Analysis

  • max time kernel
    41s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 08:40

General

  • Target

    Octane_Injector.exe

  • Size

    704KB

  • MD5

    5ee0fa66487080e85cde7ca26e09790d

  • SHA1

    0724e0b4e49a1598ba38da914b113fef6649daf2

  • SHA256

    7a311dd1a74b1e7fcc07d439ed0681cc4666802cd6b9d49efdae5c434b799021

  • SHA512

    27c7bbb95f3f34354536cca03550b4fabb172b718184c1e55d98d7847a96d528d362143eb6fc042df8b7e7e9aae199652fb5dd5398b879b515e366339345bb02

  • SSDEEP

    12288:qH/YJGsdbZ5CfW7wg79ro20/9toNc1jWYWhCIwLph0lhSMXlizNocCKbYVk:qf8bZHwI9ctFtoNc1jWYWhCIyh0lhSMa

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Octane_Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\Octane_Injector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start https://octane.lol/discord
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://octane.lol/discord
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    816c12acc0318fa7a520870fa0b5e50b

    SHA1

    fb90085443b8f5b194227a90bee3f9905794fd6c

    SHA256

    15e1ad0b5303ec3ef53bab5d161cc13aa3d40baaa294c3bd109986c1355f3394

    SHA512

    014250e2b7b82b6108d28d391d27da421c7decf9d7657f6d36b93fb2230e4fb11301977e97da9e5c547d5119117d7db993a1fbec290ba16ed0fce333c05e990b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a2b8dfc46f47aea5c8d155ef74d68585

    SHA1

    5f95dc94f4eeeee7157bb6f9cda8781bbbdde1bc

    SHA256

    616822ce32f8dab781857554368cf8d6b26c02c460a6eab1775ffa8d89c96ea4

    SHA512

    42f781c45fd30f9839752048f9170b48b18251230b022d9fd0ab4de4f9308c5d56f0b7e5267352a1811784ffa7ff2563ea6f2303e5b63943b59f2637f07b7b94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    29c78c353ede92941804db781b4fb648

    SHA1

    3d47ef03767fc4c90196dea45229619bd874550a

    SHA256

    223deab1e61bf3ffbdd811aba51d7e741923d4f2c49ae5cd28feb14cb209f0ea

    SHA512

    7701b7aa28e960a8de5ac67e49347df2084929e902fd8bb4830d07c16ac34ac647d26ab6e8e441c3c0b417c31b9547aa86a29a3df1803765f73d236942fb3c69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f96845f8eb164ae1c72ceb4bfe6e3228

    SHA1

    d53f39084df83d79c58ed6341c9c4d029097ac1c

    SHA256

    7ae22e640e36d4b7615cf31e40a4cdbc00881b35cd5260650841fb8291beefdf

    SHA512

    3bc282e0443ca833e96a1b976325b8ac411a1768d37055b2ac42b66ef77b7bed1fba33c65357eb038b989c72779606c05d39e3babdff6ab5c1da8227ecf4dbf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0d3de91dcd936fa7b40fa09ac4d5c895

    SHA1

    8c8cbcc31eb189cebcf697287af9e5b7dfb0bdaf

    SHA256

    5a8e23c355f4039d63f48c07d8535aa5cb2d05081d4c23300fb044e020c0e6c9

    SHA512

    531986c7de6d649ebe0bc6a89728a6b517c9bb6b2d991203e372370e1063b40ab4d036b9ee6f7b5239d18db2f3c13f65c0efda868b6b2c23398f7ec36a176748

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a1868820488a78e39fb5f503c4b5df3c

    SHA1

    33d04b264b6dc454fd7c9c6b4bcfd43a809be1fd

    SHA256

    79d521819aa3167f3218df783a394b1d6a7b1e4899d27ba96f32d11bfff22c63

    SHA512

    3c83d83921c4790a4299ad341276d35697dd25a1459e1b7b4932e90f3c91d23b2979f4dd613c4fa262b7dc96e834ea0b284eef2091554cd9f35b8181c41f96c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a0fa599778f483bc6c37aab6eb8cf653

    SHA1

    c1750afeca315d70de2fbd0e66fe3468430ad8cc

    SHA256

    563ed812ccbdf66c44bc2db189042caede4f87bb1162aa92a666ee467d61eca0

    SHA512

    dce1e911ebbf9a43ed84d1cd10b917236d524d37cda0d4396558f52bffeccec9560fd7ff2c681d5668b30ef4d2f342dc6e9ada9a5e6fcd806469cce4da3dc16b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a928d217f2a0c0b24519eb9166bb46ed

    SHA1

    7d02ee4c1bb0f650b8c3d5b2b04bb44a5471cfc8

    SHA256

    5f43511f8a955827753883f7dfe6d9c6ba559dfab86e054e9f99b7b75511587f

    SHA512

    27e635835b38854f371a8540da89487229441535902713712699fb1194e49d05cd9b423d90355f30ea4ea417a48020232843aca5c60dd83c89f776256857af9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6f3749d5f1742938419b5b0893352946

    SHA1

    c13c7525694d58a5bfff069dd1c8176d6b27e099

    SHA256

    eb5a6a8232fe0e96848ed952470d0889763d647b747a5f383641e9d4f3d0929f

    SHA512

    2622c34904027e1bfc078fc304e1999003b81076fdd9f804097c5c956d02b25d7d055bf3bd433610e43ec196c4ebed8c7098788feb14dc9154546645c167615a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\85y7ywt\imagestore.dat
    Filesize

    24KB

    MD5

    19da37d5226b2b178e66e36bf2bf6bf5

    SHA1

    f71bc85bf7babf0bbdf69165eea36653751b43b1

    SHA256

    6b7f282bc1cb3774dfc4b899ba235e0f9b1be0814611d8eb0d775b7035fab33f

    SHA512

    cddfe447344c2f1b3aacc8b6436379f168a897baa1a05ab88de9e1a53cf27375bbda9779c3d459483467bb1de29320416569c27788f6531192bebc3484d924d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\favicon[1].ico
    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\CabE9D3.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE9D6.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b