Analysis

  • max time kernel
    140s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2024, 19:58

General

  • Target

    minato crack/Minato v1.2 cracked by IRRESPECTUEUX.exe

  • Size

    304KB

  • MD5

    4a8963e89db9130db38fe7e2e642db83

  • SHA1

    0559d169f5e8f1975c7f362da7f6d6b041722dde

  • SHA256

    a15d7048ad729b00c821c9243f231e4cee7af06b7302d87585cfde637cda872b

  • SHA512

    212518a0ff64ca7516c881b74d84f41c6687cd42a357388b723a0f3fcb98fa1788ec9a8a0ef0f9e2104061da96859d7535e4ffacffcbac32f24db6a0f3fb19fc

  • SSDEEP

    3072:dCOk3PcKmCrpbUjMyawdRmE6h+LEN+xjdaBH30B1X16Sy7oUPlZdK+0N0EkZ4sE:UOYcKuacmFFdBEFedZelvJgB

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\minato crack\Minato v1.2 cracked by IRRESPECTUEUX.exe
    "C:\Users\Admin\AppData\Local\Temp\minato crack\Minato v1.2 cracked by IRRESPECTUEUX.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/yzKKU6F
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6644eeb1c8c56d509da5f02c6356b4e7

    SHA1

    00b08c6f6658ffafbfb48227b56c6738c304db18

    SHA256

    13fcca6bbfe091a2a5a75f56a51fea67790b3fb5a3921245e7057f215877cd6f

    SHA512

    cec99f3bdcd79098af729a24e2a74dfba2881f3a680d19b014d015c1e8df778e02d314d566926e456c55fa4c9d1b2e51a80fa9f4d5f00635f0ec5e1b91ce2dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cbf819c095f766d6709f38eeca76c73

    SHA1

    e24b9e1cc1111fe030ab4c754461e29c1a1b8484

    SHA256

    d3a5ad9a0d45a48afbc23fa8587033505d51a99f3aff3595f7e82d28e35ad4c0

    SHA512

    e8795eaadc7313ace69309cbf85ea47973952dceecff162ae565ae82e7bee591af7f63a38ad4744e7c6870aeeb7231b83aeab64e19cc0702b038bd92cfc27c75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ab7a53c2401692df47ea072375bedc9

    SHA1

    af48e577e5918c56cb4948ed6ecc70f35195d910

    SHA256

    865fecbf5863b79c9fcbe254f9d264d89c567284abe734edad16437a373e19cb

    SHA512

    77880873daebd0c94de50f1fec6b5e261b12c450f8c00236ac59c8bdfe77e80a5761a15974ded4a6c4eb2b7fdf29de9d7e480dfc748e14342c09f1bad0e72a76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98c127283d0a8380907b27d315f22847

    SHA1

    bc9bb62b217749886b016f93982f271eb62b0cf2

    SHA256

    0afd83fbc0d5a34f9d09c992556433c56307d62b3f270e031001bf330e03eabb

    SHA512

    97b23e74362ac0d2626f07c2144184594407a263857109c934546c0039378d5661ed71dfd5b80de138285ce7b00944f0bf3a8f19dded7677886c731b871d2f59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d10567478473fd3c014361555e8d2cb

    SHA1

    573cf61ebf9f071aaeda8854d7a4d725a1e20124

    SHA256

    6c5fe6ce2829243fbc141387cd4db7cbd8829a791db567f023f2ce860b611e5d

    SHA512

    59bee35d179fe28a48bb440f3fe86d0c9506bfe9320b53fd6ec9b8943bf010ad5a4fc35aa9ddec50cbcf3761fe2e142751afc70a134446afa0347ccb182e20d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5983b553117ce97591b0e11db7555016

    SHA1

    5e4da2bdc6ab27f1a66d9f0d79992a89b3aee1c6

    SHA256

    151deaeb1fb4565a5c027b35444bf147b2153a8c38ea70206c33e28a44ff76b9

    SHA512

    646f7329afc74f7f397ee034265227f944e9cffbf639d96c62104a7ae4714aabf46a640b42c1e84a037d79676896d6300cdf573c981ea29066a716066b835725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    502c68cce1f6c37f7dc090ea4d61f9e4

    SHA1

    f5d0c624346f8b0dc01b1e724af5519b6b079752

    SHA256

    a34adaa2fa924e9e9d0a8e57f47963d36638248557bc10b51ee00f3a5529a526

    SHA512

    c7ec3868c2e644b284db9b110baa865efd0b647abb23fa3608b0b5afae18b93b146878d541ac7d4463d9fc4761ebe561318b14e5fe9b47998c54a90c20002390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbce0a47b1a2b7c52b8d2463782aa1f2

    SHA1

    a0f40b07a897135c6d823ee4897cf8fda1fcbb72

    SHA256

    74f3d4ae3d9e56a1b40caffd90847c7a216cea088fa40d61b2dafbbb14ca86e4

    SHA512

    e8dde1142e6ee0c72571cfa2c8eb7cd7ab6f7c5bf1b9688e18f979581b0bfcc34aadc2b765119e3a6bb98f334b2d3bd2f346521653003b8ba6d6ab6ded219389

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    214858ea3eeef1a0010815e011e549c5

    SHA1

    46c392998cafb05cade90d601923c292b96c8899

    SHA256

    59aa161bc6be86f30aeaa2aafdc0eabfe660d74608f03979bc80c9186b4ec156

    SHA512

    c29535d14d39bbbfc6dac85f571b3d9ced37ec61393042d54840f4cfc29baa27fb7395607000e08941293c02ad39a401ecd58ff5a7dd2974c42ba7d17bd8e8a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0a0fd7450d8d7e49878b34a92dabda4

    SHA1

    8decf2d17af08d52659b5db611ec1f5179e0ee3e

    SHA256

    a10eb1d160256b2eb0077a8689ec7048445803ed0ce3feabeebf07035dc79e45

    SHA512

    83de1b5980aa065f58547ff47af6affb56e284e3c40fcd674e11919b9ff9f3e19da25e77873eb7216a3a0579d7013d00388c5f48c1da2eb592b3de9aeda2eace

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    007b120c575be3c44c7156e4a0b870ae

    SHA1

    20dfc109731e64ecafb088baa19dc8751994edb4

    SHA256

    ab04815a08386a9c7975a650c278abd78002fae5edee71aef70a2d09f1022e94

    SHA512

    c7732685a465ab17fc506f17a8c3668f8f00adbaecab0bd4a0480b9388204f0fe49baee8707cffb07ee84a9d06667fa4bc1dd102ad1d33ac6e300ac005516a17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d724c15fc21ddd855ba33e5b5d9a027

    SHA1

    a268f46045124197f746a108eb5ff8e26e488380

    SHA256

    b4f8796c0aac646754fb73ce666c5912fe851a27b39f3010d1a8c3cb4c8593e3

    SHA512

    360826e71eabf8f93f9ec7f7edd6da0588171b98504bc99425028a5298483402b0bd032da770ebbbb6adae82afaf05d7b053d972c993ff3003af83cec71c2bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2d35116052af660c550c650cf521bc8

    SHA1

    62daa622204babb88739b9fc09a6e96b734be3bb

    SHA256

    2cff0fffb7ec06be70d406b1117eb01dcf072b92835abe3a917d883b1490c1e4

    SHA512

    6808177128c62bebb4e2fbefaf564d123ebb0b61232a726f36b789c166d3ceaaed29bba2b4ecd7286ff542d1bdfea131ee94e5595a045ffe5815a9f4c5f5dcec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    866f41129b52fc0d06804491469918c5

    SHA1

    b6a7f887032498a7f2534eadb042e0344c306e53

    SHA256

    4339abe52f2ce459099c923ce81e66d979ad4ff7081facf26b6e7ae5f75341f5

    SHA512

    33300221761ddff479f742d9e47f12e90fbf5b32b53512e7f8c867ff24f54b17e56d537db534d64f45c5de01015759d5f1f10f9dbc3b8adbc03e66f5cbe655de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f10eb82cc5c66864ffb915459e114d3d

    SHA1

    11d5c625db62a97080230457bd717dc23a226616

    SHA256

    ad5a70601ceadb39304400205ea97e2e59267db3b132cfa759b52372c2063c55

    SHA512

    7bea63b4dbe0e7f7ac4c61458a691deecde3a6e9399888c2f9b7f801f19a02580b66b87d17f2a69ba57c3917c6ed8429261647006ef3f10acb86879d7f712753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c00d78a81e96ae54f93a760a42dfffcf

    SHA1

    0c6b9fefbb97d8e9b13e755d938eea2bf53cddfc

    SHA256

    ab1706698edc4eab19bae1cb7c267bc874a72046e6cdabacf90fc6fed3ce6c55

    SHA512

    50f51acd814bec27cad8be77fd1ea8ae2a4ca08c827270e4515988a0f705e7e60d33108ee9ebbeff6444edc47b4ff622d43259ceb490752637c7ba48acda7d03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba94520287ead8edc2eec658be5f1627

    SHA1

    49cfc162069a80a2f9b1e8cb274c6945429809e5

    SHA256

    cc06a12ea231805a6bb9f7e346675c6ee2add9b3381043fa7bc0d0d3a9b2efa2

    SHA512

    8208df9ee45979b0c4b4ef3a56cadf6edc12579320eaaed9919d1d46a1a1660097327bf76746f8bf05de82d4fa287db49834aebe281b64081bab1b86458699b9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z8d0nzh\imagestore.dat

    Filesize

    24KB

    MD5

    9eee937914fa4dae1a08f3258c6796dc

    SHA1

    f63655022d8da2a9fbf2f4315d030533710c5d79

    SHA256

    77f3c9af5ae5e0701a31124f42e2c84b92631ef7f1e9365e3916a2546b25c719

    SHA512

    46c08eafdf6530868d85abb9a75a94ea42207c42b5e44607851c7f9a38a755c233f9adf0d985e9b53bd0e6d216cbe27043464f6976737aaceb386bd7019ae7b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab2453.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2455.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2084-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

    Filesize

    4KB

  • memory/2084-59-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-58-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-37-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-36-0x0000000063D40000-0x0000000063D4B000-memory.dmp

    Filesize

    44KB

  • memory/2084-35-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

    Filesize

    4KB

  • memory/2084-7-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-6-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-5-0x00000000004B0000-0x00000000004CA000-memory.dmp

    Filesize

    104KB

  • memory/2084-4-0x00000000004A0000-0x00000000004AC000-memory.dmp

    Filesize

    48KB

  • memory/2084-3-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-2-0x0000000000730000-0x0000000000772000-memory.dmp

    Filesize

    264KB

  • memory/2084-1-0x0000000000240000-0x0000000000292000-memory.dmp

    Filesize

    328KB