Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:27

General

  • Target

    $SMPROGRAMS//155ɫվ.lnk

  • Size

    350B

  • MD5

    2eefc9c46f6597c7b8e425f8c2130e64

  • SHA1

    4dbcb7c15a8624c9054debd1261963a35ccf8d74

  • SHA256

    7756423e3de11499438968c53aeb575285995045b33832d601612512dc9e2424

  • SHA512

    2226a924ccebfa75d3e6927d64c58917e27b57ae2af3fc658126902f511c3ea3c4f362306a7eeb6073445d3de48b125453756121d1ed3e694b5e44a5fdc23efc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$SMPROGRAMS\\155ɫվ.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.soft155.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b62eec4620bc948d9cd560919d80acc

    SHA1

    41a487bf2eb259a409d70a11eb3a27ffa4d09744

    SHA256

    31629e161fd243872032a836e48e01c8c18dc39fb10fe19a9216c774ab01481d

    SHA512

    d23a03bfaae7baeb7e76cd22811e609a57cee82e10ea1434d11461b5468b7ad73b45636fd0d7c7fdc9b1cc63788981d2ce6c8e69509372b27259d09bb9cfc857

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd144790420dcb22823c8098edba4c3f

    SHA1

    7147d4ff2329e413de570a5688285a26046ec01b

    SHA256

    a161eb26fbda860353f190162d9cc8f7745e953ba21f9fb4388eaeb78b353964

    SHA512

    1ab87e1a625912aed34bb5e7d7feb162aa5ce25c023cc44cbd7a2fc5cdf4c69de97fbb74e140f3fdf869664156f141318ec6e8f512c26bd77a1658c385f74cf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef91912eaddf7a3125ee250542e56fc5

    SHA1

    84d2b12263dd6d70b382ada54ca8a7b2df1d75c7

    SHA256

    71796f9987646e67b67cff23495ad591cb7cfc564130e50fb9a8b6c954767fbc

    SHA512

    bbf8af6d14b8cd2d5095179938e26e4919cfb72d4870c27527095aa9307a711ea74fb8e2ab07a4b0538356c1b68c38476b62bfd9d60150a09e7757918b9406c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbcec81360759d2b38da5f1a5210e412

    SHA1

    e02b0ef1e75caa0974fc5fc10903fca47721ca77

    SHA256

    dbc3e69f2cf72c57686dc03814f504556b1c974e785e8652987417e7b95b4af5

    SHA512

    db92b28913af418e478aba94e3eb38c51aba38452dfe5135bd5b8216e46e036cbcaadd1871aa2466b44186291663f4b30a3a749f46b26df0422a3f0126662e98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c963f18c86559620dcf65e9bec61243f

    SHA1

    24e8f4912da508b9ce7eddfdff97ac29105ca75f

    SHA256

    5d03947535fde95b8efcbee29e50fb048a7e137c27cd34f28f34fa8e1157c901

    SHA512

    840408ba7b31f599adb831c15856b65aef27c32c637a34ad0f604745cd01538369c8413b7a75db253ace76a416ad3abe8e7e4d3534fb3b9d8482a7cbd419a3d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a5cd860fa696dd4ad795f621d71418f

    SHA1

    6e106d72870d8e213dc0223af86eec3ad737acb3

    SHA256

    7e8ce009e676440c7af4c84b7275da9c41bd5700c6f27ca15f12ffbc9dcb8111

    SHA512

    c11b692b78e70af11cc4f33e158336832d65d1304d5c1f303560f98792ac0f4edb5885271ff2ab98b224d0743dd41c6cf6b0afb1f1fb9e38b4c27491c3455657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e69c391437b6dc41be7e3e0fc17dca3

    SHA1

    b53cbd89e3bbe1c0cf471a600b6607db62ca30b0

    SHA256

    719be0b2220771ad475c747c43525af18207171c3489b717c8b6ab12cda4defd

    SHA512

    87f286c1409bc15c810933463f2bdcfe74e7c27ad9237a2750455e6e0c8751e62a3df646c2d261723682c4c85aeaf5f071c0046fbe5c9a876a99e0b50e39c1fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dffd3d126a050e69136b9f152df03453

    SHA1

    2dc545e60bfd23d8b7a3e3b62945983cc5731bf9

    SHA256

    01e0dc67acf9118d7198c9990cb3225f8f961f832493eb3fb79bc4bbdfaad613

    SHA512

    7c66c4d7e2deec08b3cf9bccbf35deb7f7989b0d0ef292450156d9594109b94d85a782cfbc4100052ee28b4cbf3a93075b448e85bb84dba83acbd138ab69a3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    976822c635efcaf5056aeb9f7e1e8a81

    SHA1

    d3c800ece07eb05b7b89445e77782fdd29a57fdd

    SHA256

    4190c40f469447fa8416c1a5d045ae36d01aa36fb7a760b56de6d8f8cda079ad

    SHA512

    10f34fbaeed4f25b9c51406b982422b564ee455710f3f8f2ef5bfbc8b1db00fde97ae479f34483600ed1c00a3ffcc7897f83003ea940c26f9208b18b6532a5f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    344a2be2b794d6ebbc0e2580f4d617d3

    SHA1

    9a43a6383b3c930762e5ea3cd2e55fc3d2fa3964

    SHA256

    b5c606eec95cd739f792a71e5d36501a44b545ee70537b4c6cb3884d30cf8f4f

    SHA512

    24964558d70bc671a00bf0e03d9cc4af558f243213c398365052f6565b136fc6a8007ce3f5e3cd809e9a084db354dd10eacbbdf9c3aa4aa689cfa66fb03c6e8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df2a715b0e8970a6b74abf5d88fdd2e1

    SHA1

    ae1d7ef2c08ed4bae61e2b72f7bac4ce879cd6ec

    SHA256

    aa45647496a64aa1e96e2e63fb1a685f19430240c1d2c63ccc9e78ca5b6685b0

    SHA512

    5991149bf8e8153edbf8966d1917c038028fea4f88b565f6d04e0fc3957d1fb50424437745a94084ca707ecf62176f724abac083ab5e896c0c872d34047c286c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6658dcae752240f6443b55b2d32d8e2

    SHA1

    b2cef3c360205599980e6c5d17d1f2657f4d9704

    SHA256

    ad52cc2582e6aa48eb96ecd3171f612ef3705ddaf4595a7534c84c9a6be50b53

    SHA512

    a3463a9fa4d43e5d31e273c4570166931208b913c9390eb6e40228cea26b314d38a724f788e111e29fb34de3660a07f24734d56047e688837fd7c25d5870d139

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aef66f78db717974dfd461766c96881

    SHA1

    a28f580f330077cd5ce709b5065324ae0b84c084

    SHA256

    7e05b6ec0974606e0042f7c27582448d9c0107a06ec1e2829752e31eb70d1f34

    SHA512

    fc5f4f86f11f0056f94867e52879889945f988794cf935328edcb404e56ed7f31e7da6fb929207ad0e55778e806b1af82f6fe0e5e786bdd6eca83cbba31d1642

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbeafc378d835a758ae8d3a80af8ea4b

    SHA1

    1dbd05664f4d1e1296757beb532006cba52e37fe

    SHA256

    a6d6485e9239b82c822aec2db01f70d885042cf457e9dc30d08745999052f655

    SHA512

    a84304b5da3cbf469909d47a013722c220301cf80707c1d835ff320147ff46f9db9277210a49d968d317cf60bff9edb166f1ce314c0761abc91b52fae1d3c64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a06f595f0fd680eedd50cd0544d230c

    SHA1

    0496eb40557fcafdf56e6dc7f28d29caffbda85d

    SHA256

    ec53afff4e98c5527f5a75190c8efeefaa17ae3df4a4056c547a0deaaca8930b

    SHA512

    1ea147f3daa457db7e8ce70c4a278ae5d8b16a764bd0b8d7857e0aa8911899e6bebcdd0ef97e51abf7542745b0a9059496810c370a12e5f7f679166003a42f01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4e4684b227a3d0df8fda7b6eaa620c2

    SHA1

    42e9171f534b19706f1bb0e2304795e3f7ef39e3

    SHA256

    83547a45ae006084d74446ba1e9b9cb83dc25e9e04e3c6f685746d17c49aeb8a

    SHA512

    013d13c973effe07c8978c9d085ddc2e5818f60e2877b10bf2d21d58c7bb2b0db8ebb9bd9b869394b2476e824b01a9c2e19696a9ae4887e103bc184edae8fbf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b339a0e1d5feaaf782babd37cc9fb51

    SHA1

    e0d15c467040f46753406451dcaf0f870d88f1bf

    SHA256

    0b4729e1882fd949535c9c31186a364aa33f77dd6d4ae633b887e5e6d0b6fc2c

    SHA512

    c9b93fa70223a40056d2840551f30909466a285cc3c1292021af53f924cff2aa4e3c44589842d2add51dcb478c4d5287a3f1921940384e12b67c5f21d2273e61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f3e9e48bab32d8b0f3d220d51e9fbb1

    SHA1

    61a63cd3fa067cbeb79bc294de8b4dae3db5124b

    SHA256

    c0cf099d3b175e02437b7a35fe1eedee18acce767b68120795254de3b88f3ebe

    SHA512

    70c534211b8036d29d973659017bed9b1a20d900f40ae723a7eb4cc854e4db19cb4f0acc4bdefff6fcc48f10249f5d534e27656a09922b0a0101f262008f379a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\njqq61f\imagestore.dat

    Filesize

    8KB

    MD5

    fe7d31c0ceb1905468cef77d2b231781

    SHA1

    ce86dfb289356c04fc9404bc2d476e688b8acd48

    SHA256

    4b4f8ea33cdedb92d457d23ada080468ef4e83ce1d25d90378a7a9f444d6952e

    SHA512

    4d184b48a9b8adbc825b15108791fe707184fbb702df4f428a6ae0106ffd7f5e9f631be02307e4cccfabff35fb3264690d1a191f2dc84542e58f897efd2abccf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\favicon[1].ico

    Filesize

    7KB

    MD5

    08fb0139e6adf41c8daa4d5781bd3bf9

    SHA1

    c3402e3631daa7ffe5cc8fb70758ca16397d249e

    SHA256

    d383f96417f493626b0414711d0b2b19430d87fb1c936a99fc76216e112b38fc

    SHA512

    9902d967caaea37a2d40cfb800530cb778132db455d0fe2fd62c9e3e2636bff8ae66a33126d8246f962e006f6b3a968bd461f1b8077c504a79769130408c52dd

  • C:\Users\Admin\AppData\Local\Temp\CabB253.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB254.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1804-33-0x0000000002300000-0x0000000002400000-memory.dmp

    Filesize

    1024KB

  • memory/1804-34-0x0000000002300000-0x0000000002400000-memory.dmp

    Filesize

    1024KB

  • memory/1804-32-0x0000000002300000-0x0000000002400000-memory.dmp

    Filesize

    1024KB