Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 09:25

General

  • Target

    300d0136fcb3bfe40cb66208c8b7cb90N.exe

  • Size

    2.5MB

  • MD5

    300d0136fcb3bfe40cb66208c8b7cb90

  • SHA1

    2cab41a03ef4d9023f8e28960121712a54ec9092

  • SHA256

    23d464ec4ee0d0425b17e39377d980bc2c239422eeb74ca302d02321bb083e4e

  • SHA512

    d9337933d296ed5d0915156c49f0c8078f4eafda926cf52d91a9a3cb0ce4ec28247f65d2219e5635b3a41b2d0c8a32866f5a88e4940f331c72198489af3827c3

  • SSDEEP

    24576:exWb1aUqkstEpYIXNiW72WOfaedDrGnrdEROGHOhWkQJCtHYX63C/hRJHOhkCMY:exGaU6kOFdDqnroHONQhK2HOX/

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe
    "C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe
      "C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.35my.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    34557a8a8c670a9e683c404235558159

    SHA1

    945f4bd1a7803dff97d5028d6e43f0edb8cd5b6f

    SHA256

    3780d38f8ffe4b54f6fdf71029135c81321c523c89548acf3161a199c4d66193

    SHA512

    45d1aff1d02ebfd3e76c418d8680397a88e22ca3b1548430875f2c2c78270acacc471ffb0515235480d484c2677c809e8b30f7ba0c6d24283a8e25a166890e80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b550e93f76cb8aec725e0ab1b69efe8

    SHA1

    c7c1bcb4fdfb206ca3a91d2547315e878c2ebcc1

    SHA256

    9721e164b198e8688ea8cfac45555c90f65cbb4634e25003225af18ed0e18f21

    SHA512

    bcc8319da59390cc687842588161ff0cea3feda626597b12d0f80c1c5a306b35f9f3fb0d83987666bdbfd9066258abe387d4e89f53c4cc2b21f241431973efbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e3529063de6a4107c3ad86b2274641f

    SHA1

    37350a675bec26a0d1974c60b33ea90933036dab

    SHA256

    f62827109e9384f69e519610ddd93325d11a6921ad554552645208af022b104a

    SHA512

    ded99aa1dcdf1a185da462311afe098e06bebadcb74285a1a6246354cf6180f34545ea7731d6a72157ade6997a6ff8c15ad2ed78d85790117e7025ee424a15b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    958421e6c8d975ca862af043608c140d

    SHA1

    9150419ef7dedeb23804719eb8bd4d3699a9bf75

    SHA256

    942b5aba058df32142db26a15b479ef5c063c9634166df7e82063e9c2580c95d

    SHA512

    8441aea4dc621de6dbc1d8eb7aacca66945cda1fd31a6d75831b0c472cc903fb12bb76450e554304f8149615c6e5191909f6b541aaaa7e9262bf5c302b7eab58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e707a6304c27702b3a7fa8d67a8713cb

    SHA1

    ed8eaac81867930b3e142f40018808f36ba9375d

    SHA256

    15590a501915ff755cec538f64d1da141b330919db226634260114ecfe28dbe3

    SHA512

    174f3ffecfd27245668ea00de1fe836178a17049a452ad2e381f321d9b9a2a54c2edfae5bb3144c4d23574748311dd611139f43c7ea054c1da91ff039b0bc63c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9c99d1a7ddd0bbcb74fc9c56086bdb7

    SHA1

    dbb5e2a75d4ca8d7d01d1ff594b2dc205a593ad6

    SHA256

    4786ddbbdb8a617baf6284bdb62c1506b5d999282939e71ae778ec93d91aa243

    SHA512

    c51977b3b924fe6d1c9c62666866deff240974303f6d911b81a23fa75d3c9cce14fc54af6915f1a84bf4bd14e20fc7731eff4c8afb3ba13026e177b181ebe301

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45cbb27ea00b1d5cf56839828614d0b4

    SHA1

    fd01bba70640f9c4c3b2503b5ca4016ed60ed1f1

    SHA256

    e7fe88418146bc9948619bd1040e977562e3464e355a0bde834d7518db378bb4

    SHA512

    93696aaf93bd0087fedf1941b9d557aa104821f6fd12cd497aca8f5fd55517b6b2479fad430214ae97795021e83e995c6a8bb897d952bc970cda6308fc2cf9bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    438616d36b1a17a67ba2e98da2cc54c8

    SHA1

    3f07fade4fedc21ebfbe1a33ae8b0928893e9388

    SHA256

    25f2ce1595089cd716b160f50e110c2df1ca01487132f14172adaf7169506cd4

    SHA512

    7bd2c3e0f1416b039633bc8e7ea8c3b1a8cd2fb2c1f7ee92e37feef02127d4a6a57fd860c9ad38752bfc93f2027c22e9362a097c31d940db9b35b3780fd66b8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44051675e1ea50837c3e0f21a4ed8ba5

    SHA1

    eff8e3a80b45f157b6b18d3d54e0b1c800b5462b

    SHA256

    1810d40e390cb2f53a2dd4b6d38b1500cd591e3021178754b083849b57607b62

    SHA512

    96bbd31f1380c2aed2e943d016ed11c431da2566f1387f6a0a08022af361e83d24a3e80af8dc4c7e187c533f21ff7e2cebc4e9fd8cff814ba2868829893fde25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61e8955bc11a29904510c053ec80dff9

    SHA1

    bc599c269b6d93b9f4f9e68c6769d100df18bbcb

    SHA256

    b092f3f05a4d14bd5cf61c81ba1b00ac448a6901986475c786312e4275edda81

    SHA512

    51c93f64d493bee52f72af8e3f967f25373bafdf01a3899f8ff24f70a1493882f8d520aaf3e1f5f28d2b1684fa1076f1c3819c3f61fce85c2da8ed497f7167e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71fd3ec941e433a951faa3dc8c7e9df5

    SHA1

    f17073a4b804c521c18a9e0043d4404d62b5d20e

    SHA256

    b62f6b4373c3d2e88b73301203ab6711fa596dee9a180e85f43f54d747b8438d

    SHA512

    4011e9662168be3ada0ebb3db38862ffd93a96515226c6d4cc2125007d1a0c24ae0e28ca66950ab0bd51f6dfd9c40649ec0a5b54e61724a09d644850be648282

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a965c452586734ae57cc1fb28b854130

    SHA1

    75f0fde960d74e14baf15fc67d6fe72e987fbd19

    SHA256

    b052698d9ce28dedbd17c8ed25646d66cdb06fa2b9aff6a61e956ade34e9368a

    SHA512

    13f5aa391496ff1da162f6453d33b58d4dc50e0c4c22de20a417a339cde97f908f384c9f37e36b34262b559f05d0e475d83a5b6c73eebfb6e812a62b9a44219e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f050c0bb6b768f35e06287abf4ba06f3

    SHA1

    4e7b2488c96428b336f4ae2e25736db811e3a564

    SHA256

    b3f3ed40e782134799ec84eae35c37f9cfb081827e7409b2eae4552ecd1c21b2

    SHA512

    3ab5eac818a4263923b603ca87fe66b6260ebeeb238cf3340c3070ad864bc014f62c229b3dc2269113255163c014bcdb4d250b48e1b4512d4af9e07eb22244f8

  • C:\Users\Admin\AppData\Local\Temp\Cab1373.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1376.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1724-6-0x0000000000400000-0x0000000000691000-memory.dmp

    Filesize

    2.6MB

  • memory/1724-5-0x0000000000400000-0x0000000000691000-memory.dmp

    Filesize

    2.6MB

  • memory/1724-1-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2684-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2684-2-0x0000000000400000-0x0000000000691000-memory.dmp

    Filesize

    2.6MB