a581952101d3fcb2fd5ff850335cbcbc1ed53dd839ceca72c8b53bf0acb8b44a3582c86640f95d6dc75871071b5bfc91b8473d972c7b61fb8ada9ca7c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad0d2b3b76d1f56f0c55419a2137c3f3

    SHA1

    6d4a25e546e87f20d4b45d27b0a5647b1eb159c5

    SHA256

    124a922132ff0aad8f2c9ee365d61830a4fe026a02a7b4de857a30a68d81c92b

    SHA512

    e2c1437f8ac76e6164d6471067355afb6351a8a85a52184761712baa21e5f418a357899fa043f4d896fb4cd0d5c786da12cbf8b2200f4c0bbe7b9f0ee6102e4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89e1f1f7a1b4ae9593117b305b4546c3

    SHA1

    0803773fb59bb143a93257992c600ed3136cbdb5

    SHA256

    b6b140d7c9f53c96f4e9abf68d4e6d9fd5c98014954a80a071930bfcd8c285ef

    SHA512

    6bff60773fc432cd148646208c44e5bce7c801637d97acdc43d05e049c457f2723f2ea651638bbc9e4368f05abd27ef513a5a4093063f1529504d5830c30a8dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9a5b8ad11c3cee3b28c0cedfdf5a912

    SHA1

    beaf62e665e79cb82acee926a98d4e52d942fa10

    SHA256

    9f4109a9077d7dc948d0e02a74ff40d009f8d5b05a794ef208d629c030f61d87

    SHA512

    4a913c2aaa2d8840c2205350a6543d7646c10d2b40e0c097a314b2a24087c302be3b7f9622e8bc908621b5fdd1e5cf48aa2d1239052be9c69ab38070c573022d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f2106ab70c8e79540db4d6db13f955c

    SHA1

    44d4230294528a30589fa0915081a2cbd906e9c3

    SHA256

    cfab516be37c51b0fe997867164d57e3f13c1a070a2013ba72140114c390bfdb

    SHA512

    99d8dd6cc5b3f16009b6d084c218a46807f37d024f00b674ec26221ef8b37e30b2d15488c9146402f7016d65721943c42c8a89b39c3a41551162493b58838a77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    756289b6b2b4bd7eaccc71f77491d563

    SHA1

    e990782d116e91fac6155d748c316f0ade9ba86e

    SHA256

    861b2ed8b903659254dde8a64512fccc275b8ece408908172bd5e3d334ac2335

    SHA512

    1781044773f9dc40629f1ebf10030d8d5820b613897e03b4f177bcb20093adf5aba33f98960c330e2d274282b4533a67191a8cb6f4d71324f6e6eb0d6ebc9cff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12659bdedddc89defa332620d2c116ed

    SHA1

    9670dcaa48ece77941902e4e239f2bb1b87172d9

    SHA256

    c5a659bc2206496b2fa7f455ece7ef733e39c43caee16c3d43556575c4f42de7

    SHA512

    3670044d431ffb95add306a443ffe5085d69c11d8a3dadecc7d7f1518310641dace7bbc177b6ccb4352d53fe01dad8dd4e38cfb9dd0df52b49a43e5987ee3d72

  • C:\Users\Admin\AppData\Local\Temp\Cab1BAE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1C6C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b