Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 16:26

General

  • Target

    62bebd75c185d4a5993ce8bc9dcd2e2c2decad38a29120baca07a62739c0fecfN.exe

  • Size

    3.1MB

  • MD5

    3e21ff7c9dc87aa7c42e752c430b6b60

  • SHA1

    db180ffe0a018072817c07859e83266404d8f318

  • SHA256

    62bebd75c185d4a5993ce8bc9dcd2e2c2decad38a29120baca07a62739c0fecf

  • SHA512

    da841a3288622a4dccd887c2f9d816f89cc9ad2b6ed075971347771e12cfd8ffe71e3a1d78607401461903ee7037f0dd6477b9310b778fe136ffc542db28f594

  • SSDEEP

    49152:8yEDP/NUhLruyJHEDg4tV7eUFnpD5mQcYwyj0QTneAV70pHYalMa9/:9wNUnJG1VaUFpt7YWnl0pHYwMC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62bebd75c185d4a5993ce8bc9dcd2e2c2decad38a29120baca07a62739c0fecfN.exe
    "C:\Users\Admin\AppData\Local\Temp\62bebd75c185d4a5993ce8bc9dcd2e2c2decad38a29120baca07a62739c0fecfN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\Myspeed.exe
      C:\Users\Admin\AppData\Local\Temp\Myspeed.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.foging.org/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1b657ff13f0ca686295ce39031f3e02

    SHA1

    b31cee4f1fc71f6e2c8044a6df0ebf9e60dc228a

    SHA256

    a9c1038f41c496b945fb9947f304e150047be3d430959dcaf890db750d54264a

    SHA512

    4e77fb7e9a6766ce6435f9712b3327d180af31edc15a2e95c92376c5ee03eebf318d0ce6c0fd5e75fb0654657f7af88b0cd564587a366cecc2a80bf6e57be2b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    680350ff4598e030bdd1bb1ecffc5dfe

    SHA1

    4c08cce606375c357e92836fd6b01ac76447d3cc

    SHA256

    5fb0ae1f6c35c48b4df0fad4b28a373572ec2dc88e2cc7156db207c6a11ab4b6

    SHA512

    fdb5b033b5f0a4ebcf41a599ef1b978b4934ae682c5bd30e105eebb7a5d8da93bc3ba133934367c5973de7702d933e4955338f5d4c61c3f680fbef361ad20905

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1efecb33dd2222bfcebb239bf812353

    SHA1

    7ad6df874cece215ac574a521c2a94725bbb1ad2

    SHA256

    ddae11949eda0910b512c27d221522d4a4c103340c5ef6a528881441f3124654

    SHA512

    525dfdead0f658ef3c8094cc671afd1ee23921731a786da98ea6d8e7a38a38f1bc0fb768cfc8e413aa0976c350eff6ba7a596ca0562a28b332d37c88f08dceb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d2bf9c04d154633c89ec64f5dd4e77b

    SHA1

    4a40520b3a8f7b4080d61124fb8443afddfdf3f0

    SHA256

    a9d9dd422d554c30b22bfca017a9d50d174431f8446fa31fb3be4c486c7b425d

    SHA512

    97131aed21026a37bde46b8413e8bb33d1649cd60b7c73329cb1b7287f8e0170f4b10cc928b1690de0bff6fea6fb2e35a465311d951d3054d1b01d69bff36f97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cf09c367d472f132321d9030638cd19

    SHA1

    ad1ac4f8d203daa71c52aa352b0bd8c61d2c152b

    SHA256

    90e47966c1bce891c1ae10243a9265ffe0b516beaa571f4d1571ddae38ae43a7

    SHA512

    f5a2a51c6e8b428dff923e62f6785e8846ef84340d89742445fc0d9d735b791879d21d43d5390eed382f01a69c664e43f7c0562935d5bf748c740c0c1d881c9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4dfdfb6f90b9c7cc4bfa32c6c51f63c

    SHA1

    f84085780d6a66e313c18dc30834781164f4456a

    SHA256

    39bbbd97aeb06920e692d1837bbc7fd7acdc7a126d5b5be05a1db360faf7eb90

    SHA512

    4b376561b00984f6dd494aa5fa75d325a0fd18d3d161bf82165ec1ae6f80565c5c11a1f8495830c9152803847b3fe6969cc86b6c4c84303bddbcb8e9e80558de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99169c63d2ec3ca3c4573a536d2079f0

    SHA1

    f745aece7465472d6db2f6883f8705e2822a96e6

    SHA256

    1ca0bcafc0350427e98b1f78126e5bc8b84192fd8f9ef236e44a30a1878990f1

    SHA512

    e4994592a9bb66552dc111f4cdedb10c58820af01b70f000d7f7a0eab86e49985c113d96ee2a43891769fa33c74e77a4c3f50d495c645267e13041dca3aa37e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    005fb935323cdf59ad0cd5d6b423fb44

    SHA1

    c3e34eaea4c89a7396c5f1e862a827b42c68a791

    SHA256

    8cf07053f2bb097ff5215ad956da00f0b454edde0390c8a5c34fe959d6e3c157

    SHA512

    9c5ef2d925efd756d2bd394858024951b7eaf9fcaaec5e976a0df0a3d943868ddf55863671e0cae4cf6f2117730f6ff738c673fd185c98ae4bcb9914a6d6ccb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1afa97d49fef2372d2242de9b3b88392

    SHA1

    7ec74b99f977ad32ced52356ec7d4ffd2182d4d5

    SHA256

    b960979fe391cdbcd6acd9e8d105f56580b06f3d0b55bd8ed40975fe8c760e46

    SHA512

    c3cdae254da601a1f8b5dfae7a93455a40ff0f948257dd734217fa10526a3184dfde089af7517e81713ce435f497a1f7eb9bd0aafb33ff033ec9f091685f5be4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90f3fbd86465aa50f8a22468f8bfe241

    SHA1

    4883a7c29557e30545d91f4dbd6b1741b7862334

    SHA256

    4f96bbe1678086f7382d1121c7f1928f3ef3b0c379ff77f22521c8baaec3e367

    SHA512

    2d8d063d4b6534c5b507473f48825b1008b8f14c98ac7255f106526356c3b0fd244bc854b7af1a640b0d527bd74bb6aa7c8f6483bab2bfc16de938828a2988d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfffa11788f058704fed50fa85870be6

    SHA1

    f1cd428e0550857b9c4f6cc725c41c60b4b9d04b

    SHA256

    59f8dac0a7cfa7a491e6e00f048cd8f5b2957099a27054b1c17ef76cee4d81f8

    SHA512

    5b48199cbaf283bafb6167aa46ce9de34ab787b94217711ec1cf98f30a2a1b8478b08f636e0cb35899fa702fe1bea788b50aeb08034960d912482e162ce685e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    103c68d1d0e904e39793333d1308aef2

    SHA1

    240860715914b5a684d7570a2919d96d80c3a03c

    SHA256

    e90826df9a94355cfa6815dea521424687b9450a8dd19efe0a15bba8062cac00

    SHA512

    9dd72c633ebd09665012aa7c2784c9567d224040b51e1440aa6c6b8d38407596dae501b5d76dad5f920e9f72c78f3f43a48913198ff859a2d104919c5a87fbb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ab58d8dba63db75889235b01fc72662

    SHA1

    1f878cc3766d83e6435f3a057ebeeaa2314bb3a4

    SHA256

    806307cee5f8db5785f4a1fbbc4d73ad5a733cef1f5bd91c2651149c6811a873

    SHA512

    07f68aeb4e222dba260f7f9d9430cbfae4ae60bd03c2b635bec206903fd19f37bc43c3ae84111c1bb28eae7bcc7456341e07b27639ad9870bd941a4db6a5ea8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e42275c16a78d19444db69caef3fd315

    SHA1

    e9cbc9890006dc95f77739c4622d54208404854a

    SHA256

    c3cc99a9e572ce0130edc6ba0acf6806af584ae10ddd774cdcfa69105075dd75

    SHA512

    f6a426975cc25395ccefecdd9b4118a22822a4904426164faeb515bc45bd8fccdc9f11a441fc5e651a2a9ce43c995c2ee9e6788020ca88af2a6d593b76b8248b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90a2f49e8b690e44350f8b534eed4f97

    SHA1

    fd704b2e305d66f2800fddc364ed4a9bb23267c9

    SHA256

    adabbcd3f43bbb67504fc78ab5118802ffaf66465fcc42b772933111b147209d

    SHA512

    d8f7df2af9f5c8afecfb6582c22097a023b36b94fdbc136282489fbbcaaaba99b9d79b6a967cdc6dab516dba2b80e45dffdfefb7086b9261c07cd77daf413a78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0410c62a49799368e2474493eed7967

    SHA1

    5693a89f941c4825fb958cea349e91fdebf3d7c6

    SHA256

    69b0e47492fe94bea0fc786fd57a4e2393960227f47634d895452b0ffcf616e2

    SHA512

    b9db1ad2ebc43917686273b3b857fd5b4d22cbe0a45dff4b9aad3bd19b3d247afc6e0638eac260492f0fcd4bb70628c09b1e1521b97879175f7fa363df5764a1

  • C:\Users\Admin\AppData\Local\Temp\CabA111.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA1C1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\E_N4\eAPI.fne

    Filesize

    328KB

    MD5

    cbd788f4c71b9776660d6e8473ae0e09

    SHA1

    0189cd47bfa5d1cac0d7f1a33953d279f60b02bf

    SHA256

    db0a6d7b75503daaf93c8e62ce67abd3afd57daaef4a448ec25a43d1de69e47e

    SHA512

    84bc02c67e3a3a9f77418b25afe7ec55e5bb5ca5a6c05503d94dffa57a30c7608e79bb4f83fe91c39ccce16872df2b3f9e7e5a8eafb4f563b1f961b93e9b8c94

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    638e737b2293cf7b1f14c0b4fb1f3289

    SHA1

    f8e2223348433b992a8c42c4a7a9fb4b5c1158bc

    SHA256

    baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b

    SHA512

    4d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12

  • \Users\Admin\AppData\Local\Temp\E_N4\shell.fne

    Filesize

    40KB

    MD5

    d54753e7fc3ea03aec0181447969c0e8

    SHA1

    824e7007b6569ae36f174c146ae1b7242f98f734

    SHA256

    192608ff371400c1529aa05f1adba0fe4fdd769fcbf35ee5f8b4f78a838a7ec9

    SHA512

    c25ed4cb38d5d5e95a267979f0f3f9398c04a1bf5822dceb03d6f6d9b4832dfb227f1e6868327e52a0303f45c36b9ba806e75b16bd7419a7c5203c2ecbae838f

  • \Users\Admin\AppData\Local\Temp\Myspeed.exe

    Filesize

    2.5MB

    MD5

    af446c70f330712a40c817accbce1be3

    SHA1

    3fbaeddc7e2a7fb5bed0497a4af2db60b0dea713

    SHA256

    3a9b8d2ac341e564345bef4607f9881c7b3d6ed25011fcae531384c3e2e6b02d

    SHA512

    69dd1650a71d2454a016473877d6eb652aefb0a1769b8090dfc64b87001b8b6a72d2c68e3401a693f0e924bdcb22ec5fe3fa3e7c0a0ec23e3654d88089ecec01

  • \Users\Admin\AppData\Local\Temp\SkinH_EL.dll

    Filesize

    688KB

    MD5

    bd42ef63fc0f79fdaaeca95d62a96bbb

    SHA1

    97ca8ccb0e6f7ffeb05dc441b2427feb0b634033

    SHA256

    573cf4e4dfa8fe51fc8b80b79cd626cb861260d26b6e4f627841e11b4dce2f48

    SHA512

    431b5487003add16865538de428bf518046ee97ab6423d88f92cda4ff263f971c0cf3827049465b9288a219cc32698fd687939c7c648870dd7d8d6776735c93c

  • memory/1560-17-0x0000000000400000-0x00000000005DC000-memory.dmp

    Filesize

    1.9MB

  • memory/1560-21-0x0000000003190000-0x000000000323F000-memory.dmp

    Filesize

    700KB

  • memory/1560-27-0x00000000020F0000-0x0000000002151000-memory.dmp

    Filesize

    388KB

  • memory/1560-895-0x00000000002A0000-0x00000000002B1000-memory.dmp

    Filesize

    68KB

  • memory/2024-7-0x0000000002EC0000-0x000000000309C000-memory.dmp

    Filesize

    1.9MB

  • memory/2024-8-0x0000000002EC0000-0x000000000309C000-memory.dmp

    Filesize

    1.9MB