Analysis

  • max time kernel
    16s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 03:22

General

  • Target

    d35c17069d028b8f5087b79e045a1f58f2418e678ec6eb64afb8b0dcc2e84f77.exe

  • Size

    340KB

  • MD5

    5e4eabb874256bd534b5dc96ddbd4d43

  • SHA1

    a551b901dfeb6c60fd5971158e4caf8752a5fac4

  • SHA256

    d35c17069d028b8f5087b79e045a1f58f2418e678ec6eb64afb8b0dcc2e84f77

  • SHA512

    fbbd5d95831aa40472bd648180590d9a6c765cc652e7a07182592bcd64f9c51f433886587b33739a7d8925df2907d972c5a133d4ee147256af6748c521543813

  • SSDEEP

    6144:MRVQPKuV3eIY8uwJxuaIFtkxOd6HarTrjCP9sERagkL9:fKuV3eZwTZAUi663rWPzkR

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d35c17069d028b8f5087b79e045a1f58f2418e678ec6eb64afb8b0dcc2e84f77.exe
    "C:\Users\Admin\AppData\Local\Temp\d35c17069d028b8f5087b79e045a1f58f2418e678ec6eb64afb8b0dcc2e84f77.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:900
    • C:\Users\Admin\AppData\Local\Temp\d35c17069d028b8f5087b79e045a1f58f2418e678ec6eb64afb8b0dcc2e84f77.exe
      "C:\Users\Admin\AppData\Local\Temp\d35c17069d028b8f5087b79e045a1f58f2418e678ec6eb64afb8b0dcc2e84f77.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\GRWSG.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Smapp" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:1784
      • C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe
        "C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1360
        • C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe
          "C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2592
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3814c56ce0086c1c77fd5e3f210e82f6

    SHA1

    f20550c2d39cb126bb5b18a38888dfdbb5e8ff09

    SHA256

    96124a503a19e0401d573d55129c2a678d72531a0235ae3705575986c71a452c

    SHA512

    3a5c7db871e61a417cd426822ad32a1af9ac6f7a30b2f6beef897cf3593c5540927642f611017d5ed386c4da7fdb57752f6a4e51b54c17125422a557c2e82449

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e60b387619d596e8de4f34dd6735dcd

    SHA1

    6080e91468841d965b01447ef97c722558aa373b

    SHA256

    7ff76a1a6638fedf97792999687227425dd6c3172ad86dc3b868dc2d132f5a5c

    SHA512

    ae6d205eeedab7ace3e2690ba9acdb322ab6cdef4d7275baf9af0e15a81afa59db29a6b24c8ef5d3fdb6570f9d2a19bb267c536dbb096bd34bc4dcdd0bc6e9b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cea3f567d51dc48c4c29d521c27e91a8

    SHA1

    703adefd773307c0cee76ac1b062400054d83b14

    SHA256

    503d3c346194dc782fdea6a3a64a796648978093b315833ff3854c83a7d3613b

    SHA512

    55e05623b108599645c6f10e87c0f00f63dee23690e908ab8715e0cee7eec8e2e19666c8a79f4a0a5ae5ae07bba359d3ef632f49f6a3935f52cbe8eb146b86da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18ce4ca2ba886186d9212892f07c49a2

    SHA1

    856fbcf8779fcb50e040d6abaaf19572d6d0bf16

    SHA256

    c70b15aea04c057c5b50bf3a3baf0cfa16eb7628d65fdf4d30432a6f53657e48

    SHA512

    dc83f36cd6d22c0b248c6294fd6099fe3d9ff904d8ba057f670ca166687713966d70dfce519558e99aa7115143072f4e7cdc9748d8b533f7df19e27af3e51432

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbbc53d39982e184cb8b257a4c626c86

    SHA1

    013471ffcfc29ed13c1199e5b7020d00ec669180

    SHA256

    4863f2c1e6eba9b72b8ecce630d0ffef62436fd77a43bb722569ad26746c41bf

    SHA512

    026d039cc2c82ebb48259f1dee03acc19a27bc38cdf0a452ad984986acb24ebb260bdbf25aae7b2c81265653cb4cf709204be71982d18cb8b2186bc48e6adf96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1310e1bd0fd1af7429593477701b464e

    SHA1

    a16395c23e9941ef8ac84f1033087eede48a2e82

    SHA256

    5c602930da2401f90b7615b382453089c494572f8e4c8fbaa84a9c76cf05f086

    SHA512

    3f8830b4b729f048a53a22a42403c4b0fe81b21c1a9d7ce4566215d95d4cf8f0d2c0e7b78541a9f6b2dc56d76c7739a57235195ba6e46265fa934be0f81c3e2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d18a5501356f27f0c8c47169d3907c75

    SHA1

    043a1d1d73b32e5179f6e39d884cf790889e8960

    SHA256

    fac0d38510d9962db2c47b9cd6abe58b8a97b1f06dc72f12a17cc2901ea5429a

    SHA512

    b4d22d24ad406ac9265f8821d6f48fa2e48bd77dcf2c756048864135f5ea20c229f217d611ebe125bdfda4ce39342ba04fbe347b088968315fe19022868829b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b52d6bc6d502ca8a1d38bfe2e19e080

    SHA1

    a57dc99901774867ec5f4b79dade540bae137990

    SHA256

    f847886ddcf101fbe8b6d3907f9255e09bba425e7d2bc80bc268c5e37abb11ba

    SHA512

    b2d21ec6c393bdbbe0ebe1e39d739dd4a4898e7a1cc405b21f424fd3e8e572804affd13993696705abefc0d655af4f42e19edad15397226d30ba31382a71afba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c694f2d167d93ae18b4d5d21ac626f0c

    SHA1

    fc70165248fbeda1fc734b10f8c7bdf1dade890f

    SHA256

    02d094cec6204f3ada543763be09e2d475aa314f4f4fd7793707f11d379733db

    SHA512

    34d042808627d445599fd1194814789da9e111ae092d502df06eb052a774c5c195add567de283e016de020133effc0e1ae25fe431614ea6cdf1a55462b4a73c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    502d2ca2c66388dc4ccf52e83eca1a01

    SHA1

    b9fdf23a2e53b663ed12865e2d6ac10fda66ad21

    SHA256

    b74916edbc20ee949a3aea6ea93f39cd787c9dac4b042f76f889078d717f9fe3

    SHA512

    371bea7a47cf8e450f72e2c90e537e1e13eeac8edc61c901a0f0e1807c85d06aee68a0193c7ef7c6e1d6f7434a0890e57496a57a27ecc07ed692826faca1aa9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    629ebb2eaf2b99bed30b87586e6fc34f

    SHA1

    1cfd433a04913f16088803dda5ebcb844ae711a7

    SHA256

    b7bff00334ad90ccaad4b73b9a4dd8eb5d31e50cd083f6167d710a839d43e46f

    SHA512

    24ff8c00aaea571b97f17188c76c589a31cb92d08083b91991409773fc8ad319f1d8ffad2873b0f40e0a2a77c881ba90e52643197ffd054ad52332d077d5767b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e66abf8392ed3428eee336013fadace6

    SHA1

    efeee28d7a6e418d08fad307dbdd6462a47dbaaf

    SHA256

    997610917b464dd049e1f804affe2c5a62e0605f8b2471be6d6734233f92aad9

    SHA512

    2503f4334c7af4cb9ca2bbe9f60efc9189cb190bf4c575f88287e324bf8793e3ec81a3672f3c9fa57561936894126dc8482fc81cc66b962e78239212bc94075c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6a146391db1d38a2cb97b4bea93b6a7

    SHA1

    af1271946908e8b03264337bb0f4b830fe38cd55

    SHA256

    b08dfd7605bab8bec25d304d7aa06f743db744959dd9a0bf4eb24666513bfd87

    SHA512

    26f4188f3fcde7c97e5ecddf8fd03a8a5815412683696a7fd765dce67047dc5251a18812b2cbdcec601d5074c942c3fccad6c06800c14db4fc9a37ea97a7ece8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd8fdc632cc6b3d77a131b8663bf4e86

    SHA1

    115330f0ac6a2bd3c32504eea9bc4e2e55e109cf

    SHA256

    efa7bec392f679baeffc4d35e5a21e7e48c71f4c9adac7bdcbf06a6db7f1a402

    SHA512

    0e5dfed177d565009ea2beb9877b5048e2607972ad341454c4e7bd3acd16a3f41e03f91339b7ce6e5accf08689245ba90057f310c638a52156a93062166b8c30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12103020dc01a7105dfd02ff7f2e93fe

    SHA1

    7b8eadbc6862dec6a447a6d3ffe1ce4c589b6689

    SHA256

    e2c0abdf9c6a1e95490168c1654034c6b29876ef7907f63ba4c1a55ce5c73a7c

    SHA512

    a03dbe114a299b6f0c2fff14a5f146737a9dba568c41251a72d637000feeb6116913032ab6acf85e566568b480b4852ad4657ecedc8fee32f6ae4f93c5ce796f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2f19521d27f026647a0db5600c30a44

    SHA1

    03479cd7e86140de4dcb79a31894893a4d8848a8

    SHA256

    9ac0f925c476c8f46afee93c95293a21551f11ec4aa96c62fe15ec25ef755b65

    SHA512

    5e77e75d7179375db53c05a851341fb74d673e93cb510741a2d9224a277e57816969d74a98fd2ea3931284c5bf7bed4a453e660a4698008e5774ed4581f7e97e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    245c432b245a94713377bf02eff8468c

    SHA1

    ec9b55f95034ff4abfd66081304a66c6b336aede

    SHA256

    7323e0631542c0d054a68b1f78f98d05a361e9b63aec569e3184ecb58a1e39a8

    SHA512

    db924c2a8e42607c32a4a6f571ad0ca327ca2e3643d7089f3a528b8646d5d2608b463b185de622ffbf6f7a20aa21eca6240b920e555129d06a742a41d9631c5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e791f1cdbf8faa8a7ac4248c3e6a9e1c

    SHA1

    4fa5dccfafc9bc9250c4780a3a415f1e83722bd0

    SHA256

    a8cde3993eae78ea6d7d8bdb8dc48193bbd76fe793ec762b3eefc81e31bdce2d

    SHA512

    6894c37e832cb022d3440fd8585c8b092044ee87da9bde24b508c687e5e6d0f0411d93ccebe77a1c2ba6d7b411048bb4b4653ce7b051804e3cad15feb77532fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3799e1e309449260a0e419a5d2b6970d

    SHA1

    8067a552e9f3b041d402a835a679091a4afafdfb

    SHA256

    29ccd81ea6209bc158a57d8267d1942f1cf9eb5b30a5cd28267dba851a0f69d8

    SHA512

    b1d95d37bd8917b60ff2205b722d71dccfe4d1f0d63e90dae53f6f86d955b31de41dfaa390e39a025153a1c12ddff164d55d33e22a1fa5aeab03d213f12caec9

  • C:\Users\Admin\AppData\Local\Temp\Cab8C8A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\GRWSG.bat

    Filesize

    142B

    MD5

    b4e1192aac1ae430ad3ed5f308162c58

    SHA1

    fd18dc99cd6b0d5c4973abb4d69c30d51104ec24

    SHA256

    40eb34eca7a66201217643f2a7afb2b3bdf5a05783a7bcc9138f084185dc8e29

    SHA512

    7299ccdb2764616f0e7b0c80ad5220c1d57f678a8d80463ec349e2afaad131e3f640fd196556e5c8ebd7ca7fe0de2d802460d8bcd65aff1de40b603abf0bbee6

  • C:\Users\Admin\AppData\Local\Temp\Tar9811.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\SoundMAX\Smtray.exe

    Filesize

    340KB

    MD5

    42cc85321f2eea7e69993c532f7416fe

    SHA1

    beaabe88f7ce5beba772a2de5ac806053f5a99ff

    SHA256

    6b404aa2f647575cd5d8a797a311d189596c14d35b237908b7d521774863a834

    SHA512

    dafc9dfadfb7905202da747ac56940e71bf60e8dab78ae24ca4fcc35d5d8074608d5b7a9178fdc0af5864eb453cd4947f064ecba59b50a40306607bd58491efb

  • memory/828-298-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/828-657-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/900-658-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/900-299-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1792-64-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/1792-44-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1792-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1792-8-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1792-10-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1792-20-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2592-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB