Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
MintInjector.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MintInjector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
mintAPI.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mintAPI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
mintUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
mintUI.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
mintUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
mintUI.exe
Resource
win10v2004-20240802-en
General
-
Target
mintUI.exe
-
Size
135KB
-
MD5
cb0e4661360da0f42150d0764bece8ca
-
SHA1
54cbbdba26e0d012c56d56e5d0ce2e2ac16e7aa4
-
SHA256
a91f5c498df6682fdc690b9322586617dfaf938ee811f7e53361a0e3206ba114
-
SHA512
97d1b141517bb2f0ee05a86ca1a19de34688e958b68922001d1d8293a85dc7b7474a4834ef647ccf85d8a427cb52cd67fd762c92da4eee7206616d7df8432e75
-
SSDEEP
3072:ajK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOQhBum:ajK4TDUqgpqWDLZ5H+xuZ047hA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 2340 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602cb0461c15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78594E91-810F-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000067d38ec0d082cb262729a48863dc82dde1d07b511d148490a5d137406cae46a1000000000e800000000200002000000069799778bd88475db9e2903e5c35753a524ab6e93f50e077e3fd6a291647a5752000000075aa31e1021a899366827e4be6be034689dcd61074ecd08df49df059c9c73c02400000002207544fc6d834f5379f225b2bfc41e0cf35ccaca2df82ac95bc25e97ddabc146fa822121e9d899fb22aa8cb15975eb6d9fe1f2b3bbf126b60ffd29ebf5dda08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2340 2172 mintUI.exe 31 PID 2172 wrote to memory of 2340 2172 mintUI.exe 31 PID 2172 wrote to memory of 2340 2172 mintUI.exe 31 PID 2340 wrote to memory of 2200 2340 iexplore.exe 32 PID 2340 wrote to memory of 2200 2340 iexplore.exe 32 PID 2340 wrote to memory of 2200 2340 iexplore.exe 32 PID 2340 wrote to memory of 2200 2340 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\mintUI.exe"C:\Users\Admin\AppData\Local\Temp\mintUI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.8&gui=true2⤵
- System Time Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b924b4838cfede7dd4fa47ff626914
SHA1239876fa4c8c66145139c584fe60c9c1501a8b4b
SHA256d909e1b035d7348632aef5f5b98f215ccc3d751b213ab5f142342c90a4868130
SHA512ac3e83457fee306d2a907dad5a51d148554ef48e1782aee294a4499d897194ec1b6442af1697891b44ea0e9e2211c77c5bc5f6987c78e39cacb4cd7b43ebfacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28082a0789096e4e06feb546de09aaa
SHA12775b5fd6a221f87ee03b7e23603d079e7bb43b7
SHA25614a2b93da216e49e8437424eeaa4481a400dba3a0f44d4488ddb7ad538709c96
SHA512748f323d2c3e321a9a85523677f5a2f67ce1d9da0ff8b21932f3e9de69149359e2b02128a9a87bf5302a17ee34aee407824bb99729cb63f8bf3c27e59616176b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc850eeabdcc3faac2f773cd46ec5704
SHA14516cdb1a3bdf8db4140560141743f72406e0c55
SHA2568e5aa96fbb1cd6a537f43ff32c6c5349a19cdf818bddfc0e4a22a64c6d0eee2a
SHA51266299bb3d09391789c40beb143e3f2122c76b02a9daef613ac5cb49643a1298dc217e3fdaa185bf06b555ca490837cc087e0d235947290da5d914b70bd98afba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8b0c18af8027a12dea0d350a0560ab
SHA1c3d70515c02849517cf00ede26a4c5279ff87d86
SHA25681f94f79ecce7cc400cfd763138737f4f2e63daa191ae99c7e126c5bc9b82d11
SHA51213ac74a96f22f672bf599b1ba2896cbab74b159ce500a56f4deae5f79917759845491632c1440b78e68716d2181051ce17fdfc7c1a03d036ac3cb57d546908d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cf01de81291c8ab71ee33732e8870e
SHA175cf1bbbb2dc9a820962a47fae8a74c79eeae52a
SHA25608cc3cd0fe18f94c60797ddc41db3481d2a029e168fef3f0e9b51eb2f461d61c
SHA5125759ff6157d4e9809a0887d285ae304a94439aedf27471a48a14f731267f3a31595ee4a572a636172c4fca80b07060bfbb6ffeb9dd182da2814bc46b5bd425d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585170042a3a9be6591cba2e88decce98
SHA12472f59019f7dcfb0d1353804b592fc259059030
SHA2563c64335bbce8bbc0edfb10f251553106fa053e8f07208ad326fa94e9b0e820fe
SHA512864a3741379cf4cfed96bc182f1b61ff84d64ae85f48290c8bf46f4c8730d4e3d8073b74a1aa5a7f73f81a094045dded8c9eeecfb74cf377c624dccf04f8073d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abef902b5e62c6ee8fae3560be3651f5
SHA12bdc1b1fcfe10ceb5930658888c811835681615f
SHA256d2ddf0b1864dfc2f31ec68f2790567c7a6f0b1840ec4c6565a7ee570f6a16521
SHA5123e103d6fca0c6b467cf204e80d6c4b19df641b72d273a73877cc03629599dbec82217d7507339d5559c1ee885a83ba9983038a634d91810707053400d7c41d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce55ce8158080ec166e0f4264ef7f085
SHA1d30e53efd2b4f027a85582bb0d775242c42ddda6
SHA2566ac7819d11e6e12ce8b8bb38522bd8aacc77a09e16dde60e916804c891458139
SHA512950b179df92b3b348cc8b722369786e468f85745f7b4e2c27ff56be771c9391894f3c8e3861bf5e25b98b92c96c7974ffe784a9a82924a798beffc133f8d5f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50957d01d6b0973b16bbf2262ddced15a
SHA1a5e53f04dcff398cc45cfcf5c408e9e3c1c84c9d
SHA2565846f10dc7dc2108f6ffab89681d5e481e966f8848014630fc1f55295774c10b
SHA512f2d0dbc91e3025268e5b907da0f38042b5573e49e2b5ab8dc5f90933662b4a7fb1f5820f3fdf562f9f4dc877a357cf3160da35c07a155332cf47a5b244bdef2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570db7d34564af7668aaa2b8520a93d9f
SHA1c26f7dcb8a3ca255f8d2d50a43d2ffbaba8eb2da
SHA256f1cd83c915f6ea0965a7414edb8300e08f4d076b6b6d8ace222e2a8073485867
SHA5127b6aded67c99a075b969560dbaf56757a4472df1f75fec355c09ae03d74fe09ef7a6674a03e39f9c38196bbc4c453b64d5f580a564d175b10e90c0bc8f82bcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d060701fdf68c49e8e2eeea1a6de77
SHA1740f5b3127ecc5a66d9422474587da38ea390bab
SHA25617ecdee75e4134ac8795f577ded52c359369d69dd1ccb742012b3959bc7562e0
SHA51200382ad00d8ebbc43f65c2007ca942c071e6f320236ecee37f1627b3f77eecf03ba2463d098933cf7678ccbf5385957b2766337cdcf5d4121278717d298afd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528352dddbcc052ae2232277c7a81eabc
SHA16c60416774c9af123664edcde6b6c03517b407b2
SHA2569ec5b81ff831c6795be48880d10b15133df25026cc72cfbf76aab43b53d9ffe5
SHA5129396bafb3ccddb031bfa20856d88746ca221311bec0866b1dc50d67e0ab59dd537a7698e0d1e2deafc1bc95e0267bf0738e761d7c721c9b1295cb8bf37a58579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdad7fd7c0750f9e2663c9244f3b4f9d
SHA15168e6c6b5df2ad3bb81d09aae12ae724327f00c
SHA256ffd29fa060a4aa5146c6c989c26a48ee92e59f490d4c89193fe1dba47cb9d448
SHA5124ae341a3e5754000ec2722f7b40905a7eed714088c54d80479c8b3bb3d9d212a2337e8a89cb81510ec15209356fd65d2d3f6fdf01ad1cbcfe9dd35cca5259708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026e99fa361c15b25776657504b4131f
SHA18ec3f5e21925dfbc8d3700f9e536bf214be12768
SHA2567676a2720283773189d97f0c72b9f487b5f2f0488e8ece5e6d992eac9bb5c613
SHA51256ddce2010ab875f3e876d6d227e564ccc3f96b3bf321f3b3de2e8b67b3121eafcfcee490124d938301a2f2d4d30229d278d6c6ef80d79a282b4d042d3b87f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac79e96a276193fbc850f94bc87aa5d
SHA146993e4683b087a70f458f9aff51025c9544aaf9
SHA2562962ca8e60730719d193c6988553dfc7ca835db80d479a54e17cd91aa45237be
SHA51254013dd79d7e0b5593dc1ad11477c606fdbbb4f597a379c7d0991a9c4a32489d3a46d01644988455a3dcb13485953fa1dba28f3194992d7bc874bb8cb7a7da99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ba2dfde4b650a04aa51997bdb05268
SHA1c7ddd4ff8a2304fd1b5ccb2a308cfde1fe662bc7
SHA256ec24f4dfb8c44c41aae2eead63be45f5dca4d7060339afc1ee9a83fc798d2cd2
SHA51216a3c426734f39e2f7b52428a1fcf86fac8d916aa9a3f682542019f01666549c7c25bffc673f2d069bd38c5ac13c3bbcd1fb8affb01aec8814517e30e1bf680f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdf756953301fb16eef154075de3112
SHA12ddf8542743f9ad679db71432a73e6c43a08f3ed
SHA2561a9c795aa973b7b87a7596da274aed2b6b11ff85bae903a402e10cccf3d51cc9
SHA512fdcc1f27b74ce7f03af801086f8faf5e4f66b2d82fbff97851996f5edde6e90df4512f6cf44ce080187008d124858e02082350bcdbcaec527badb81d899a3541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c179263b55b07ebceb8c1b15153769c3
SHA1fc53ad81fd95e7f02bc06eeed5c1f6f439ac2eb9
SHA256b7ff8ea3c08f67c83a92d9f0aab6955c41a4f4bd212ec7d890ff03ba7175a6b0
SHA512a269500bd6932ff6ec3809e38a012b8a6265b8494bcdbc4120c822539c52327f0b972d041e91109efa744dc4bcfb3979fe6597e2db3d8633c6fdd736341b68d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce423d6597f4294aae42488ea74f9d5
SHA1b0c94740497d4b0e5546994353096c3cedc8f788
SHA2561e28fd12a71f8410ca6861766a675cd5efabfbdee3f620ddf0c89a8da762546d
SHA5124797885882d78e784484ccef76b19f2cf66657a0372ee67f3584150f762ce6f96558591bd9132596352f9af12f47fccea6857f582322953dbb1f9d3855e3b3cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b