Analysis

  • max time kernel
    119s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:34

General

  • Target

    TGMacro.exe

  • Size

    1.1MB

  • MD5

    42b9eb8bf1d2d2aabda3977656af4364

  • SHA1

    23f44de466b8dd6c22946492e11d987920541bff

  • SHA256

    b9f7da1c4a8f358d38be737a6c5f847b9e15be75e6a3602390b6d99be5358968

  • SHA512

    1adcab31d50d6a2fa7254a5ce8cfa92e1e539441d79721cf2bbdf578f04b042e99a5687a9c9b7ffdb9de62d51532582fc9d37ff5985afdb436b3bda08e36e783

  • SSDEEP

    6144:nHHj/z4FzwtihGPA5dpUymFEymFEymFEymFEymFTymF8ymFYRM3GWOBymqP8:Hgz9hrnssssjajRM3BOo4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TGMacro.exe
    "C:\Users\Admin\AppData\Local\Temp\TGMacro.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.trksyln.net/tgmacro/download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5f85a3e9a85671a7b7beab94b3dc366

    SHA1

    c2c9e9fac80bbd977eda965f654e7893baa1518b

    SHA256

    0610f319a964329fe548bb4f323fa31d9e2dc5f65037d3fc9a54be88e060d967

    SHA512

    4c65d9f60bec954a100b2c5f48e7dd77d2292adc3577c34c11abd8af0d0f7aef5df125a0016643ffd9be65f6ccf36b46ed4c5de05edaab2d76059b86a0ee337f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b8f82f4f27c58da16af663de6c2f243

    SHA1

    08f7cc47fc4c5e8ada089d8de698ae71381deae1

    SHA256

    e441d6598bd9de9f8a4bc87580c7d1481a075dfd3fea7a92768cb118382d2f2a

    SHA512

    6fd07c240f2f872e8bcf072bfdfccd5b931ce244b19d3ffef756693ecb6a9da8c1a8bf7f7a66ee5e50f129c76f3e609842738076b673f66692fcdef0b391e0a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da12e6fb414a76464cde7fb49bb11586

    SHA1

    5fcd7082c352f497595a1467b743b1a5da123fc2

    SHA256

    5084be3ac60f36b149fbf1b2be6f1dc111f3f238dd3ada4cb740630fa9e1e28b

    SHA512

    3befc5accd97347c0d2e601028de3af89d0b93a45d0cd8819ed14b9d5eb0ac99db55ce35e33f1aed784b9e1b984ea7e0769917ec5e8c994554cc930f95375031

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    507728b1b16013a46c4bf71843ca16f6

    SHA1

    0294b953f90b696126a25a3ca20b2dda1d0a6b41

    SHA256

    0d43e1a920a29cd6fe780a204f21cb1761de55021d6e3900010d564ede5a5917

    SHA512

    f70155a95fc1b2e547af10582d0a25cbb8383e3d44d75c064a65682e2b141edaa7d3ebbd695d91b960e8012b2bf5a2679fafcebba313cf0d1fd7cef5237d2a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc230904f28d33114f3a990c64715ff8

    SHA1

    6ca17beb18cd57f6eb09911cb01e4c2202e7d824

    SHA256

    2551ff3b8f935c7ea85c12cd12a0803f3be7a3272eb837ea8a7e0062bf3bdf53

    SHA512

    5e77da268b40ad540d2b61809ab9ef1c165a11ae58d6e71cf5ba01743594eade5381966637179bd41171508448606f8cbc2bc0ff515d5900fa0a9a2f7500e294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5d0006740de1ddfe17906d3f29bc07c

    SHA1

    7a7d9a8dc9fd558ccbb11a7a8d57f3ce1f1b4208

    SHA256

    7d5a7df760ee29e0896a02ee6b9c941cf4cbaff2a6e0c637ccd8672672d6a8f9

    SHA512

    eaf4a449f46689e624d9e2f7d6b920ba3c165ce037e9dd8560beb05165df984475a0820b07c8c32349f5f4eecfc25e1be988a8471f399f52fc852cb5adbebfa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    612b5833698c483cbf5db05b5e011ca6

    SHA1

    06a84ca5a6f9d0ba32d5a016e109a5d3f253de71

    SHA256

    1b76a0857f07e95812bc8eacf55858cd8571ffa668bc1c1cae324afdeda352e4

    SHA512

    243822eb3c78cc5d13da46a9e21d5a2812aaeeb574cd0462c66d837cdc9f6ca45ab20ff46155ab2ac566803720edccf539dc4b07b51b870d213514fe41aab282

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8409095f382e84d745d18f04f2f04361

    SHA1

    19ff34a0299fba088c6c2fcf5a5b2e642a8920fe

    SHA256

    25d372b1c0325b88e3d949706935db51a74a5f16c21d78ec9a94fed571874dac

    SHA512

    d2648eb809cfc9f22c9086cd3b0401faee78710351c65c5da766d543d838c03861b35497d1e57c5e56868424b5a62fce7af27b182dd8d9afe38186d7c67610f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6aab0d01bb88f0152984163a9445aff

    SHA1

    20cf702b353aab14c3c769c91950154fdf5a0751

    SHA256

    f1c16cba7a87b0baef6b72854220111098140013233f0d8f6cf6532e0e7498da

    SHA512

    080b91c4bc91fbf307f8994a1e35bb3473bb8efbcd8abdb8a6466f2df59125d791e369545f9d4c9f061a4f9abacdbe936b54a7397ecf46b197f61e809352395e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c72ecaa6cc9e340caff1734003dc9a4

    SHA1

    4c24ce2457b8576a5c3cbcc2a78d9a0aaaf00ac5

    SHA256

    1afea11e3bbd71123978a178d1b6179e5142c95bc1490cc6249145e347e388e2

    SHA512

    0c1dde9b0dc7262361df199a47aad2e9606e3528df943ecd69d28756481e702cfa7468a3c7ebe80b798e241a4ce64e676cdf2c01155da8e819bbb800a93b9567

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32119e7c77a77e8b7cebc82a941b1b8f

    SHA1

    876ec3cb38db150c9cb0aae2e657ccafb2f50f15

    SHA256

    2869b0208097b08c4ecbced183c672fe53e29ddf07ae8bcf0c1f4cc8e33bc66b

    SHA512

    3a390216ee67f7292231d4c78261c2897a74dc5aafba7c69680c369723f217a2855a4d92155a40eff3c6f917dd7f8e19eddec2c63a8479e345ae6a9697ee03cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4665d6ed7a796fee217866667cdfbe5

    SHA1

    10db28dfe5da05801b6a748371f7915e2580eb38

    SHA256

    eb819c8cb92c752e4ae3bd8943a61243ca87f4ef1c692a2130a6d50506135f21

    SHA512

    e5d06cbeb6f6a761e67b5f3ec54bbb8bcb3f0aa55575cdccc72adde56a8c3927ffbcf59c780230548a88f1e86b407eb800d667ddca11d7042647b803717113d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1be04f3f12864e5b4d2cff8528f1f446

    SHA1

    8cf2439f8364a2a67f6a348b7ffe8c8046ee6fa6

    SHA256

    d3cb03558e2e512df1a505c8ff763644d9f03ea551f5b7ef4e0ed02f466e43d7

    SHA512

    0f267c8cb589d3091b21a8fbe2b6047dde9093ee3e4488d0faab37740a2d209234aa894281f38c4b05c1631c9ebaa3c2a9c0cbdfcb052dcd75176d20eb78092e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51976fc4ced6f236ccf7fe633f4d2ca8

    SHA1

    2d04e719a7b584455b44809c59bccddc2fb8a73d

    SHA256

    190a2c84511e9d6e2c524e7418729b124cbc8eff5ae1003852c4565a63d048a6

    SHA512

    1582aafae53b2b15f5e0fb39fedf08583dc2aa36145a360663af93fecde249df4f6dae3453c732df4a1c073b9150c26900e0e022e161803c04a22d53eed996da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff1eeb02c1ce89505f6e8aaae7fb5f90

    SHA1

    81f936d96e67c05fd2b71a5208023bbfe83fe86e

    SHA256

    cb6acd29381eb415a3707e43671996d736c2fc2b2936878a50024b043ea461ca

    SHA512

    f725003be86f1ef4e11d4fd47ba3f51b9f4bb7282167284c4a32be900b10149d1b3bd3848e9b66ce3a88c2f6921d2f2e286386faa55ea3c06d093b5331268d22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0879864e0f8b7bc87b52a097e3f01636

    SHA1

    7821df4c17ba2d86e56e3a505952dc3a959b20a2

    SHA256

    03342fbd867a189cf04bc8a21d9388d3966199ff03059923acdfd7560c83b193

    SHA512

    f1d1fdc4944f13d02cab6128fd5c148995e1918149d26b58d109baf2411dd8fc19509ce11eeca90802d329a9bb09df4c1ffadf7cb0ba676343018211c29a8a77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    370f1ef9cfd968a0d92af0e5b4218bad

    SHA1

    b891e8fecbe61e22513b8c01ec7ca4ad4aba27a2

    SHA256

    b0f9ee3d37e6c4c88c854c929ef4ce569fd46930a055353a0850fbd5497e80af

    SHA512

    107fb41c273d3a0a7cb140e77ff8f176ea327731bfd8af94648d89889c879204ed0c80931302cc0a568976fc7523d486ed3913c029252815e2e53626c6e616dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd7b99b7da6007525bf7af9e235576bb

    SHA1

    12ee48ec11bedb2f86609a3ac3b36007c162fced

    SHA256

    3454f41ac5916cdaf693635bc1c107e91fba218c3e698022a908aebef24c64eb

    SHA512

    5550cb89e5dcf36392c5b1edf5ebb6411af97a31f989c4eb61d82d02bdb8868fe3b5d466a459e594887aabd1a00130024070dfd244343928fabfaa6259085ef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    694d694cdc2c3fff2bb72693b973f39a

    SHA1

    d6dad7f8d821f1c6112af8979068c37d61f16429

    SHA256

    637b1f5cfc8b0f3ab0905fcb767bd8e9a5fbb9432a1fa8d229702de97fe4c5b4

    SHA512

    d20279a5820c6ef9bb7b5a5ac4dea8f9e3a6a8e89dba44e36577317e4266a36042046d2e53e19d0ee5ae4241a6e3bd3bbabd7e037a8a9b59b5e7a371f23cd976

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5325e08d1bc16eb9622173e78fbe58f7

    SHA1

    e5c7321bf9379e478d61d81cd1ced517735cdb30

    SHA256

    4bbb2b4f60c20672a260f6c5261918ebf08fedb818713ab34da1f4d2c738d723

    SHA512

    056da262de57b308a770f297cab4b40801189f51239a2526bf83d2087c6cc630d023c7e105883a4f4199c73e3ec1ac7ae046eb135b59a71e2670c145bf53f013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37a4dc65e56383dc899ed71a3c226af2

    SHA1

    74560c8b73585a726dd78318311dc797b272581d

    SHA256

    eb7b05aa86cc54ed7955824134a56b02db2a894319358ebc011551e5ff8b1792

    SHA512

    a1eb93b681cd1807edff1ea3b3d4826ecdee8fb69dc5bf824eb1f42491f3a4abd4d6bebc8be31ad342c0d2ca48a2b82c21c129d73a779d841cb747d57c3c7d6f

  • C:\Users\Admin\AppData\Local\Temp\Cab67BB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar685A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2972-1-0x00000000010F0000-0x0000000001210000-memory.dmp

    Filesize

    1.1MB

  • memory/2972-2-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2972-3-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2972-0-0x000007FEF5803000-0x000007FEF5804000-memory.dmp

    Filesize

    4KB