Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 22:58

General

  • Target

    autodist_proproctor_M2/client.exe

  • Size

    12.3MB

  • MD5

    49fee9e45690cb2d12f32923ff5c7060

  • SHA1

    eaa52d56f0998b81bd54397d0d0d0c68d47e4838

  • SHA256

    4bcc56b8279bc707e0f6a21a9fddc8c67903383f84ba1bc0477b8327ab370719

  • SHA512

    e08c1fb1b1fb76dd6b6d768b397ca7b20bba1aa54affee551e248830ccf8bbf8957e888eb88be4725c047b52c592d13ebae1218771699739c31bcfb43f9d9390

  • SSDEEP

    393216:oTHuJuMZfRcpDfuSkqJc5YYR4FjlHN4Ol:KHJY5c1uSkqJc5l6ZtP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\autodist_proproctor_M2\client.exe
    "C:\Users\Admin\AppData\Local\Temp\autodist_proproctor_M2\client.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=client.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    895fd9ccb253774cb57f331a595944d5

    SHA1

    c7fbad6701da1a5dac18435138064c34e3d67b37

    SHA256

    f50207a47b7952238b61bc7ea304695129ee79bee9bbf3ddcc2c6fcaf103a303

    SHA512

    15c40cb09feb2ea6847876a6869d478e4875992e9d187934ae12f44127c1312d2480217ccb8623cdd5122813ab93556f7105ebd5e8cd07a66bf7724e5f82c4eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7fd16271b7e41b504e57fff69aa7c29

    SHA1

    0f8fb0d307443f46ade82631532bef2d20231a42

    SHA256

    da1652c183c95a3292e9a47b46cc797e35da98ee7a0b921c10c530499cb890ea

    SHA512

    f6caf7d6c16e664d1931f62736448b47a9a1e322dfb4ca24201f52500a5a8183e405531086a8d91895f1b346acc4e2e693e29649558b9dae2350fe251779e6bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bfaf9eec575155c314c7a75f9e70ba9

    SHA1

    3796b227dfa1fd52ae203a9815123aae719ba781

    SHA256

    a722737decf0b2f932a0965d254f526b7d537bfd12df714e9d355f28aa8404c1

    SHA512

    c928bda1ed32c3339a0f4d50048ca5a06e64b9c2438a195599a4a004cf882a5034cf49084c2e0ced80a76f723bcc594daf893632ef3bb386142499314baf4248

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5490d0e8131c0a6e4113bcc64206094e

    SHA1

    6702c3b4af3bd903cddd6a6e6424e53e5fbd69ad

    SHA256

    916fdaf72e3c89651bb2783f8f1ee818cd005d6b2b6c758f378b010465e9374a

    SHA512

    00f4ceac54f6c29884c7c79a1cb2a0cc405ee276cb61e8f05378b4a6ad7a09160d6521b7634ab0284c897205c706f8a527714bf890ae60b7debc2e760e1462bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7801f1b3e67efe345d671a90869bd16e

    SHA1

    dd5f438b81fbb2de21e51d9decafd5e53fa7abd7

    SHA256

    371cfb995edd08dbacad94c8f3860fbd5ca8eaa929e83383647b879c1c8f7cf9

    SHA512

    f60c8cb174bd5215df99d2f4d7a1fe753b309d8cfb0a70b077219f1fa38638c1607b249fa9ffb99282f6fe11477eefaebef8db855f391bde7f401e4c82a6f760

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cf5355a49fdfe1a0314c771e1f4f8bb

    SHA1

    2333db00244ce873c17c0ada58712316d93a44d9

    SHA256

    ae9adf3af9bd02a762b51fc2fb5d1b20fb5e39e70f62fce28c7d5133608f42c6

    SHA512

    2c06cfd13698cb9f0aa1b7651096607690bea28badcddc8c5d31b2b8c1ebfcc2e18d8d0d1cd68590ed75bf03bf8c460f31efa30b32021099ab1e86228b5fae6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dc658e2a1f9949fd03226d4eafc6092

    SHA1

    ac2c4af7712b4999a2cc03fa5014ef183c744dd3

    SHA256

    c6f25df2a1ddb000e2fefb03f668ff749aea0a3d6c4128bf55a0655584b249f2

    SHA512

    8cdbde28f8a9757f6d8c39935013501585799907ce6175b9ce404a6c824467cda630bd158ce47b64a5123be9058b841218fbccdd6e19f9ab2d8500ee5d321f3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9df72c8eca8a649c25066f68a5d3552

    SHA1

    4299a9cbbbab3f19f223053fe04848df8790ce6e

    SHA256

    3b93eb6d7d5ab66d70c37901997b919c1b11733a8b025f710a5b76d1bbd29e39

    SHA512

    002e0feadf6a00a8475f577035ce0b102d9c783ef48861958753dd1ce9049e24c730ca4f5465b37e493022132f1cd78cff6fb6cf6dce234692a8614c115f7ec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6843067ff41e1099bad49a6d9dd0aff

    SHA1

    4a6a7e17b5f193aa3aa2d6ab4fbc10e724b663fa

    SHA256

    30bbfa29f4d97e301a2f37448e1f3a7d2553962c3019c93b2c88444e9ec44c19

    SHA512

    b3b75a0c5cb99c04fa1d2091c84c23689aab763b31ddd3c9958fc621ea224749380a961705c5244c0b0e7a612c592737e4e854d34f4793f70f905754fcb809c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    510a6268b703628e36e88a8900d2a296

    SHA1

    c607a36e7cb5f717db64a4b25d815a9609ae9303

    SHA256

    4b7e59ce593620e2b5187d1c8dccb611f7fe9ef28a1484f952dbd2cd1c98ebe3

    SHA512

    ab346caeca0e4aea15cc91e1a51e3f7b1651429876f399b37400b26b22d1e3400529e23742a1612d484843368773898770fb84cf556e5f44e15ec3aa3e157a20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b14dc385cbae3cd6b35058903963190a

    SHA1

    3166e55af7c22c2e60655b1639bbf5d2693edfa7

    SHA256

    7becb53db3b86adbd93b50151dc84e2200a9b2269b506c990b934e9e83254b7c

    SHA512

    c8f8fd858f3469032970c8cda3e8c24cd84aa1d9a6c2cc5cc2ca97c80f6593bf1696ee37ccce6cdeb403ae33556d4c802c552b04e8bba431de11453390e5f371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a510ef16b70771208c971276d059145

    SHA1

    e0202556c51c24c61422aa7062f74b3997d38fb9

    SHA256

    0742164d525e503391964b8bccc18ff79878c121ca5fd730a5a3f914ff4894de

    SHA512

    51246b86e28c9743853930dcf4331a85ccb23723887ea8c07ce5ae6ccb8787bf64be8a8e7ba6e8f308bd7a391629cae6d4914a4209682e8bf2f6bce38327bdc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    778af9d8e6a7c8dcc4b32cb6469f5b23

    SHA1

    91d8683e48a6b3a0442de831b33b6fff4526fedb

    SHA256

    4b498c020c9cea6d38df7066586e15e83695ff04e160e723c24234c8971f2deb

    SHA512

    2321bd441a4ff7e21b4d66cb350fbfd655bdb51f69cb3ef97746f69282435d7dd1c946c1525136ff70ed0e8b016e27cb4660e1a1570e2ea7f674fb5faee79052

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9da10798fa6c19c3ff1ce7415407516b

    SHA1

    e05e93e2471cd85cb3901f34423efa46452a222e

    SHA256

    f074fb799db4bbc1ef33d4bae6c4630292cf2181ce1e7b23c822aa6b6dd5417f

    SHA512

    a8c838afb20761892e2fa419ed4c3d484ec8b1686fb2ab63db3c74e25a6a1847e3c560ccd080be9bd123119365bc43350f0108c37298d0d0622fc6cfbee588f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b935537dd3fbdad94bfd06972e25b812

    SHA1

    229fd297b062c112ae4d0693e4d88d930ea03a8a

    SHA256

    f279a417d69fe2d108be6916aa5eca49f8685814d3c67c062e88536bdba2adb0

    SHA512

    afc6a660eafa3430cdc9d53982b1d179a2bdd9da23899bbea0f4cd30323986f85c67a92c0c97047532f9f15d5a2212e03901c25031fc1bf274f61052f6476bea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3924be660e94f189de09dbd9f5a3c8d0

    SHA1

    c27c5941b82248d3c77fe6ad500a9bbdfbe365fa

    SHA256

    2d5afc13b8982e4d9ce667924c462d9fc0f49bcf2d610c95e119f0feaa2aa23a

    SHA512

    ccc990f08f5463777b5fb5f62b63755f2178c384aa036124d559cc27c0ab563f7f9a634038272e0b4cbdde53b6f1f1fc217b61961ad3fb91ba17a9269c87d62a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c86e676ef333e41bafaf99783e86d78c

    SHA1

    1537fb280ba8814acaba8eb333da47441825f0a3

    SHA256

    c45a85a49340c08e74b3860faa181a0cc6a9313bc257aa5b49fefd3f073af643

    SHA512

    6e82e7096da553e1867a049ca3859e7c96d762449bd09c9039ddedd4e4a0652a7e59ac2e204c9a1d4f2d5bfa536b7404e20f2fc270284cbf2fb2ea3ece2a06de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95e377bea86e444f0b60e59c390ac9e6

    SHA1

    ad64bea0eb8a2e3d443874db55bc614e20d6b36b

    SHA256

    a209c1130244b0714a0d94b4b6320342fcc9a1399f2d30688ebe7cd00c367f1b

    SHA512

    21d62e17bc664299a482711860a851e076661f4e9ddb033df09b93affe245be84e146fbc766004e7edb50b95de7a894fbdadf3f94cc9dd82ca0f985197b5d7d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eb650d5396a9dd8f745782e7488848c

    SHA1

    5eb06285149a7238284df80736a08078d64406ee

    SHA256

    37b18a9f97c19b1f044c988215a5c32f6a39482cc302f96caa5be4bebe6288bf

    SHA512

    086cdef997665b11cdda4c82ba1b9985a07bb6dc204a99565be212d81ce07d63cae4453e3d5a01a188b05d2faf3bb8518e41c6330f860cd06324cf35351d1013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9c6bec491152fed6792e5a3723bc674

    SHA1

    271ca84b18777a549190e949e3cfc1719f66acf9

    SHA256

    d4a7da57da01b2d1a43ad8e8bfd8782b1727b1ece91451e1e70f0f92ad4aea99

    SHA512

    074daa628d0dab5ec6aa1501baa673aad8c160295691fb67349e3ee3b5fd4acdf96b6bdcae52553e2c3dc1a2312b937c578bb419ce7566e8c2c0483c8d546d55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f39685fc240d85f4920ba0aee3c4f45b

    SHA1

    a54834fca48a1d4daada51780c9682c135557699

    SHA256

    5302bacdbfaae79dbdd7d8ff00dd94e735a61903925eea9f52563eac86bda123

    SHA512

    b3f465d203709261b08213a9ca79f96f20bdab066d484330d26d32dec4f9a3383ed49800a3bcb1ce70b71ac38a1b97ba5e28fab4b0f2261a15a183e22efd19ea

  • C:\Users\Admin\AppData\Local\Temp\CabF2F8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF31B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b