Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 01:30

General

  • Target

    d6eaffde1d68b9ca67bc03e5673383a0N.exe

  • Size

    44KB

  • MD5

    d6eaffde1d68b9ca67bc03e5673383a0

  • SHA1

    94d2a840b4aab595bea80f6acdb16425ce06e7ff

  • SHA256

    f8083d23e0bcdee37586bb822d782910890ec8a902c0281efd7a390b8ad7d937

  • SHA512

    16cc9e08670434ad5474357f9aa5a0c7d4e88eec2358316d817f8bd37c41347fe09854cda1b5c6ec276af1e6959b9ae73712411ac8b10ede9ec5718d31338b2d

  • SSDEEP

    768:x+QqD1szCwSi0HYUKOQsefShsvBQnWTKy+Lduwf5g9K+4XpNTXl:UQqD1s3wcyhsv/AlaiXl

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6eaffde1d68b9ca67bc03e5673383a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d6eaffde1d68b9ca67bc03e5673383a0N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://bbb.globo.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    279d0cbd36d9387b9e23777567e01d22

    SHA1

    824645f49c16f48213096128efab078c9c81776b

    SHA256

    aab9696726e22929634449b6a115bd5e524e1148c046da0647c366c2945a2c2f

    SHA512

    49f99495539dfc4ee8f613fe0599c3c12cd11acd019a2af154b9b475c788f71da195b50f593b14ab56d0a433cd13f7106805bbb3d67777b51e306f0b1b1291a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    145bb4d1a0a13da3ef5ad82f8cf94758

    SHA1

    65e8d3ff80481c412526881044996a7d6847bf2a

    SHA256

    99b4192ed5d23d4e445c9bf4805933c5113545db1e984abda434566435d5eaa2

    SHA512

    2c52fe4d51c9ed72352f28138e70eb92da363189a5209fed01de11db85215103fcdf79e4a1c12941c95ec5fd69c2abaa7690a3788e1d6068bc276d330748d604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41eb2a185ea5c76c55dc4f644d0e71d5

    SHA1

    1306404f777164772018feef9f9058a76273a38f

    SHA256

    1cafe04581a1b8403c72b1b354091bf2ec353e69886224683ee1b3999d9e2bcb

    SHA512

    0dcd03a2a631f50ff780d4c710bfa51352e8abb67e0da575f38129b558b993515e624f8216df8ec58931162d12f227d245f321a80a951fdca76b213ea6f4ccf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33ac918e1cd8a62ea6c0851a9c0688fe

    SHA1

    9b03b2601b620e189c1cc029ea9ac00cab705196

    SHA256

    de75a4690d7cc7cc9171ef09d49e180e04d0baaf0b0c2f46b352d706585fd840

    SHA512

    efe6ffd35d33f4ab60f5ef40ea51cba9a2e429d26b4c17bed61e46721d5e6fb2511570ce839e9d85807214c32cfef438d23d0af3600a0957ad49470c5bd90cdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da840f7799babc26524f14cf17725f5d

    SHA1

    be3e6fd2fc1008ebbb0638cb60ce92de7b113b45

    SHA256

    d4173e2b5b1a8c9b0e90d434d5b93c779f697975b73d1f3dde5e866963648d39

    SHA512

    3e996ea6a64400924fa4fa37938c862a73831a9a75e8c64809d77e9e0bde51e08d906e063f3cf5acb7e1490165b746b7c576c69db334c2d35873b96ecd1ca46c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b88f4cd41b6d885e20db16c8854f42d

    SHA1

    2b92fe6753bdf47e2469ccf8608c83ef2fa97ba4

    SHA256

    44509d46de5203f45c5a6cfd0aa75988ff3aacff397f209e8f9fe4db02a4e54e

    SHA512

    c3e8a0d0e13543ef7c8ee2ead6aa8f7f261153a566ba4328bc697e5f2523242d9daaf655a9ed9ea1097da94c03c9d1fa691f226c49c02591f0b07861ad16596e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    209309f04fe34ec0cc7450408a098df0

    SHA1

    048a38a4ed1c016487312884c8a11fdab7d64f13

    SHA256

    7cc7bc544c0251a0428fddfc33f6c887c023f81a5275edf1f2ea2f5e4aa612b5

    SHA512

    a422b57fc137a0b73e584d0e625952dfe903508efcd663b4e0c1dc9cef4c9cff721711f9c75a28650a816dcb01efbaff2163cb95dd55b482204dfcbd97dcd14f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e902cd8afa22ea5f688516e74d4bb764

    SHA1

    82ea5a860ef62c40047f5691f6c1dcbeb3e279c5

    SHA256

    c37bcc5f03d60b7f6b5de3d5daa7e60b2ec66fcb9f1c327acf35333cabc43d33

    SHA512

    bcbf6073f9fec73d29281d8035887fe13b923f771c5c6aacc45077074d88f96816a7afacbbdfd977e2fb87ce22f144e1a07f18dbad052a8f6e877c0dad30c490

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    729d0620e5cabf3607c68be92172c3cc

    SHA1

    59ccd63400a609892d3206a29f309f8c84b7622c

    SHA256

    6594afa6c3c5eb559544a3437eb77dff1119a82c6f200f8f68c7fee1c141713d

    SHA512

    7bc069a3b430d1775627984cf95f7620f82f3352f0d955ca462528fa262c640de719c84432a5c2a3940ea20412eedc7f4eec1f974cea76d615871f8e182217fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    004b75445d0be52da3f10e8b269ea764

    SHA1

    d499666a7c3ba59e580beb92fdecb87b3a57c70d

    SHA256

    5cdafdcd5c7e0af78d6c0f974b0eee3651f4e411143c1d43cd8623e63a8ebb89

    SHA512

    8576f131482f24e5e9bbd062c0cb1ca49bc9c4c43628aef461e3992d74a9a2805e066841101e92a05e6fbba30cee48727e87b5c3d4036f1dfef0c7b6d0fff84d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2293302e50eaf061a51c5074998be485

    SHA1

    f703a9097fc4e2e7f12a8df2b9a1abcfead12075

    SHA256

    03064a00f12ad0ee5dee9bfe7bf81e0e00876658703a803909a63cb594bd8b86

    SHA512

    794e78b2578848d33265264303e92996ebc855423a5fc960c67973b0593729ffd8b49bca86ef219fd73127f898484ddd7d589399087d3ceb27f146ca54287092

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    554f90120dab562067a2306a15dbabfb

    SHA1

    2b7d4f124f72558f54221fa0cb3b39076821bad6

    SHA256

    dffeaa5f9cd2a70d07fc411fde6c238217f2053bf164fcbef22bc4a8700cf663

    SHA512

    8e26644bba93c307909b5f1e77d33a24d0899bb413851ce5b8a6a33aae57ba5c6717a739da45819eea19935180f1ab641757920be71ee9e6fd8c393d49320f03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b395a9a9f0981de97eb6893f13de3886

    SHA1

    9b4c4d5b55845adc9146eaffa147f5fbca1c8be6

    SHA256

    b824533c6ca380748d24171080f2b242f08f0140f5011259a61f7c35c63b836c

    SHA512

    3e5d7e784cddc40ff51e6dd50ad7eb7ae05d58732db272bb50ab7da45296a7de55d4edae4da69d5317d4eb5b3616b9aa58955afffc1f23c9b39001fa2971182d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    319d1482ffc7e80e57dab428ab0453f2

    SHA1

    b8681bd2de57f41b02195dbbdd22f53b6997e5f2

    SHA256

    918c50ee06f504a7dc23e6005fa1eedb504fa70120002c7a2fd9e3cdf376416c

    SHA512

    2a09ef82858a36e4aeaee4f979ba35b11ad0edc7ca7ff8a8da1764318fb15be146cacafca4edd7c83768d8844490e0c95fb540da098827f4a5dab1f6905ba5b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e44e65150a8dc1a5cb9d65d7c92c654

    SHA1

    d889ccc8b9379d377ba4c01d28e05897051f60fd

    SHA256

    6868a5fc55125b44e7576f4d939cbaccd33ed406ce4d19d53824c3f97712bd7f

    SHA512

    8c9882ca697abefb0b21465d2f579f20edb93aee4c776e2f9d56e95e9cfa4408862ceca200894c254664695cc9dfa42541c8c84854121dd1f2fb2f7e9b96aaa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bc16049c8845914086cef674ff8ec0c

    SHA1

    b62d81f0964fd42d18dd9502df264bea41ec1fe6

    SHA256

    92b2601cbb0bf1777da920ed8073351458968eb4c9d122235073e4c1332f2bf6

    SHA512

    f416cfe9cf670445a7a630ab0108280b0d705b51f566eb4fcbf1bdf48b84f1b29fff632b9502c641118ecff74bb7bae137ed629576d03f7b5a2b34fc9a0162e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e0572205249b493d41f9fcf2a94d417

    SHA1

    b02df08254dbe9bbaa20b3afd032956dbc82ec12

    SHA256

    24ada18d166203905c40146290076764649bdfcfc66956bf6c1a705bc0c3e1de

    SHA512

    6acc6e81b68fc98f998e5e2c2a6b30a429b6237aee0d9e3f18f53fd03a41e0962dd27a939d7c6051bfc20e66db394949a9f01184e04a4f7a35aa7928d23e4b70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3a0f10bc4e565739e82eabe58459780

    SHA1

    919e52b74d01915c673948279a1838cac9687094

    SHA256

    0ba10a0926a149f1c008a67e205a0b2a75dd3a2d74b361c35fa5998dd54261e7

    SHA512

    81fa30cc42b45be7e3a13a3e171a310688617eb5033e073c01787737be202292af16db4917eb7eca88d52ae6374c6afcbbb292eb3d9e90f042b21effed79b474

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57a619da8a2fe49e46b4ab6e19c2d66e

    SHA1

    fcb6eb139734d9a36016ea31422069f2416ceedc

    SHA256

    5e39cd06280ac839d6547f530146059d555bbecf040b9e3b5ed8d529ea82b6af

    SHA512

    eb2d7e945e01c7eb92952ca5038f8a9af09867fedbad8805280457b177f01a17a98b3b8a1072cd70759c006ac91c6b7e9bdb6bc0d392e0caac89c2cec33ec1c0

  • C:\Users\Admin\AppData\Local\Temp\Cab2494.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2542.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\cmrss.exe

    Filesize

    186B

    MD5

    ddd7b9de2762817229b19dcca8e0c7ee

    SHA1

    709f7e1d87760ac2fd5423af466ddfc04090f1bd

    SHA256

    ed0c11884bf8d6680a7b9d9f96795df47aeaec1390d1d27acc228f80199aa72a

    SHA512

    80af0d507dcf9daed8bf0e967618a5fc4b5541076527f8b3af458b480bbeb060ffb6d2fc6c54eac1c2aab7e18192b8a00b8b4e9ae3dfc8cb809bcac1b25d86ec

  • memory/2660-10-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB