Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 23:18

General

  • Target

    $TEMPImg/FVM.exe

  • Size

    1.4MB

  • MD5

    7647c48e0ac6a521e9b97bd107b2a215

  • SHA1

    d464f46d7532f2f23222e61657d0c9ee43777b2d

  • SHA256

    24f96b0e81b026f81a6d7a3f4c86eb0e4cd86f2e003324c374f69d23445e848e

  • SHA512

    d470c7b17e9bcade5cc677396282b541e3d8d5823ffc6b9f9faa37a2f88e9041d89f8b0a9ce6406a880c45f0194207919596df0982e74a17d3b5205aa94af96a

  • SSDEEP

    24576:XKkTWMfcFPkyuYyCUMJvuGHtekf8Iu8SzFnGpGcJ/5QrIjf4zdkB/huKb:XKkYayuYyCBxuGHtekfLjwpGpG8Xadk9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 25 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMPImg\FVM.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMPImg\FVM.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\GLBEB0A.tmp
      C:\Users\Admin\AppData\Local\Temp\GLBEB0A.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$TEMPImg\FVM.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\PROGRA~1\INTERN~1\iexplore.exe
        "C:\PROGRA~1\INTERN~1\iexplore.exe" http://freevideomaster.OurToolbar.com/SetupFinish
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:2
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\FREEVI~1\FREEVI~1.EXE

    Filesize

    37KB

    MD5

    75568ac665c46fcbcb1516b0ee4c88f8

    SHA1

    347174b695105f1d64321dafc3497bf1ad4cd4e6

    SHA256

    693bd052006f539de10122c189642d9d2ee959d622f48c583852ce86b689f370

    SHA512

    ca77f8eeebc1feed53c93ad6502dd8934d0b15b570baa6df9a2eb0d7797d7416f5a3666b2be8eddae4e8c0af210ce5f57701d22dd93085bcce998831160ad1b6

  • C:\PROGRA~2\FREEVI~1\UNWISE.EXE

    Filesize

    149KB

    MD5

    973567b98cdfc147df4e60471d9df072

    SHA1

    3c4735750c99c63e6861170a8c459a608594211e

    SHA256

    69b9dd6160524e0eb44905224f5b1747dfce43243c00c11c87f5c2ec55102876

    SHA512

    e891e3a413691eddd895a31293117aec8d151ecf18f84d3aa73bc1c4eb95582df1dfe04d51b7011eb55b5e754e2240de4c6269f9547f3cab3519985da1e07294

  • C:\PROGRA~2\FREEVI~1\toolbar.cfg

    Filesize

    27B

    MD5

    6dfb4850127bc78d49b0f2330c495c56

    SHA1

    9cd1c4927815a7e7a1a80e145c280ed8045084c8

    SHA256

    e7997db5ad40e3f242d1e9a6709aa73442c1ae37e38d9f0ff8bb28610f1be174

    SHA512

    820752b0c43efef1906794c6a02055f50e4f6b62b46c7506fff3f691623a8ed7a3c3f9b0fc66525ff04a030f1154c315aeb560b95d54364cf43565f9ea94b025

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2276d61cf3d169b50b4803770550440e

    SHA1

    1dd2dd0d9f03bb92df887e619f67a52174f4c85f

    SHA256

    97c7f7a1d426251f3a04f93f7045dd3e96a84529eb97dba814c871fa5caafaa3

    SHA512

    0843cabba8afbf44ab8406e13ddeb1ff56aff535abd03ee96929fa1e0e9df5435b34437f0f09ca35e924696a4194dc788d0555b9695ed9db06f61fc74c2f2d43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6168d8a81bc96afaf537c451ee016c9b

    SHA1

    7f3454d49c7501f916c1363b040f0cc62fdb5467

    SHA256

    78aebc4bbf88b4edb4ab56c676d57f0cda1690ea9d365e3620dc5d57ef06d236

    SHA512

    308f964e9d64c84c0094636a295bedeb6a03d0c9bed7d6ea7da21705473c181633ce857d7e5a8620ce42c5d1dca2584daeb2a624de78cc69b982a20365e78323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    170980a377400340fcc662fca10df345

    SHA1

    19473cd9cba87a190bec314af7d5acab0d151c56

    SHA256

    e391a7205ae165b6e53bb4d0307816fea56a7e31219c3a041204f33baecffd47

    SHA512

    f780b680ec0244146a2d8d15e78bb3a5e37a5b490c76197d65edf5ed5224ea9bddb4f53761d6e09cb7aaac9d6122bb02eaaaac514e80700630e0f028bfeba0f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69452bb4ae1c99c5c30c01fd689a2f21

    SHA1

    a453f4e558978b3e196ed2c3032903a1fdf7797b

    SHA256

    a7df4a61e47f8928d2d0eecc3818ad2d02b30865dc3ba7f1175574b4236c2556

    SHA512

    a71f06dc211c4fb8bbf792831991fb5294e844cd47ce97f1fb374d6d84652f8f0e7616ccb72bd70694bf4f6c7a106900e7c6fbeb46e72c636841fd3326df1b8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d0bff158f626bcb5411f6f1ab1c39e2

    SHA1

    572b30d9042c3cf39b9abb59630d438e1ab47197

    SHA256

    ac5d0906e364aeba2fc6513ea804e9c24284fc8ecc172cfbbca9b81f399b1edc

    SHA512

    5dc52ca00c446f39e8599cd19025252eff1db26402401488598c0a1d4bcc9b8e20fdbd5456bc119c17538807af76599c66cff7b4092270ba84360dfbc927d9a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd6d6c101b6fe2f066620fa0d2723860

    SHA1

    3579445069fb5dec261f55e187695b129ff8e58a

    SHA256

    d1e35acbc34c43988ab158a3dc421514e1856a1b088f1887714088f42f40207b

    SHA512

    0fd88bbf963abf066e31b4bef795636bcd1ed907b125fb2ffafd27ac496a6db875ef70ae0bd9446e675264f3ab8656f986c66cb0eb5137172ab53f57a8a13299

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c66f3ad9c917e5f960689f33f5799ad

    SHA1

    d09f39be9f5dc3ede5c8d7d06874f9a9cc55cbbb

    SHA256

    36fb69f967e9f01578d8bf2c223b423d4a3d677e23f594527e7220e49d36466a

    SHA512

    d59f665b3a2cc25795a4ef3ded65f48eb052928a75e8bf5425db731c776871e1a4578b10f0f4487f4039953a4fb254f1f36c806e56273905a280e5428185fb87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90fbc5e0e1a295a68316080811807d49

    SHA1

    0c9d5fcabc4c80508daf273efca3bd519bc771d9

    SHA256

    e6dda6f80723dcb6a00f0ebd69b5ed2c776c2f4a0c8d59b7e248c8c37435d280

    SHA512

    daf2af74fcdcc51c99e496a8efbd36d2bafbe640039a272541f26c881e3ed6ac659c61f81c6055f7fb407ae4cc883eda9e9fa171673a56527a6deec406f7c758

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5c3b95cec98f4ed6ab34a46ae8847aa

    SHA1

    e0580c9c999fbfa5910afeea9bd35643560eba6f

    SHA256

    15d1e9942c6599792b52ae41363eaa777daebca580b210fdf77994c246eabf54

    SHA512

    844ed93b9588db2e7fc92ece04d557e1bcc5717fbe957200f263f5bc7a10a5c784c8b33ed0e668faf6a22e81754ad33697ee225baf9b5b02df41bd568e244e72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80e186a074812e2e461cc6957883dc47

    SHA1

    8e179b188b49d2a01f4cce87ae48a29c82c0d00f

    SHA256

    dc9a38ffc7072400a06da8b091ea2ebe3fbcfcd33b3e6b23a58121040ba72701

    SHA512

    b89eb6c03e9868003be0300cb1beb430b54b39b95c209fd03840c7e0b0b8d574c8033406ba97c9613b01b56e948e44f5ec1b813bf9f601a5026c683bd14e5936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f799daad60d75ce57b04deb229d99fc5

    SHA1

    280b9059fd7e9ba01291050bd2d1f254844d99b9

    SHA256

    819f49e2adabdf11fa9ad2fa0efcd12c327c47bfebfee257c733fff05f2193ee

    SHA512

    b2cdf52c24f8275bc991b44fe8b63031f49524638c8c85fce0451c7e96f69dea01d59e4ab15accd274fe26a6550a1d18bfaeb1b12050ad96146385d59339c1fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77e6765e11406d438eba7967b1c749d0

    SHA1

    b60b9c98dd2b22ca2e79dd125532f887536627fc

    SHA256

    7b38481e3f6184feff47465296ebd5e35b9b9672f350a729c460f0f07ff5e3ea

    SHA512

    ac6dca6bdef110930c8f85e0c634a563385d6f4d98b53affb7449466d501c5c513fadd4dfceda7da5cf1e42197e0cdeeda92ada55e41202b9d98962c946907a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac82f576a3799bc5666321f4f92f2611

    SHA1

    0c482fe847cc6b56c3ef61d75dabb1b42530431d

    SHA256

    682e058cc5e550ab34dd481fdca97716d8359a240b7dcef9f4a874917bc29d65

    SHA512

    05f0846d07e88bbb305a19c67d413a16eac80bbeb89e25a31b7c9a86896d86b97f239eb29063fc19a4145afe19ca3092dae6fab35010604f0670b189e3b54f5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    108e556ec4181e7f6973b8dbee6f258d

    SHA1

    950a384474a0477a4faca769bb9cbbc891aed2a7

    SHA256

    a32692d08e6a28381b5d9244edbd81e24f995548f244c93b93b5f0ed4bf90c66

    SHA512

    3da0ce983629c7da16f8513c54a9270cc782fc2c76f2dd250ec42e796fc77e7c2cda4baea71e1ce2cae5fbbaf3262be2ad6ae55f4be63fdfa6192055f2134170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aec2d4eb8d86e58f64712ba745517d1b

    SHA1

    ce7b6fb5a94b19d003124a4ed39d1dc95a2931a9

    SHA256

    c5685295073db3bbd51584d557efbe35c087bc4420ab4d75d29b486ee7e33cca

    SHA512

    8adca6558a5559c8439e793392f009344b3d8760e80eaa0d370fb332ac60a4e51f9fb7cbd3ec9c961384f011d4a1a5a486060c9959e0d76baf2082bbece07b4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66748f503d6c94dcd90eabc1b344d06f

    SHA1

    9ea08780c243149acaf1c096952cffd089c90d27

    SHA256

    2bcd0b9f9a677d7eca8286b37daeaec8e4fca266b775e10bf171fb9f63fd9ea2

    SHA512

    b0cd9404835aa1445971e9a78885c5ee48f2233a66abb0ac2bc0c4b9537f94659a98c01bd1c2ce3cbab3690cd78a2c6321af3ed4a799877dc5b1d955fd9ae858

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0428a9065881f2d3f72cb6d6d53c1cf

    SHA1

    96765b1c9098b016e85a7080cb4e80c0e111b0e0

    SHA256

    2244c83039c17ab8f2b754e83bb958da08729237da6d0bb77f98a951bdff868d

    SHA512

    54b288566291f3d40966569ea285abdccd5f3b87b7f7366602fd90c0a26543ac2f6beb1acc2848399f55f22b029977e85df4a570a6682a4e08e874b4fb546bc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c69db9f75b33d7d905e3adae258e213

    SHA1

    1dc1757191a83bdbc42513fba8ebbf41cd07d425

    SHA256

    2804d95953a48d5933f79e5021c82aa1ee3fd1578148ccf29c17e299c7e159db

    SHA512

    275951a4e8a02046311792ab695deab86d65b8dd49749822cce0faac87ee818cf8c30f79e4a1ec538a75483a53e65f852e5cf1a705cf60f91b98f81102b15235

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f662c6971ed868f18935ee6ca308e43

    SHA1

    5e15af6b5c54f383632a0e99c56b611a00be641c

    SHA256

    ecd0c921fdaf4de76711ba4332e1abbe688da98d353048ca3cc630594353d147

    SHA512

    6cb57b1f4700e6da3620ec9ed5504988ef0ebb6326e9603487143146d1c910ab834cac0981ec8e79a1f4c2f4ddf292049f83f969f9e02feb0a67f17a2750e72e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f6b07ea170b31750719f14a73af195c

    SHA1

    e9d0de4682dc6bccdc176a809e0ddb86b6e497d6

    SHA256

    9fc267d13174a05ebf83a37199c8f0b290181501e50d034006728bdce22e5690

    SHA512

    72f27784e62ade84c3a4425fd28e84571dc81e69c73f622a89c6326acd98d304be76a8e8ab17ab982ddd35b45b1fadb53692a8d8058166f67c7db677cd94e210

  • C:\Users\Admin\AppData\Local\Temp\Cab39E6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar39F8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \PROGRA~2\FREEVI~1\tbfree.dll

    Filesize

    2.0MB

    MD5

    ac32d45efed14f9c063e4615915bd359

    SHA1

    a335fd8a2accbc8ed3b0e690f1d829e716ca64a1

    SHA256

    c5a1a7cd654ed902e7d98c6a94bf7d55fa6f206c2367a02096016ed051cce307

    SHA512

    796ee434a1a4cee5efe75c87b2c4aab79d8f06fb4f2b823063d8c385429396b9063b2b5eb871d7914629bd321c8538689d1e08b69a5a87d6a70df724d82497d5

  • \Program Files (x86)\Conduit\Community Alerts\Alert.dll

    Filesize

    472KB

    MD5

    0cc9e05f8d2bd7abc205f9a8823d0f67

    SHA1

    e7bef6f65206c9e4bb7b83080ab2c8e2050bf716

    SHA256

    aa966e8b93b96dad34ebad419a50d0aa2c69871560b43442a5eba54c1f6d996f

    SHA512

    63a0ddbb6ac34ac63d21d75cb08aa19129aae4b74a96c3a00e3b019b5fe7af72cf0e167185ea2a1997520ebdf397c97064092a0a4b8181e71ea7388fd3d58410

  • \Users\Admin\AppData\Local\Temp\GLBEB0A.tmp

    Filesize

    70KB

    MD5

    2350915031cbfae8ebd953b9d8c1704b

    SHA1

    6207028fc1becba75eae124dd5af683fe04a5464

    SHA256

    bad868f9c97c00136b9013977c591af14f94361113ce11b04e183ec2358e091b

    SHA512

    a2ce9593f51aa51d22eaa5a5541bf113db7837a9488cf5a86a0ee9daf96cda8b51806d6e879d1de7747573dee439f33b8d9416dd3ae55e52e9c788486ab6aaf8

  • \Users\Admin\AppData\Local\Temp\GLCEBA6.tmp

    Filesize

    161KB

    MD5

    8c97d8bb1470c6498e47b12c5a03ce39

    SHA1

    15d233b22f1c3d756dca29bcc0021e6fb0b8cdf7

    SHA256

    a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a

    SHA512

    7ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f

  • \Users\Admin\AppData\Local\Temp\GLFF79C.tmp

    Filesize

    10KB

    MD5

    3b2e23d259394c701050486e642d14fa

    SHA1

    4e9661c4ba84400146b80b905f46a0f7ef4d62eb

    SHA256

    166d7156142f3ee09fa69eb617dd22e4fd248aa80a1ac08767db6ad99a2705c1

    SHA512

    2b792296dffa4e43bc85295dc7691bd29762ce5d9d5eafaa74e199e6a8e5b24aa85d0a1b27776d4719a49b0d29abcf6f240746a209528e608b596b560e5a3b88

  • memory/2188-49-0x0000000002F50000-0x0000000003152000-memory.dmp

    Filesize

    2.0MB

  • memory/2188-56-0x0000000000B10000-0x0000000000B8B000-memory.dmp

    Filesize

    492KB

  • memory/2616-82-0x0000000002C10000-0x0000000002C20000-memory.dmp

    Filesize

    64KB