Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 14:36

General

  • Target

    d3078326e399ef602a9d816dff40b1b2a369e7bdfd948282c9a92ec8e731b3cb.exe

  • Size

    13.8MB

  • MD5

    9284890f20c98cf04299f70c99edfc0b

  • SHA1

    2be4e527029ab131a0272cff184be7b2f3e757c8

  • SHA256

    d3078326e399ef602a9d816dff40b1b2a369e7bdfd948282c9a92ec8e731b3cb

  • SHA512

    f36b649949b3b32ac2cbb720bd8c853c5c9cf1ca256da159a8bcc1bc2b437fb00f1a1fd2d11bd916fb52e3bcd99058997a8535f5f98bf2326e952373a20fd5cd

  • SSDEEP

    196608:im+b67qxFU8d5WRoywQqoMtuVApobVlQ1DjXurzEdZyPAFRO68c9BDalEhL:pSFUwWRsmVqjWmEPA3Ic9sahL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3078326e399ef602a9d816dff40b1b2a369e7bdfd948282c9a92ec8e731b3cb.exe
    "C:\Users\Admin\AppData\Local\Temp\d3078326e399ef602a9d816dff40b1b2a369e7bdfd948282c9a92ec8e731b3cb.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.bitbrowser.cn/?code=2b02b8
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf81ec7028514e9c99156af1cca430e8

    SHA1

    4147824c5928456a6271b69e48cb06aea5380305

    SHA256

    52dba779cca7e95c7838c206f94c56dda39616777b2251b8e00d6f2eb0df52c1

    SHA512

    32cf5c3d852e72e0368e8d5d78506f709a0f157d586addbcbd7428570305b7196ca915c306c3e79e03f05f53027ee45b14bb813de7b2d97779224dd9eb8f6f15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee43c2f2cce2e4d22ef5fa9b01031698

    SHA1

    3733bcbf4a9e3e87b4f2a1ad212597250937aafa

    SHA256

    b89e9c2d48a704ecfefef76d911faf1a73ac81f383d7533c9e16c64477c287cb

    SHA512

    f3e3258c02f0357e4e204f655dcc19ab2ee61bc9b241cd210ca977b90a726625b26d65875bea1ea0735049b9ddd0f1ae0f5f5db4ed968971b20f952eeeba5b04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0228d123a2c76d31ac3ace3b0d363ee5

    SHA1

    5f87ffe124b7b68a18bad2ccfb04738ae300e141

    SHA256

    624e74c89528623c3b5e24e552360f6a7ffa01dc278611c21eedf0059f3186ee

    SHA512

    6a07abf22248ca763c9cf44e31e1a11eec5c21801a8789de60ed3a1843877638b86fddcf559605f9a9df0f9784b6ee64db2b7ada526ac24b4874696aca81249b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16c4467eabbfba84fb1821288f0fa0c5

    SHA1

    5f02a2a16b2bdb0870f5ff75954a84820461fb6e

    SHA256

    33f72c79765342b6a3af5940aa73880f4543ce20680727c714f61a30e4d81977

    SHA512

    fa9e623e8604eabef039769d97bf825cfb9db9a81aedefed92912fee6ba2d8b8153e773c728374aa6a4d8eb3daf5bbf45334448f4e2cc0a289d8f8b05c1b9dc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92916a2f503ff709c761001461f390a0

    SHA1

    c712fb9bdb29d8c7245e5c95dd2e336dff982876

    SHA256

    25eaa86bf0e8f17aa18209a8c0fd54c280b0e0711d7b5d4ca4905f03c351a692

    SHA512

    d087e635256b4613721ecbd95387f7473f6b445dad5609b9ee5114d9ea3f0e1505b819515b95b3face14e80da1fcbe63aab7ee3f4c53fecd77ae6d28797e1b22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad2f76471af5e26d5c817d150f7b244a

    SHA1

    4676661d906bc19fbd75147d94bb0ba2a33afce1

    SHA256

    426337d9f7e0adbafb64c0039fb074cc88e1b2dd4b004081d73123aaebd50565

    SHA512

    b913867ce0783090ef9ce684abe137625c1212583ba0c6566da1e1075c672c7029e44163e69092240e2af6bc972878ce7bb7585384fd9a29f5f8982bc12a8c00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c81f71faa770611aead28f699c1e3837

    SHA1

    8640daf7014f70cdb58fc89d27a89c4c50af2393

    SHA256

    bf80ecc1a1dda5285cfac1d49a4d607cd7b187efb7fcc35ddd53fac53e8763df

    SHA512

    43115e587c6199eb4ef04f3f6ddd3f8b87fdc5bf2d2087a5f05f43bfe52e0f5deccb5c680bfaae2f3f77e110d9e97d0151d994c4ccb854065fe4e89f6791fa2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ccb448295622208c0e545cb5ba13aae

    SHA1

    eab1478536412d6aadf148ac449e1253e5cf449f

    SHA256

    8f0d3d2c207466575e67a111a3f261535ccbbcc9651a9ea5dc57df69009c722a

    SHA512

    31f08df89f1df7f1b72c41bedc9391465fbcfbf1b49a0e5e5463c1e44d86fea97268f48b31ce9387974b13282245dac8d3b4a6d8af8c228a0d84dd53431cbadd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12ca3c5e6af8527443bf9c31675bfa90

    SHA1

    7e6ee5a92a1a07b8a9e93cab6418bef5fad3b73d

    SHA256

    fd72db58a2a92ce93b759934ba6acaf55a200a73c7fbdc95b9ef98995ff6e1c7

    SHA512

    6f2732c6ac18eef59ff5a26234366d788242f1a74fa41641d75fd5bc50dfb11ac89802f1f56f9910f10ab18f1555dc274152da1b65de4dde134de2ae91796492

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    753369d2ded4a5e25d7d7be08179a300

    SHA1

    bd0b119bc8068239ba26c61b81a6f54475a93a25

    SHA256

    ff5226f8a9db7784ca99f7cca081f73335148572fc0cbd15ebf1ef1279e4eb45

    SHA512

    bdbb0f9a63ce2911bd92d6a4b457ea6170492380950c1c1d0364fdbad83d0249bd9d5a1702ddd7f0ec6f0de37153f9f32311a5b78556ff774f7df01d6c536331

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c4161b93a380896e48bf398b3122778

    SHA1

    d6909a788a2dcc4bba6a2b40c739a77dea59ac08

    SHA256

    25b6134813d1afa80a6be482995ed0eca02fd633318472009dbdca094fc0b06a

    SHA512

    489ac69fbff59a611de279a2e50516aaf3018abe28bdcf60913faad06e1742acc3532aea0d3ef76995297ec48d9788dcf86cb02f9a21af8e86231dd72dbdac5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90cceabc8775ffd8f9f66f631b06e5a3

    SHA1

    1e597820423be804bb8e34c5d5cf324173cfef2d

    SHA256

    3bde4dd6544273d078068e299976d70969e6e359582ecc373fe7c0fc8431c941

    SHA512

    58f9d93dc58ee8861d947ea95587b78f0162119ebbd689be640b5e7d7dc2f095e8ef760e1fe1c628ee152e0b78824fe65c0f85e01fdba1381f50f8b7154620f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44bdcf206e073e8153090c0ee4fd234c

    SHA1

    8f97732750f58dbddfa0989e3883f6a6410f05c6

    SHA256

    29b3d6208a95dec5ee85f2b94442ef734f6550bfacabec863a5707a8184b8b46

    SHA512

    cef565a37b26d30bc5e8aae9fd48e921ca13fb2466d2db361bb25ad2fc1406e057d2b12439adfa2855f399b2da382bf9df670205726f8becfeb815ef743153cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1d187a876be58ca3128401541a952ac

    SHA1

    90de41c86974b695f42ffebf7e2d2091a2480a39

    SHA256

    e589f90484ee2886343a5796507da1f0982f2f421a86d8c1ce404ad07811d99b

    SHA512

    0f92bc8031aafad169283eeef33b5646858063a80f2fd99ae27279f994af155028d7ba92c5003cb6b3d598092d36af863a5a1b4a1c653d8ac778b166d0437713

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45b7383216dc0407a4e8353426ea5b24

    SHA1

    46993d634f3ab009cb07d8ea2dd4895e8a7f984a

    SHA256

    24b6234a8d18f8fb9e19c23547f2a85e26f0eb30c943b4a018ad7d4c9aecd8fd

    SHA512

    419101362a6564b76969a16e32b0ba56da705ef8cbb9673f096a076aca826e9d5d1f1d728e0eb2e8fe8a88bbc341f3f57b2505f1cc50b32342702878baf73e7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7b02d346f78d78835b54ef9806e94e2

    SHA1

    30e2278eacdc7516e305883c46b88dad51ba2f65

    SHA256

    124267f1beaa50f0667efafb044de7d45c4e9e1fcf58adecd14e61b84a8cd4c3

    SHA512

    bb2db5d7050853a417c05504124f6b6861ac0666c556e997568daa696e79960bd2ab3e827dd8d36b1a0ac7c8ec067aef8e8dfc4902459a080138d90abc482e83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ddae649c26774aa7f8584e65d1af4b4

    SHA1

    7076bde01b106d7def0ae72c75384747862048c9

    SHA256

    bb7439e632ce69040f2987e61729dff71257fa3f0ec14b5cd7335dbcaa0ae90a

    SHA512

    e644f37ee3e59445ea60f5f65b703d680d15285571901bdd4dcc04a6f4577234dfc7f4d958c1cc2966ead3fd3b6dbc7aa1e5d587999effb17a191f7bc44dbcc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b509dc1173fbed6c9ffac8449492dba0

    SHA1

    6359005a55d6db369b1373bd6983af84bb909354

    SHA256

    537f6155d755899477c1b8209e81c757d651ecb0a9184bb95404996632eda1ef

    SHA512

    af9e76f738fcafa7712467da036b82c4126d9a6cd4072c94cff367cb2bb02a8e52a8610ea04f6800f3da57423ff114f9b524606a2cd51e0f7d1129a0fb88bfe2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65a0d1a143bfbd71eb4985e5d995a3f9

    SHA1

    649c89d830ed05198914e3f1a415ec1d51c7adec

    SHA256

    32b078bc2ceb6189c8472ad3724ba6c4f2db191a2ba58c8172fc3b6705efd972

    SHA512

    760f70ee11ecbc21b15729fd9d4431dd9ddb5ced987e9c603e350eb1f9b6ff9066d5786b44d0fa5faf5fa91047ca1a84ed32b05447496a602a7afbbcb732aeec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a3ccfedae3f393e43e04dc2608c3361

    SHA1

    14a2395b78a00f7ea84143ebcb701b59de001dc7

    SHA256

    79cd1f3c96f609294e764ee40ad47788717d2013312b08fca53b789b3db9bb6e

    SHA512

    e1b4b7e2a6584701bc96976ccf68e04b453c420b6004ebfc5de381029a0165cedcb71d3b5e236d8f896d95944d190f30deab928101ce404dad536f62d9d7b491

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    effea56f3fcdd0f19f5ad1b11d3ae92b

    SHA1

    856c76cfc8d50e3a852399d084b270c82ceb9868

    SHA256

    54a775299fadd2a9402a27b95a89e6c692d9c2b69749433e1ed9e14836cb2a94

    SHA512

    6876d61bcdcb934b6a3c159f64b77939fdc1337691adf50a996efd0c36a59ddbc5b1a8cfe63712c85de7a9f9680c5785e544e9c019eff0f540cd3c515a388027

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lutsxto\imagestore.dat

    Filesize

    66KB

    MD5

    629785354e16794aa8393e6ffc627c17

    SHA1

    0f2c3d4c074f886c57ea146a2acba1a7895e78fd

    SHA256

    f6e697bf9ea56fdc87f9331b9f0d546aa21083d8076a93cf3a55e28aa98b38e6

    SHA512

    ef3b1ffd007009c5caceecd6d44e08810958927223ea35b1afbd6af4b74c704d63850a10041dc3e3890d25e4eb69faea6b18fec8f200245c28a89a3ef53aec1a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\favicon[1].ico

    Filesize

    66KB

    MD5

    dd887d1221a21ce5a8f6dd5651409c92

    SHA1

    27bfd1d10536074aebdb11f7d3eeb496d7b3075b

    SHA256

    984fc8a14ee82e29ab3d5f24d3c83bbf3f65efdb9f8a1dca31045bc1b9e38a60

    SHA512

    694cec0a7227f2b329fd620133fc6e788f4cf271fa455fe6046d672ecdf2728042f3d4b74f81db5622da3138ba8d1e29ec9f9e2a8bb53f5613ecb0bbfebd7167

  • C:\Users\Admin\AppData\Local\Temp\CabA45C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA45E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

    Filesize

    8.4MB

    MD5

    8b6c94bbdbfb213e94a5dcb4fac28ce3

    SHA1

    b56102ca4f03556f387f8b30e2b404efabe0cb65

    SHA256

    982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

    SHA512

    9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

  • \Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    2.1MB

    MD5

    04869ada712c189caba4822be0e81ea5

    SHA1

    9c45486b30e6d3ccf0737c5766796baaf58232ab

    SHA256

    23078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b

    SHA512

    16f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c

  • memory/2724-13-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2724-14-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2724-12-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2724-6-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB