Resubmissions

02-10-2024 22:41

241002-2l6leavdlb 9

27-09-2024 21:32

240927-1d47ya1aqr 10

Analysis

  • max time kernel
    27s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 22:41

General

  • Target

    mintUI.exe

  • Size

    135KB

  • MD5

    cb0e4661360da0f42150d0764bece8ca

  • SHA1

    54cbbdba26e0d012c56d56e5d0ce2e2ac16e7aa4

  • SHA256

    a91f5c498df6682fdc690b9322586617dfaf938ee811f7e53361a0e3206ba114

  • SHA512

    97d1b141517bb2f0ee05a86ca1a19de34688e958b68922001d1d8293a85dc7b7474a4834ef647ccf85d8a427cb52cd67fd762c92da4eee7206616d7df8432e75

  • SSDEEP

    3072:ajK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOQhBum:ajK4TDUqgpqWDLZ5H+xuZ047hA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mintUI.exe
    "C:\Users\Admin\AppData\Local\Temp\mintUI.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.8&gui=true
      2⤵
      • System Time Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6b924b4838cfede7dd4fa47ff626914

    SHA1

    239876fa4c8c66145139c584fe60c9c1501a8b4b

    SHA256

    d909e1b035d7348632aef5f5b98f215ccc3d751b213ab5f142342c90a4868130

    SHA512

    ac3e83457fee306d2a907dad5a51d148554ef48e1782aee294a4499d897194ec1b6442af1697891b44ea0e9e2211c77c5bc5f6987c78e39cacb4cd7b43ebfacd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b28082a0789096e4e06feb546de09aaa

    SHA1

    2775b5fd6a221f87ee03b7e23603d079e7bb43b7

    SHA256

    14a2b93da216e49e8437424eeaa4481a400dba3a0f44d4488ddb7ad538709c96

    SHA512

    748f323d2c3e321a9a85523677f5a2f67ce1d9da0ff8b21932f3e9de69149359e2b02128a9a87bf5302a17ee34aee407824bb99729cb63f8bf3c27e59616176b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc850eeabdcc3faac2f773cd46ec5704

    SHA1

    4516cdb1a3bdf8db4140560141743f72406e0c55

    SHA256

    8e5aa96fbb1cd6a537f43ff32c6c5349a19cdf818bddfc0e4a22a64c6d0eee2a

    SHA512

    66299bb3d09391789c40beb143e3f2122c76b02a9daef613ac5cb49643a1298dc217e3fdaa185bf06b555ca490837cc087e0d235947290da5d914b70bd98afba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba8b0c18af8027a12dea0d350a0560ab

    SHA1

    c3d70515c02849517cf00ede26a4c5279ff87d86

    SHA256

    81f94f79ecce7cc400cfd763138737f4f2e63daa191ae99c7e126c5bc9b82d11

    SHA512

    13ac74a96f22f672bf599b1ba2896cbab74b159ce500a56f4deae5f79917759845491632c1440b78e68716d2181051ce17fdfc7c1a03d036ac3cb57d546908d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0cf01de81291c8ab71ee33732e8870e

    SHA1

    75cf1bbbb2dc9a820962a47fae8a74c79eeae52a

    SHA256

    08cc3cd0fe18f94c60797ddc41db3481d2a029e168fef3f0e9b51eb2f461d61c

    SHA512

    5759ff6157d4e9809a0887d285ae304a94439aedf27471a48a14f731267f3a31595ee4a572a636172c4fca80b07060bfbb6ffeb9dd182da2814bc46b5bd425d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85170042a3a9be6591cba2e88decce98

    SHA1

    2472f59019f7dcfb0d1353804b592fc259059030

    SHA256

    3c64335bbce8bbc0edfb10f251553106fa053e8f07208ad326fa94e9b0e820fe

    SHA512

    864a3741379cf4cfed96bc182f1b61ff84d64ae85f48290c8bf46f4c8730d4e3d8073b74a1aa5a7f73f81a094045dded8c9eeecfb74cf377c624dccf04f8073d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abef902b5e62c6ee8fae3560be3651f5

    SHA1

    2bdc1b1fcfe10ceb5930658888c811835681615f

    SHA256

    d2ddf0b1864dfc2f31ec68f2790567c7a6f0b1840ec4c6565a7ee570f6a16521

    SHA512

    3e103d6fca0c6b467cf204e80d6c4b19df641b72d273a73877cc03629599dbec82217d7507339d5559c1ee885a83ba9983038a634d91810707053400d7c41d65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce55ce8158080ec166e0f4264ef7f085

    SHA1

    d30e53efd2b4f027a85582bb0d775242c42ddda6

    SHA256

    6ac7819d11e6e12ce8b8bb38522bd8aacc77a09e16dde60e916804c891458139

    SHA512

    950b179df92b3b348cc8b722369786e468f85745f7b4e2c27ff56be771c9391894f3c8e3861bf5e25b98b92c96c7974ffe784a9a82924a798beffc133f8d5f46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0957d01d6b0973b16bbf2262ddced15a

    SHA1

    a5e53f04dcff398cc45cfcf5c408e9e3c1c84c9d

    SHA256

    5846f10dc7dc2108f6ffab89681d5e481e966f8848014630fc1f55295774c10b

    SHA512

    f2d0dbc91e3025268e5b907da0f38042b5573e49e2b5ab8dc5f90933662b4a7fb1f5820f3fdf562f9f4dc877a357cf3160da35c07a155332cf47a5b244bdef2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70db7d34564af7668aaa2b8520a93d9f

    SHA1

    c26f7dcb8a3ca255f8d2d50a43d2ffbaba8eb2da

    SHA256

    f1cd83c915f6ea0965a7414edb8300e08f4d076b6b6d8ace222e2a8073485867

    SHA512

    7b6aded67c99a075b969560dbaf56757a4472df1f75fec355c09ae03d74fe09ef7a6674a03e39f9c38196bbc4c453b64d5f580a564d175b10e90c0bc8f82bcad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66d060701fdf68c49e8e2eeea1a6de77

    SHA1

    740f5b3127ecc5a66d9422474587da38ea390bab

    SHA256

    17ecdee75e4134ac8795f577ded52c359369d69dd1ccb742012b3959bc7562e0

    SHA512

    00382ad00d8ebbc43f65c2007ca942c071e6f320236ecee37f1627b3f77eecf03ba2463d098933cf7678ccbf5385957b2766337cdcf5d4121278717d298afd5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28352dddbcc052ae2232277c7a81eabc

    SHA1

    6c60416774c9af123664edcde6b6c03517b407b2

    SHA256

    9ec5b81ff831c6795be48880d10b15133df25026cc72cfbf76aab43b53d9ffe5

    SHA512

    9396bafb3ccddb031bfa20856d88746ca221311bec0866b1dc50d67e0ab59dd537a7698e0d1e2deafc1bc95e0267bf0738e761d7c721c9b1295cb8bf37a58579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdad7fd7c0750f9e2663c9244f3b4f9d

    SHA1

    5168e6c6b5df2ad3bb81d09aae12ae724327f00c

    SHA256

    ffd29fa060a4aa5146c6c989c26a48ee92e59f490d4c89193fe1dba47cb9d448

    SHA512

    4ae341a3e5754000ec2722f7b40905a7eed714088c54d80479c8b3bb3d9d212a2337e8a89cb81510ec15209356fd65d2d3f6fdf01ad1cbcfe9dd35cca5259708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    026e99fa361c15b25776657504b4131f

    SHA1

    8ec3f5e21925dfbc8d3700f9e536bf214be12768

    SHA256

    7676a2720283773189d97f0c72b9f487b5f2f0488e8ece5e6d992eac9bb5c613

    SHA512

    56ddce2010ab875f3e876d6d227e564ccc3f96b3bf321f3b3de2e8b67b3121eafcfcee490124d938301a2f2d4d30229d278d6c6ef80d79a282b4d042d3b87f62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ac79e96a276193fbc850f94bc87aa5d

    SHA1

    46993e4683b087a70f458f9aff51025c9544aaf9

    SHA256

    2962ca8e60730719d193c6988553dfc7ca835db80d479a54e17cd91aa45237be

    SHA512

    54013dd79d7e0b5593dc1ad11477c606fdbbb4f597a379c7d0991a9c4a32489d3a46d01644988455a3dcb13485953fa1dba28f3194992d7bc874bb8cb7a7da99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17ba2dfde4b650a04aa51997bdb05268

    SHA1

    c7ddd4ff8a2304fd1b5ccb2a308cfde1fe662bc7

    SHA256

    ec24f4dfb8c44c41aae2eead63be45f5dca4d7060339afc1ee9a83fc798d2cd2

    SHA512

    16a3c426734f39e2f7b52428a1fcf86fac8d916aa9a3f682542019f01666549c7c25bffc673f2d069bd38c5ac13c3bbcd1fb8affb01aec8814517e30e1bf680f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecdf756953301fb16eef154075de3112

    SHA1

    2ddf8542743f9ad679db71432a73e6c43a08f3ed

    SHA256

    1a9c795aa973b7b87a7596da274aed2b6b11ff85bae903a402e10cccf3d51cc9

    SHA512

    fdcc1f27b74ce7f03af801086f8faf5e4f66b2d82fbff97851996f5edde6e90df4512f6cf44ce080187008d124858e02082350bcdbcaec527badb81d899a3541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c179263b55b07ebceb8c1b15153769c3

    SHA1

    fc53ad81fd95e7f02bc06eeed5c1f6f439ac2eb9

    SHA256

    b7ff8ea3c08f67c83a92d9f0aab6955c41a4f4bd212ec7d890ff03ba7175a6b0

    SHA512

    a269500bd6932ff6ec3809e38a012b8a6265b8494bcdbc4120c822539c52327f0b972d041e91109efa744dc4bcfb3979fe6597e2db3d8633c6fdd736341b68d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ce423d6597f4294aae42488ea74f9d5

    SHA1

    b0c94740497d4b0e5546994353096c3cedc8f788

    SHA256

    1e28fd12a71f8410ca6861766a675cd5efabfbdee3f620ddf0c89a8da762546d

    SHA512

    4797885882d78e784484ccef76b19f2cf66657a0372ee67f3584150f762ce6f96558591bd9132596352f9af12f47fccea6857f582322953dbb1f9d3855e3b3cf

  • C:\Users\Admin\AppData\Local\Temp\CabFD14.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFDC5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2172-0-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB