Analysis

  • max time kernel
    117s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 13:23

General

  • Target

    ffdec.exe

  • Size

    394KB

  • MD5

    c1c196b87e88e0ee86295f0ab6a7c17f

  • SHA1

    101a02625c0f80caeb412298c020cee417c47d93

  • SHA256

    b66b0182373a4992244284fb2aa6bdb1a72a3bfa442b6a34421d6e51915681c3

  • SHA512

    305a1db83a69ac713cc6b05707e38675221db2159f64789175098c72d571b34b7c4453c0f9b9e851c44d63e17e555a273f0c9e7e42977bcb5740e29138c8c4c9

  • SSDEEP

    12288:iCUf7M6OfVLh4vzzzIuYzzzczzzzuREe/tzzzzzztLWz1j1Eqp:idf7rOfVLh4vzzzIuYzzzczzzzuREe/I

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffdec.exe
    "C:\Users\Admin\AppData\Local\Temp\ffdec.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:440 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36f502c5569ce1e06c6dad9e8bdbd5d5

    SHA1

    b01f86e5d08976770e5c52f18e19046bc06dab3d

    SHA256

    1ca08cd7d2c593f05b4d337a0da8902908c84bd2f50c24ca03f162148e79efda

    SHA512

    6e86cfdf4b50cc8b07a23d53f38fd7f6cbb371b3d3b2daf42882880874bf012ce4bf5afc88fa0c2e970fd5ac6acb906f9b5dc023d22e9418673e7f9b201f8f19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ac9aa8597e4af87cd97cba999996d87

    SHA1

    254902cbc1f14c877cd8fc3a7fedc2faf97ac4f6

    SHA256

    783e5fa256185ff0c0711ba3dd2c2fc967d04261756336d75c9d654c546b5242

    SHA512

    10d81599b0ae29bcd71459c84588837e9f34c0ba2f5362ab6e0a635cc4270538ea70f87e5f56d423d018a2a994aabcd9273e5ff6bba7a1bb937175c7102718ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a357428f72a03d974f414a057d9b682

    SHA1

    5b210266f26ad1847e020d2aa575d05cea7cf3ca

    SHA256

    d9a17951937ccd71c584bdc648bdd1b46e18f659ebcd314e7694b1e0342feea9

    SHA512

    9d25b069693625f7ad0b25367f3aeb1a1096748d3e3b5b3e514752b762b983370c10244f674b8ee4898041a9b71e5eac402faafe8a1d34a4ab955947a446182d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3e917688545c8f179e72c1f2bc9d519

    SHA1

    f8fe9f4c60fab838734c94b500053c07dd80c0fb

    SHA256

    f5d679b54fbc399fae2f49430e83c1e5e1c780c7b920259cfbb3c7a91f689aad

    SHA512

    c4f7511597c49734d59182e59582fd3ba5c3e3f0cbb50bda87cc3ea2793d1a94a2f8971c384e2752c251ea3f9994ecee6dfdb006e94a8acb1abe1cbeed43ea10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15a7fa389afc723deed256bdbd8471fa

    SHA1

    b29eeab9c73320585ad7d800864bbeddb09003cc

    SHA256

    5a96b7fbe06537947f3e13c1f00f4af71da07b0f65bca0e86cc365be19da5456

    SHA512

    a2c077f6b65e25b439adcea8110214e3a53fd764e6b77807839d978f241a8e2f0bb516021c44befd22cdb14211dca69ba312caddefe4b6eeffd8b83d254b7946

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59e3c626e3a5cbebaa8f041e8872a125

    SHA1

    653eb2e37c2cf9732d4aface414a6a7983aa6165

    SHA256

    0dca2887237740488731dfdaa582b2661aeba55ba8503e245de5787a591cc28e

    SHA512

    3ae6886ff85ee70c431af96aa82d38aae040327dff6b9cae239e33aba0aaf4c0d958be0f515cddbb42d8662475a900a54a5d49cb1ab08d28c3f41684bb02adda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    442303e5806a4ce94084829adce94c5c

    SHA1

    341c9c069ccdcbd2c0cb987a76962b3418bf9c1b

    SHA256

    fb9c1128ed91e0656b901a4978c404e9d9956a297bf1cf12fae8b9831905b4bf

    SHA512

    68760d4574cec201ae2f47902396b0103274cba51fadb04dd11ed21cd930a8e631f2f6289db522920a0eb911efc3235502346f1db1774bfe9d5ebb1eebb7d034

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4e011b3e4997fead8e044862fd6d88e

    SHA1

    0c233b0b781f987fc8046107536408d7942d0855

    SHA256

    0bbac69d532fd1b5c67feb5dfda17c5aa3163a7ecfb97ee08ae8db8663631b4f

    SHA512

    10b0fe22d7bee46da88b9828e96bd5a99e168fe654aa545937633763deee766ca846f70b6308b937c91b16af3028b5ef368ba88d9ed78b376471d308cc075c26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a2095d7b208d2cca9512ffa2384d33

    SHA1

    28e3abad3c746edf3a3960cc8dfe3e75cb6467f1

    SHA256

    05bf2cb6cb0c973b661f661a625475f0cf02b3e04d9cbd07b2c033a4240a8131

    SHA512

    755ae65ee703556aa17b6cce644ebbea40ba9dad3629ed77a2a1dd2ca9740cffed34ec0e919400bfff0b4fa85c06bd558701fc80cb963b99966be703371cff40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c6fbe02947b3e2616146d1eb7fdf4f3

    SHA1

    2b77f30d77b2025f7b966726e6cfdf804117afda

    SHA256

    a428e95b17c14d17db09d8541c982d64daa7c7b4d23fdf8e6febb237a6c76f5a

    SHA512

    60d820fe79dfbec0a58f04009076b7d0ac294b97b027527f67e5e4b85593f475f5c560fd1b37cc205b6ee0e3e95323fd9816334df8798f6a6cd6b5354cfbf8cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12e561de78fb067a5eaf6e24254ff2a3

    SHA1

    6cc7aaee9d5762e40522733817f2db9f65b213f0

    SHA256

    4b77a19d30ad6f1571201041640934246d0de69ae12eba4c3734b67db81f5d9c

    SHA512

    c2b063a9d0c185c283ea113c11f3f7ea448f01376a9dec5327850c1a5807feea5f6fb1dab670d4421328c845d51f4f68fa7f96d32c8e9189b8e75e944f866436

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a46e7064c92c6b6c4c461151cd4a2ba6

    SHA1

    f83888bbac427433d5bdeefc96c9cca6692c0f34

    SHA256

    d63f3f871584106f613e80224b2ce32bc6db587079f78427e4778ef3d8a76d47

    SHA512

    fead8481b944c5d7c57ffb148043c64e363352f4d087d1afa3453ff7a6c2999b00ac48880a9ba409aa3322d36f247f60a4b55590eeac737adbd870236731801d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a7c2b843bea7654daddfcf09d0bd0c

    SHA1

    2646b848113a6e7724a359afad92bf9312e69055

    SHA256

    57d7c81e8248c99e4255949f174b5389fc2ab9d96474f8f012afb983a43c19f6

    SHA512

    4417179e38862c471373ef35c588b552810d7f0e6e0723f6061985eeec74bd6c14d0727e31d32791c846fba61349e11be2c9d2e7fc5f9fde5e92828088a50fa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e1e12cb17c6b7f5206113fd2bb04c71

    SHA1

    61568291cdfe560cd97b85df4728f9bab350c8a6

    SHA256

    b67317ef234015a7ab0b83aeb3dc3cebb08aa9bc5602a3b68672eba7eece031b

    SHA512

    217f7c7a5f5e19d3bf54a3c69ef84549b2741329763e5e3d66954f6568f73acb06c805098b350424ef64e669efe9c9eda003b57d1d9efaf2a7b15973028a5677

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e03a0974962df2f8c37ae81aec0cefec

    SHA1

    93fd9fe5bd90d982c9bb1b805fb43950f98afc75

    SHA256

    16e58560f180a00ed848ac80fc96786feb35478d2402f0da1bcc079cc749c43f

    SHA512

    51954fab911d18ca33f72ec8ee676791ccb2336bf7b1924f956bab9ea4f5fa41bf5639398d32748a91e776d82db81dba9f4d6e4016ed8dbd4d9295f4070750b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    075428c20f6b6f230db7928890aeef86

    SHA1

    823955af50b02cc98ec046f793ee98712561c68d

    SHA256

    a57919b7c4e302f612161da8e27587874368365dda44926e8accdb5f39830e73

    SHA512

    eae6572a4ae0bf0436b22dd2bb1d6703e52b38048d99e6f4499ae4bb9c6fef66848adebe5042efcc0ea58cffaf72ba87edc7e82b89c2df5b9c366fa55a27ed56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e6ac3a7f8f57ea0dca060b4d52e9641

    SHA1

    b50097371e7779fcb6822f60a2d398fa56be27a4

    SHA256

    d68ab60c9595efb7256d0024c31eddc84a0c1fd8280fceb0542bcb7b123003a8

    SHA512

    dd91cde3614c64510a13853371feeb822dbfb6ebfc178923dd4d83e8c524320b9f034528255a04f234151b714f613016c455362b5cfe8319ff1345cdf3fd4157

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bl977i7\imagestore.dat

    Filesize

    2KB

    MD5

    8c537a796f82fb9778f8007bc0193a70

    SHA1

    54610bbb9e3e490fafa4ee1e86336ecce49cbd54

    SHA256

    d7a895be350179316c8c78dd9eded63673a7115122185821db67402ef99ab535

    SHA512

    a2cda514f5dd9ee3edefed99ac3fad66c26fbfaa0a7655d04a038e43afba75a413c469d1dd8fb17e0f9ebe28258f5240d9849ccacf250dd56a19705e66ba1f7e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\favicon-32x32[1].png

    Filesize

    2KB

    MD5

    df4253088bb850c76f81c91db284d4f7

    SHA1

    46e3e3c42a159f22038d86bf39fbde118c91dcbf

    SHA256

    590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72

    SHA512

    7804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22

  • C:\Users\Admin\AppData\Local\Temp\CabA7B7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA7B6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2384-0-0x00000000010A1000-0x00000000010A6000-memory.dmp

    Filesize

    20KB

  • memory/2384-1-0x00000000010A0000-0x0000000001109000-memory.dmp

    Filesize

    420KB

  • memory/2384-2-0x00000000010A0000-0x0000000001109000-memory.dmp

    Filesize

    420KB