Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 19:59

General

  • Target

    PSeMu3.exe

  • Size

    2.7MB

  • MD5

    57934f7ac78cf4357baeed50e25298d5

  • SHA1

    62a1de326b9df0c2580277adf0a32576c5357849

  • SHA256

    bda42dd8bcb7a0752fa60fb43ac2c96e274398f4bc95e7eeca474dd6ed7651fb

  • SHA512

    add995dcff909529c8eaf9822b930068209a46a29d87607c0cffc7e6ff1fff11f42bb56c07df42ff0ba3d867f120eac64cf6e0b0ef24f8b733dee1f4a96eff49

  • SSDEEP

    49152:ofyU7Hvvl6k8AJvw+tP8D0ap5447CaLQAH9C5H:oawl6eJvlp8D054ma1o

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PSeMu3.exe
    "C:\Users\Admin\AppData\Local\Temp\PSeMu3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://playstation3emulator.net/ps3-bios.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8421cf12abbfebca7c4ee27eeebde46e

    SHA1

    9853a45a1fa7f496df5cd942f6ff40fb8899a61f

    SHA256

    c4d50fc06b1ab46518673218985b38948e7b5a597a22b1a020d0cde570575173

    SHA512

    a72d7e08a29bd2c842d6f88408fb1e34316952f769ee54979e21988999dfa0ecaf45feae3fb3846fa4d91ea885a374715003944a080d5d4264eb3bfb38bcb2fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9440c2ffd1d2b956d1d9bf438f626ff6

    SHA1

    60f4580f08135f2f43bc26fa3fa04c23eb1c9880

    SHA256

    ec181b62a4c21e639245186199f83892ef41b026be27e93e90dd6d84496a58f6

    SHA512

    8e529922b4ad5b7a68ade9615ea295543742baf18c76f99b58a88e7e3b2ba62ed6396cd41a572e8ea4df83a8dbb5cdb37c5f32e9dd8ab9cc67016061d02b96f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7314744a9c69935301f5a7c5d819cc6

    SHA1

    3c9c4317323154d9ba61494dd8cd5050e3a0a2f0

    SHA256

    4b4ede64369fa32946afe92eb760cbf2da3cbd148bfc20646470ae4af07c6fdd

    SHA512

    c6b348144f14621d6d8cd8074312a1c5436ae17451f4cd1a907e71045e32ba63cf18f8833fe21618112c6177348f1f49a30c628a76fcf5bbacb8f57477eb846f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dc942d0cec895bf8b0506dfec4c7e27

    SHA1

    f95300951b1a3a8ef44781908cbed5d4edc4eeaa

    SHA256

    7e2a60d7f7b46330036038c936ab0aef58bb0a759f15d8b23f41f1467e7e4f6c

    SHA512

    f1d67522120c7757105cb010d7561497b4ba8da5ce2f3473609ee92ed9c64a9444ba89a39f38f8eab04cae2353e1d79cea2186d4d222ba0a0a73162ae3977d1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51c6f26ed1e2ba3c6942f8b4ac88d3c1

    SHA1

    001c39d978498755d0b7d7e39ccc1349b0c8cc55

    SHA256

    01fb9edee9359c92c40d4cc732c3d8984f86e3a18516aa52eb6d1991c4293b5f

    SHA512

    0c2530b4d43f3c44867114f72d732c452d834d84d7fc1d324f1fe09e7855c45957815b7a54f3fc0c434199a6d3283a4224bd01b2a911cb3eb43689ed47d951ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36e2f2aa004ed46a6df0eeee4651903a

    SHA1

    eba7df4e25a59c83ab9ded05bf8103d78f2573a6

    SHA256

    5e0a8c15ae31858b6201e6df4739cdfa34fb4d1d99af5d833a66453f73076356

    SHA512

    2345cfd3761bf8edf88d01be4a00ae4d9195a4ae11790c45022d1aa524dfedec13066468faf0340de127d033e32dfd4f2e31859bf800a0c25501de8be086674c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e4e7759c9bf60606ffd17233fddefb6

    SHA1

    3167318d028faf7ef86c0367833fc66f2bdc4dc0

    SHA256

    abc14b7d2262d4cfb9ca1b579c7cfb2c5c1acfb9d56d636345d0aaba4d501280

    SHA512

    02b289ccb62b12f593e18034feff79940916f079736537f22246ac4fe3a1e8ba33246adfc28cd2eaafdd0a362eea90121f857c3dbbe6779aba45d955b954c248

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af7f7be6bdede6a78b0e9f796d08c81d

    SHA1

    9087e755ad19d911682d669444bc2ddefa931f5a

    SHA256

    2d167fa1229cbe873a37f8d5a44a226dc75cad29a1d2142f65fd7f149cc7dde7

    SHA512

    b267286026952415e3ff6201052642a278b91ff51512ec9dd13524f46423ca9542e1eee96a1899b44b941d8987f53c0f8fbd133f104c91caa6ddb7fa56c9b1cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    185f412448394f11fac3105b000b9b07

    SHA1

    d2d6d2c043c8215428dd271165d459db767852e5

    SHA256

    698e0813d9ab63e92541aadd3289f1c5486d9e808b8419c2fa416cad16d0ea12

    SHA512

    6077cc4c29a9c0338cc8c0802d44f0402498cc99b84738ad20e76b818a997589fb680a66ca0fac5f0005258e25af946c3700f899565fb0f3960b14aadf65d151

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf846ebf385f0c04cc544648ad3b3761

    SHA1

    154f798767aff76816d2824b4f1f257c0386db1c

    SHA256

    65ddfc7eafcd783f21f7ac0e855a749cf07287c593cd063f207ecd18f1129e40

    SHA512

    46363799eac894ea9ecaac23be7de5f8275d8eda2627731b5f088dbbcfa4700d12dac28d4d370daa57d6a3b51ccdbd8714af85d119b1327da32b7910f178e67c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10bf777d8f93916b40d04f961e525b74

    SHA1

    43d656fbaa7f422e3774bc4b276afb7bdffe1ba5

    SHA256

    fc22afd5f1c544182406b0474bb35eda17f0ea3b1377bcdd72d5d177a14a63c0

    SHA512

    561a9afec56a7b8e504ed99a2cee727ae098c7f1fea43eb15e9462006815d15df2f01cd127f91218d8da8a79f2a394aa987dd51807f58f1b72c2be8e228bbbce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63be82e644c3503039287ab21433b9e1

    SHA1

    7b4fdc201847e1896eab2df0e4f00c02a8e3460a

    SHA256

    b170cc82887d5f52683bda1db7938e23e09fca9a11586dd8d135194b6e806670

    SHA512

    0fdb17861561fd2ca28825a47f3ebf83695969ba2f5ce36955169241730f0002cdd7067e6e29ff54d555fc043cc9b1d3e293c29f8b9657ac45b031c396c02c7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1a8232d707dd38a0e1a6f1a96dfb558

    SHA1

    b633de010b255633a91011f4f9b3593438f6a5d2

    SHA256

    ac60190076d84624c86fd4ee6f6f061a7b9f483a0976dea8841d8b991ac1a0b0

    SHA512

    1b4a19dccb026f62b0a034511f07bfac57f3e8a10d7c07d8d15810ccd9852a5c91f33f87efd8206eccceae865a1fad07befb87cde2ec161d6b366e2e308e9a23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5331b0c8276fb0a0298fa4d1d608ef8

    SHA1

    f2c44bd60a11c21c339a607ebdd14e46d53c30a6

    SHA256

    d49452e44653e5590b5f96b8b6a749f66bc4faa3502f70b3d35d024ff8884577

    SHA512

    6491e8abccd60b14eac151a9f12a42d2f331ff9baa2127e6b0696bd18f9114d1d11d5ef7ef61f047bd7e5cc8ef0973c37c7a41c40652f5b826277ff5f62b8a25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6983c53037ea02f6ea6fc2ae8e0725f6

    SHA1

    1504c9001e912a9611ff10a7a47cc913e9d81ca2

    SHA256

    a2e5930d4bb459207056a2ea0c84d86463b5f5006ac2984ec156935a6e41c395

    SHA512

    e2308f6a65bd33065e3c394006137158046257b41cebadfa815797c6c616a971818211ff53fcf389946654ec66d4448871e2349c9dca9fd656fa2386cc3a9c85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16146cd010a260a133b0542cf2786f30

    SHA1

    b424e7fa14ac9b07b4a2ca714cb4465e05bc015e

    SHA256

    cc8542fbaa58c0b5f8473f9a82bde7a02e6a4fe3e9ca3dcf7a97e78fddb46751

    SHA512

    14f140884a2f3c58bd759b2fc7a85b22a149619a1aaab7537a11cf954f1b5cc09eea3ba6ec7ed6a2d0471f32dad9d7ad00457e14e8200c31429b11d28e24cb39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0944dc67aaa5f69307b944c9d356dc79

    SHA1

    0a078120e48dd5ab5b368f3861651b1bb7e4d92b

    SHA256

    b7d0d35d37b086fdfcb23c5deeb88a6448a0956df7063e76de016a65c7dae82f

    SHA512

    064dc5ea14ee3607cd8acb189974db81cfdcbc148ec7576acb2437dcf1144e9e1a5b5c28be46acb7407558f30b2aa0aeb5eaaf02d59b646fa8b2a703cc88d2bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a72d492d657abc14562eab7710f1aec8

    SHA1

    adce1341f0de21313a636929f98219bfeb82281c

    SHA256

    80d032ea1a249af89c2e7626a8e2c4aef8cd4bcbff1a20af005424d6e72347e3

    SHA512

    f4162c5f6386bbabf731890b526c944109772966e7850be4cde174b6b1d1f70f0438642bfe21240ba7df6cf36bc7cfb7c8faf03f404f98ce63f5c36093d39bae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38c3d7ffcbe9b56764b95d59ada06eaf

    SHA1

    7fc6dc19122548857c3d07702ccd24dfa8d7bb26

    SHA256

    67bb9d1adc038f6639232c44f6ad47743ca2d4ec85463c9a2136ee8ce21a34bf

    SHA512

    a7e41c36dc5e5bd3420552af70e66a662b75dcb62809de58b6519f24910f8a49ddaa0b33236318cfd8c64dcf03d8a1cf9154c53b0377c37a5c0815f8076b164c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dce6807b3d9f6a3ca35ae101fd618d9c

    SHA1

    beabb947352bba5f3fafb6d1f9d7935067cc6164

    SHA256

    baa2d577c77e5d953babc509d1193cce7bb0814dac4def621795bce8f6145850

    SHA512

    80bb68d3b19300fc4c4e6460da387a72cd3f8aa934df825751d9e79c38be3a569508f72102d1fbaf0a47f5f32dd0dfa6e8e2cdd2d6d905d9cab05f3fcc3c38c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bab1c6f42e041120aa4533eef55d9d5

    SHA1

    6df4c98eb198cc7c260d0f7415a21e6240953d1b

    SHA256

    3e595d2ce66db5dee304fa4978d395d852aa01e209c402e49f540e1d8553003d

    SHA512

    6750c042fb726ebed0cb1d5b17c06ee32d0456d515d066695dd78446c314f181061d4cd7f0e2849d5d85852256d23d6d98ba1f5117c3092251b59adaf90d98ab

  • C:\Users\Admin\AppData\Local\Temp\Cab17D7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1848.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2172-4-0x0000000074580000-0x0000000074C6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2172-0-0x000000007458E000-0x000000007458F000-memory.dmp

    Filesize

    4KB

  • memory/2172-1-0x0000000000BB0000-0x0000000000E5E000-memory.dmp

    Filesize

    2.7MB

  • memory/2172-2-0x0000000074580000-0x0000000074C6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2172-3-0x0000000074580000-0x0000000074C6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2172-5-0x0000000074580000-0x0000000074C6E000-memory.dmp

    Filesize

    6.9MB