Analysis

  • max time kernel
    106s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 11:34

General

  • Target

    911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833N.exe

  • Size

    124KB

  • MD5

    f935ece4767b5b2f5ff1d739f16011a0

  • SHA1

    facfbebeef0ad6449a6737d8712ca93315f9c61c

  • SHA256

    911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833

  • SHA512

    0aeb7be2d342589668e2f295792724598b74d574f14d1bc8e9b0af32cdb9e7b92fd669fad26d4eb835a413387feeb0374f559c71efada1c9dd15f9b6b1caa2ad

  • SSDEEP

    1536:Ucp3uHRlFIX/0N2r5XXcPAvcbbwsQyVEjj+8/tJKWMMTgYEWQpJ5ZMVuTRGwE7:UcZyN2r5H6Yo9QyVEjNtkW8bMVAkws

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833N.exe
    "C:\Users\Admin\AppData\Local\Temp\911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833N.exe
      C:\Users\Admin\AppData\Local\Temp\911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833N.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Roaming\Ptlalp.exe
        "C:\Users\Admin\AppData\Roaming\Ptlalp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Roaming\Ptlalp.exe
          C:\Users\Admin\AppData\Roaming\Ptlalp.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2968
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ceeb7d0f9579f6bd935870c3a9c53984

    SHA1

    187f079f2e88abd4d1bcdf5ecc33d9079a8b8d0a

    SHA256

    1f70537b471a68b8e077e6713e2e2903854a0bd29caf9ef8b755f101e9ea0a70

    SHA512

    fb6bba2990c5e00e6b802a44f97f31872e7adcda502e977d9cfd3b18adf0dbf7187060fc757674b3fcafa6b1c10ad5fb6e9b4fabaaf2b466ea87af49d3541c32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92189dec8225197b0de90b3a74987544

    SHA1

    bcdcf7b0c1e689edc40d96e86ee712db746a634d

    SHA256

    46c1e5d020f104d28327c08ad417560f1b41968dc6823fdeaf611f41907801ed

    SHA512

    9dd656bb028c65a82a00d8f167f5a2e5f797257578cfdefc254b27b5101ccaca05cedc25af58fa43712acc82519223579a5b6eabae3666556b4c29b188bfc74b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6400d0551e77674ff5ce1793b0fb6b5c

    SHA1

    bc468ee27f5fcdb128b19e928599e9c764629df6

    SHA256

    c5b712ee504326ab62d8aea84ab2a6fb52800a026871408398aa7f847982fa1d

    SHA512

    ac869839cbe6920e21ecef1747c5e52206a55958e45af2a69ccebf355bd87f4cfabcc0f80019f39b1fe3ca5b650f7d0c7347ee6feab69d0a428400de72aa94d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d52fd434b41c8d2c4b2ea9b3876d17bd

    SHA1

    354e5be6d7eb39fe3377a1993adc6445dc5668b8

    SHA256

    8529c01de71376a44162ea992e2c93363833089511b353ea39b67e2e3a505412

    SHA512

    365990d89f89e455c8c48060f0fad566f8e731810fea6d5c1f4da7981ab5ebff4780fde9977ea5cd78a9f5a97fb030df9e685e5d16984e295d10ede3991108ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db310e956c3063eabb04a6a278756f4f

    SHA1

    0a44bbde8e39d02d8e029bbda6a5dde05e37d1ce

    SHA256

    92a85f4cf3bda92a0527e1b90e3c053bfddd578e675d0bc7321d14a3adbeaba7

    SHA512

    1c0bed0da7ad0a98d85a1ebaf7846dcaa70ce0bb509004a50a7c5e280875acba78328bf21414a124d8e735dc903b05e9ec3016f325f7090da4c84c417004e46f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    983f67c86e55ed56e16f16d54f4601db

    SHA1

    cfe59c8591a9b12e386720ea7ce825944a4f09d8

    SHA256

    f8a696dff07bb507e9dd0daa033a1f2ff289b537f1125204417d5edf31f2ac3f

    SHA512

    b8554f8d0e5e6a92518a6302980e8a1eb604546141e0d225873fe056b8aebdaf06bfe3830fd4c455dc80aaba8d54ca330b1f4965d91f50e4d858a7a4de7325b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec0d85e9ffe6ea54e5a2e4e4b750ee65

    SHA1

    3e2a6b3de3617dcfac078f2346cf14838a05490d

    SHA256

    429d9bb01b8f18037617508f8ed06495d464789e41ab352ec960c44e8a9a4119

    SHA512

    edd50042f87bd12f02917dd51e6fa846e6eb00f09f767229935bdb21dfd92d84834a481e923f1040edf616caa17b9a0ae991a6ee46ded543e948b4fd57592ad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63b9d0ae04f168312d236ce8c489e7f5

    SHA1

    376d6c9323b9b2ed2b97d74b79efb28aebea08f7

    SHA256

    d9e3f70f9305d53f050c5fa9bf691a9d8c76a530b662d80dc2c8c124c4789c1b

    SHA512

    b2e3540c0a9004312b0f48165b2952af5a03b4ebe3e0e05ae230a6cbfe16f7be80903e3e81da505ac4426515b7e0a88bc6041727143de9d49c487b5825b8f89b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50d80d847a042f36f246ae400d5bda50

    SHA1

    b6bc435fcd92ecacc6e8e46000e5dbbefe370f52

    SHA256

    a92e543e52d467e831adb657da2b5058b317ab998544eb70a591803e6cbd26a0

    SHA512

    b7b43e3afb373b41ab2f46d90cb74af06e382bbc58d9290175ff1f62111dac67453b5ccf6b307043931a360e503362c21cf9b86606d148090b70102850b14a98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adaac4a24188efd0fdfa54ca9498c635

    SHA1

    30fc7d520ca4a3363db64120c1b9a05f312c1298

    SHA256

    6f1f3793bb889c1eddb9bf4e33f79e9f0e95847707574bc06d2d5c0049fe7b29

    SHA512

    6e393da475432b8fa4baf48e277db92e63a42e54a352d6f916eb739887164b14cba479ad1d23751d71ea72bc68777805745243ee55a8d4b0c21f32d42db923a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e0da77b4f15e57b39f32b91a302f552

    SHA1

    ffd58684f4b15e52d330b39413fc9954467e4bee

    SHA256

    13303e41678ae021069dfee68b4e044b6a86b70c86cc4319cbfc6a681845a0d1

    SHA512

    e016921eac7a9d90e6d3478ca0e742c56e5dda13ec2794215ecf14d2369927df59f16fa8a8d51169ef3cb0995e4a6eabf1f7369176850d08d6e4b9f4e80d5e53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    191e158c86f68958e8e4a5f46f09772b

    SHA1

    f5d0bc05c2ca1acdc9281953ccb1673db4388e08

    SHA256

    e97ddebd6432bae1afad7213197399179093d5cc5e032112790c4e6d97abd6f9

    SHA512

    3f5256dfb779fe619b40bcbfa5f26a2a0264bd0355711d823d05a8eeeedb78df0a998cf5afc19dabe87fe0890875ca9588883949f4abe49d95ea9b04a207291d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc308e2a29e4ad3d18dbe1119b5a5bc2

    SHA1

    86bd12c1deed325e667cf02394c20282e48e4592

    SHA256

    40584d5253d53f86529668aea8578ae4bed8c5d81d651bbf19a711aa187769e7

    SHA512

    9b74cfbd63a59c37a62404ae2062c95635e3bcd9dda6a0b7006017d19f8dcd0eec154f6e5dd9671e54bdce7660d4bcd4233def7a0a888929c81f3461bade8ed5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99ca7dc57f41a3f97ab8dbfb857ebdf8

    SHA1

    555d1e02e6b2d9da8afce5ef888e7418a324e261

    SHA256

    c0279181168f78615ae04caa2092f0967871d2ac6f178c0c7b8b2df5905b4682

    SHA512

    f7d31ef91763b8f159b4ed836529e9b6ea3de157a3e64ef277af9e898277e27b5575ce201eebcc0addc9e908cb9b04a3b5d3ce18f1d7ca0e1d1f5ce549e095f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa4fcdebd140fdce5ce94743f50754dc

    SHA1

    cd91664e02eca4efc1506535d56578019e102877

    SHA256

    764c1fe1814cf6ef78fa053a9475eb1c59e34708cf0aa5e5c2e66d3247fd2b86

    SHA512

    15ad2491f37a00399ebc45f2c812a2ea515efdb7218221be579f9ca4c19874f143fa734e0101c230d7fb651f3e9c8bcb552b74b36318b055149d37f098c5a0e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cfa7a5f45d6ec8e91cb5a89b2c27cb5

    SHA1

    57bde23fb3fc4d3e15220052cb8e3cea272ecb8a

    SHA256

    7406997576c7441ea34983b435056c3632e35b2e8452b2521a8228082ddd93c9

    SHA512

    b3752790c4a38acdceba698ccf4032c3d4fc448c47b46777f986d9c43c10f994514977dd17a9e84dc2ca1226c7c16e48ade5080b01c52753455a9e8baace041b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65099ef264aafe2d81b2875fa735be62

    SHA1

    f26cc415e3b00133c4d958040b736ca0fc5fa364

    SHA256

    095d5fb2b701e85b0631d3ac48c73d2f081de4f2cbf2a0445b0f17e51d7a64d3

    SHA512

    f9c428c351d06620c554f6e806641f02dc3ebe47e5cd3370755bed8028aaf8c68a4ee20473a7777e92f4d0731e645956bf280b25b2d6707d21df435eac90e9ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b155334e4bec7c247d25d70e5c663011

    SHA1

    0eaacc99d88ad5530fde04473dda0501f7030f8b

    SHA256

    95b4331231489fdeca06553cbc48a5bf3f077545462c2e42419c8038723a0141

    SHA512

    8abeac69ba43bb5461c59dbcc3a34aa76e0224214536c7b3f97606c71184fd67c0e1c50b9655917fd315697e219c1ff46f2fab021e307c11202ab0d3b481e927

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4f3231c5eaa6f0dfe8cc49887436fcf

    SHA1

    8743571abbe092c2a7d1fa7c8e5bcb88aec4f0b9

    SHA256

    3992a515a9d3102fc7fc48c3fe54127711307282351cea9b86c3df4787214321

    SHA512

    619505d94b166776e7dd8050b6989419499b051e51fb65bae6e766d35acd2f41626188b2205690724bb2e68e8ca6b466cc742846757a2dd935307168c38f776a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc7a9f11498d75836e291238dbcbc46a

    SHA1

    22b202488476feafdd49b074a4f7837a19ce7b26

    SHA256

    9b4b434d7d539956a4370d4b12f060e6c587060ed39d1630c379f7cf69b6b469

    SHA512

    3c8f9f7aac2972dbcb9d5da8ce8a73698da2c7314431bb2e9a5e9a7c0da3f57c963820bc56092dd92abf32e6839eb44b3538eac018d840fb7f10cb4d687a8f7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04efa3bbe82949adacab9c6ccff7b5e0

    SHA1

    ead03a5951a0a91547a87692e6054e46103324a6

    SHA256

    630676cf4b6bf5bc2fec165a049a7825642c4deeaa85e984b0d3186b2b4e1e38

    SHA512

    1600d54fb052a7ce746939a6ebe2f82c7984d163b9e16ecbb7364ab06c88d9bdaf4f2b90c2909ac2733fa46ae6c4eb53edf5e125fb4d97aea6e903d6bd0c7625

  • C:\Users\Admin\AppData\Local\Temp\Cab12D6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1387.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Ptlalp.exe

    Filesize

    124KB

    MD5

    f935ece4767b5b2f5ff1d739f16011a0

    SHA1

    facfbebeef0ad6449a6737d8712ca93315f9c61c

    SHA256

    911fc5ac060004ec17bdfc08b974cb7e4e27129ec1a75f024be4df5b50294833

    SHA512

    0aeb7be2d342589668e2f295792724598b74d574f14d1bc8e9b0af32cdb9e7b92fd669fad26d4eb835a413387feeb0374f559c71efada1c9dd15f9b6b1caa2ad

  • memory/1848-4-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1848-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2188-24-0x00000000002A0000-0x00000000002DB000-memory.dmp

    Filesize

    236KB

  • memory/2188-891-0x00000000002A0000-0x00000000002DB000-memory.dmp

    Filesize

    236KB

  • memory/2748-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-3-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-16-0x00000000002B0000-0x00000000002EB000-memory.dmp

    Filesize

    236KB

  • memory/2748-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2912-26-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2912-28-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2912-29-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB