Analysis

  • max time kernel
    32s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 13:09

General

  • Target

    5.exe

  • Size

    2.6MB

  • MD5

    8795b9dc143cc722309f169b2c0d03dc

  • SHA1

    9b059d1369cab7737df0e6a71c661538010c4a66

  • SHA256

    378ecdd05f86116341b66cd65cc2099418df21fd4ae740b2bb7a172127fc6266

  • SHA512

    725c65f51cd419fcb8423a5d527b22b179812b2dfb5bf2a54a1bf1330c64994a76f3ded5cdbc68cb42a09a59c4c78706ae7898b12aae52e56a1beec80967acea

  • SSDEEP

    49152:Zkky3SUp+YA1iSuei6ZbSXo/LLAxjVH7fLxmal7+hUnWB:OFB0sV6Y4vgZ7LxmQyaI

Malware Config

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5.exe
    "C:\Users\Admin\AppData\Local\Temp\5.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c @echo off
      2⤵
        PID:2548
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c color a
        2⤵
          PID:2360
        • C:\Windows\System32\notepad.exe
          "C:\Windows\System32\notepad.exe"
          2⤵
            PID:2700
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http:/www.google.com
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2388
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:2
              3⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2780
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c takeown -f -s -q C:\*
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Windows\system32\takeown.exe
              takeown -f -s -q C:\*
              3⤵
              • Modifies file permissions
              PID:2224
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /F /IM hal.dll
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM hal.dll
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2080
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c reg add HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem /v DisableTaskMgr /t REG_DWORD /f /d 1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2936
            • C:\Windows\system32\reg.exe
              reg add HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem /v DisableTaskMgr /t REG_DWORD /f /d 1
              3⤵
              • Modifies registry key
              PID:804
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c reg add HKCUTROLLAAJA TRIO
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2384
            • C:\Windows\system32\reg.exe
              reg add HKCUTROLLAAJA TRIO
              3⤵
              • Modifies registry key
              PID:2928
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cmd /c tskill hal.dll
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2524
            • C:\Windows\system32\cmd.exe
              cmd /c tskill hal.dll
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2988
              • C:\Windows\system32\tskill.exe
                tskill hal.dll
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2992
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c reg delete HKCR/.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Windows\system32\reg.exe
              reg delete HKCR/.exe
              3⤵
                PID:2340
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c reg delete HKCR/.dll
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2344
              • C:\Windows\system32\reg.exe
                reg delete HKCR/.dll
                3⤵
                  PID:2420
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c reg delete HKCR/*
                2⤵
                  PID:2156
                  • C:\Windows\system32\reg.exe
                    reg delete HKCR/*
                    3⤵
                      PID:2160
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c rd/s/q D:/
                    2⤵
                      PID:2796
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c rd/s/q C:\
                      2⤵
                      • Drops file in Drivers directory
                      • Drops desktop.ini file(s)
                      • Drops autorun.inf file
                      • Drops file in System32 directory
                      • Drops file in Program Files directory
                      • Drops file in Windows directory
                      PID:2116

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\MICROS~1\CRYPTN~1\MetaData\943080~1

                    Filesize

                    342B

                    MD5

                    d545481fece8b83d37ebba674e6d8a85

                    SHA1

                    0444d7454900cf3298e6dddf1218c20bb31638a0

                    SHA256

                    19725b783bedfe08909838406fe2e6b2150680fc9f76b6400c30d31dbe9c9bb3

                    SHA512

                    6f1f8efb736a075a6f97dad552209bba6ffcfc8ac96567026e0c013fd6718ef408ea6cf3c7f020819c8cd63387dce44879e203744c84e1d92df8bf44f9e40807

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    e5ba1a243a1ae78edfe25d23abf157ed

                    SHA1

                    970ff2ee1f57697188673285e0a7d1d1c4e596f6

                    SHA256

                    83849ffc2f68996347ce9678a506d53de4a8a78415f6ae57df4d0484b205ae4e

                    SHA512

                    db4c617a915a0f32b1e99ba2dfb075fdb6031bb6eaae4244b31155311a8275b4e8271702d57d54c2e666b6925028481e42b7fc83a7d1003cf5d540cc9fa88dfc

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    1426bdb516dde69f3a31cffad69f05bc

                    SHA1

                    2fc9bc7d95bfa8d5481a14fd215d3161e617c4ad

                    SHA256

                    de63e150a7307fd6d999870b2496bc498c976f8dc2b28ae0b1226383a120a2d1

                    SHA512

                    4e73cf0801f20f24be53bfe8268bfd7bde52afd1380b417028749dce8fb28754c13f82e5b1ca838bb896b3a6c64c8802f9127c13c70e434f5c3b59738e54651c

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    057c77a99f50b8483b18964a64272fb5

                    SHA1

                    0352be245ea444424550f944c21a7687622dca80

                    SHA256

                    4a5cf5a31fb8f0d3e40e3227356adf6bd0ef9d530a7e7829d75a182a97d44a79

                    SHA512

                    c342ef03ee39e944ace3be3de770ae23b2e516ba94aa7cd7325893b804e10dfdc06f4fe8dadaccf8d975018c1551205aab288dfe0b78e3416916ba6574902acd

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    f8e2ff0af311f99dee682c454eb9596b

                    SHA1

                    7962fae42536199a42700da8b7f2be43432ecd1e

                    SHA256

                    ef7a54d8688d90b61cefc33ad0d88dca28392b57f622a913289b3f08edfd5960

                    SHA512

                    6158bfb3e7020ccb5e69e42c50fb8aad8d9462a016876fcfa74a0490a0c8f693f595ff218bc014b11de439ad3e0ea3c31d7485b46fd66fd955a22c3910916044

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    9c35af42da6b7180b550a58c067b63d0

                    SHA1

                    e7536a22b6857a8bf3ef08c8f44ae57d5a97ed47

                    SHA256

                    e12cd531123f68300d5761e126e91e8a8e494b1f793731dfefb06ffc502ce706

                    SHA512

                    217f33ec8ef866410c1ce624f47ac5a4cf79928f5cd7d6943809e51b6beca3387a6464da1679ac8eba9cebc73955e6433020b65ee00f6c8c848e5776d16e3f80

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    76f506d7aa5ff9635fb2f13fd878fa72

                    SHA1

                    75939363916136af832e174a41890dd44913fefd

                    SHA256

                    47abeb7570cf0b2c1de1a30e84af5d46f9c5279659ff675bd1637ada39c34077

                    SHA512

                    de13da4795e24cea8cf35b8b0552765f2b03b5919adb96f7ec984e001b66d395913bde2e18a35088bdd7b34809121ca72d03197849b7fa0cb0f3d29e7f32bb12

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    181b139ae7bdbacb78ac5477cfd0ee79

                    SHA1

                    f6d308da83cc6ca2896d8a2e3b9a7252c01b33a0

                    SHA256

                    dd6e31238854cd6c338a16e337be3f0fb4fe407a3faa6fb650731559927e75bc

                    SHA512

                    c4c0f9a32135b7a247b1589a806f8ff9e23f88870970f0e31690b2f2bed964020d153e25144fafd59f7fb963d94865f894f1ac82bc1a1840ed19dbef7672470a

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    6341da0263c7dc373513342b96fadb27

                    SHA1

                    152ea9fea35d7671a5b79376d8314378ac281e1e

                    SHA256

                    c97a2a82b280ccc4d40e3d579d2ddd4cdda0df707f5a40d104e77d37e5234200

                    SHA512

                    23d1ce279b1d6be4ef5e9bec611461ecbc55620ff6b984ffc5c6e56e3127b100bf3388a27ce8aea86d1ba46e38c5e4f7b1f3d83f68681b1565041b3617c4dbb2

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    97a89b88f0cf41486d96b86ef1f1e4c9

                    SHA1

                    5dc5e8ffd1aedc82b82d2ea0f512fa4d954919e8

                    SHA256

                    4bf06b62c2b0a02284e46290390d603807d8949c07f61e080919efe182fa8568

                    SHA512

                    c9a49524172fbcf945cc1a19467ad81fad6d1431fda7512b671266fef2e15c7b3d6e4e1c561da89d6553bc357053478151c16de74d6fcc4ecea6be36c3a43e28

                  • C:\Users\Admin\AppData\Local\MICROS~1\INTERN~1\Recovery\High\Active\RECOVE~2.DAT

                    Filesize

                    5KB

                    MD5

                    d96ea5cdfb2d9d41424deeee83986196

                    SHA1

                    79e0885216cb7c9fe6b4095576012d41251a073e

                    SHA256

                    f1da52c98ff3a5bf7dc1cd01be6703a52c38990acf4221b889c6fd3ff3ce6b97

                    SHA512

                    84e01528ad87f03ef5660648b102d4e9decedd09ca3cfc756331f7f6756daf15f673662b2b197fe29af86f86d3054b866b251ba5ff9af81e53ceed4762128c54

                  • C:\Users\Admin\AppData\Local\MICROS~1\INTERN~1\Recovery\High\Active\{E0BF3~1.DAT

                    Filesize

                    4KB

                    MD5

                    4428668f4e7d63a61070390e869d6ce1

                    SHA1

                    82343025fe2ac3d2190761498298fe894dcdf009

                    SHA256

                    5892647864a03a8d49a854f7c867b013e79fa8c1e0b307af11cdd87884c14228

                    SHA512

                    378c7c19b7521d1b130e1bd3d27893edc4514579789485bea777e030a1585aed532b7ef8ba8c42597e8d9fefa89de83b1ae5417a8b6a31fcba5c4076d91c3511

                  • C:\Users\Admin\AppData\Local\MICROS~1\INTERN~1\Recovery\High\Active\{E0BF3~2.DAT

                    Filesize

                    3KB

                    MD5

                    cb0a3c8ca7b0630bbf26122e1e886f75

                    SHA1

                    77974ce22c5153d4ee320d044dbcabcef71ae024

                    SHA256

                    8e5de5335ab0a5be3b24cecd4472fbd13a08c4b3c61abcafe6fd1502b8ef5df2

                    SHA512

                    d3b75adf15650dc1d8ff4b92322fec190657f941f048d85ed578b24457e242216563a0df87959edcfcb838e02498644d4fadd5df981cd953348e83a5c192a705

                  • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\01LB6K3J\HTTPER~1

                    Filesize

                    8KB

                    MD5

                    3f57b781cb3ef114dd0b665151571b7b

                    SHA1

                    ce6a63f996df3a1cccb81720e21204b825e0238c

                    SHA256

                    46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

                    SHA512

                    8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

                  • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\0I0VVMWQ\ERRORP~1

                    Filesize

                    2KB

                    MD5

                    e3e4a98353f119b80b323302f26b78fa

                    SHA1

                    20ee35a370cdd3a8a7d04b506410300fd0a6a864

                    SHA256

                    9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

                    SHA512

                    d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

                  • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\CXRG2YQS\DNSERR~1

                    Filesize

                    1KB

                    MD5

                    73c70b34b5f8f158d38a94b9d7766515

                    SHA1

                    e9eaa065bd6585a1b176e13615fd7e6ef96230a9

                    SHA256

                    3ebd34328a4386b4eba1f3d5f1252e7bd13744a6918720735020b4689c13fcf4

                    SHA512

                    927dcd4a8cfdeb0f970cb4ee3f059168b37e1e4e04733ed3356f77ca0448d2145e1abdd4f7ce1c6ca23c1e3676056894625b17987cc56c84c78e73f60e08fc0d

                  • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\Q0WBLVJY\NEWERR~1

                    Filesize

                    1KB

                    MD5

                    cdf81e591d9cbfb47a7f97a2bcdb70b9

                    SHA1

                    8f12010dfaacdecad77b70a3e781c707cf328496

                    SHA256

                    204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd

                    SHA512

                    977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc

                  • C:\Users\Admin\AppData\Local\Temp\Cab7ACC.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\Tar7B3E.tmp

                    Filesize

                    181KB

                    MD5

                    4ea6026cf93ec6338144661bf1202cd1

                    SHA1

                    a1dec9044f750ad887935a01430bf49322fbdcb7

                    SHA256

                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                    SHA512

                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                  • C:\Users\Admin\AppData\Local\Temp\~DF2DF~1.TMP

                    Filesize

                    16KB

                    MD5

                    07c1119c89e8d27138529a61079307f2

                    SHA1

                    693c57b8111766425256371aef32837771901118

                    SHA256

                    84658464a1677eb52f893ab3470844abe99da9b3d5e26193208b3ef28f673d72

                    SHA512

                    5493acc71e6d1d4c46e9596d20792f684fec02217e4fdbec53f647d22ffe9502d771bed4366bf8d7b146ad197f2fc53c058176fbcafc04f401cbf227f6842173

                  • C:\Users\Admin\AppData\Local\Temp\~DF84C~1.TMP

                    Filesize

                    16KB

                    MD5

                    02a6bfc0ccd0801c1dc8dd42bf53725e

                    SHA1

                    3bb5d96a9a998173923f842ecea63584282ce663

                    SHA256

                    ac0a09b3f747ee74f12211440c35783868de2a5af56ae076492d4984ac3fa865

                    SHA512

                    9c6221abdcf31bbedef1e5bbc27605e1c6c7d4044e41c50a397d77b8ed4d40815711f8a857fe602673bbd3c78edec0808c77c455ac813844d46023e6b07a1ef6

                  • C:\Users\Admin\AppData\Local\Temp\~DFFF6~1.TMP

                    Filesize

                    16KB

                    MD5

                    f85aa78c707f161e412770006679ff49

                    SHA1

                    063f94f857de872579ffa5bd1f4b464d62657308

                    SHA256

                    6279fe64993b1f8e9fe2514cf1e7dfbd3a3233d78abdc53523fb01f5daf1a3d3

                    SHA512

                    c4ba87a1f1466afc916ef857cd708ccbc9170082237adf3c0a937754a0dd797e372f37f3df10987b182bb5e73174676c3196bbcba5c87d21cc70b907900a5bbf

                  • memory/2180-6-0x0000000077B40000-0x0000000077B42000-memory.dmp

                    Filesize

                    8KB

                  • memory/2180-1-0x0000000077B30000-0x0000000077B32000-memory.dmp

                    Filesize

                    8KB

                  • memory/2180-0-0x000000013F32B000-0x000000013F5C3000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/2180-10-0x0000000077B40000-0x0000000077B42000-memory.dmp

                    Filesize

                    8KB

                  • memory/2180-447-0x000000013F320000-0x000000013F86A000-memory.dmp

                    Filesize

                    5.3MB

                  • memory/2180-8-0x0000000077B40000-0x0000000077B42000-memory.dmp

                    Filesize

                    8KB

                  • memory/2180-311-0x000000013F32B000-0x000000013F5C3000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/2180-5-0x0000000077B30000-0x0000000077B32000-memory.dmp

                    Filesize

                    8KB

                  • memory/2180-12-0x000000013F320000-0x000000013F86A000-memory.dmp

                    Filesize

                    5.3MB

                  • memory/2180-13-0x000000013F320000-0x000000013F86A000-memory.dmp

                    Filesize

                    5.3MB

                  • memory/2180-3-0x0000000077B30000-0x0000000077B32000-memory.dmp

                    Filesize

                    8KB