Analysis

  • max time kernel
    357s
  • max time network
    359s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 13:09

General

  • Target

    71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe

  • Size

    2.7MB

  • MD5

    83cb5b87a786fb135a11bc133fb4d4d6

  • SHA1

    f0fced87788092368e1360dfaf830e6ea1f1ef1f

  • SHA256

    71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb

  • SHA512

    dac2ae2129d2dd477cbd84e2464055cb298407a06fd7fd24c54cb38f692914e9f9cdb8320e23861f25642316b05de411d840021bb7b0a15ab21a035f0d68fe12

  • SSDEEP

    3072:BttFWSfQySeFOHcjyPHkxrahs1nP2omHDj7X2SrhL4:BLXfQySDHcwkEhs0jjKWhL

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
    "C:\Users\Admin\AppData\Local\Temp\71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2412
  • C:\Windows\System32\Notepad.exe
    "C:\Windows\System32\Notepad.exe" C:\Users\Admin\Desktop\DisconnectUnblock.vbs
    1⤵
    • Opens file in notepad (likely ransom note)
    • Suspicious use of FindShellTrayWindow
    PID:2792
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ConvertApprove.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e73046480fe6ea99e904d447dbc69a77

    SHA1

    6c38c6eb5b62e143c60f9407402ccc847e5ca559

    SHA256

    6d2c8d7329badd25be982372f052ae169438ab722143909297a96574f6538734

    SHA512

    2b160b47adde41eece7f7c959473f03c0c42cdb69006ffc779e253149afa1c4c7a020ead11e78a9f6ac291d2b14d94d493a58b1aa3571f5785b520ede6a6c68b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ac4a44ed67037287cedb82fd4d570c0

    SHA1

    93eab812ae51f6c9e032b581188ed991982caefc

    SHA256

    9a0c646815b8f74716c185ae88a77d32f039572cf1811024a873a9e7330136e3

    SHA512

    cb743c576f87589bd9dcf7ee77a00252ebaa6141f0702fb2a7bb578557137b8c3b641df9312825c133005f19067971a3460ab9b5885c786e09f64b745e56cf6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09d618c255b007708c4eeab7b992f31d

    SHA1

    fe4db50a28bd30f1d9ae0a95daa184fe17cb135c

    SHA256

    6dc73a8f59bae4a10cbd0b6bb9f70a02bf3b62eec900903c1bf4b3cd73c875c1

    SHA512

    db073bf469aab363c63fbdc28c4634dc6a2408cf8169ae845af1e21eb4d8b60a227f1587b5ee63feaded450a0e2dc9641b53f9bc3a5d7cce41e714048a0d75e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15f57c3ca33589a35fc331211f43be4d

    SHA1

    be0c5b187df61f120a96f37528444068a7059fc0

    SHA256

    4f531cfa76dcd24bf4954b9ca2e1551c4983cbc69736dc199eb9907388c2ac53

    SHA512

    42779decedfc34b12ef7bc6a596d81261bd386127f81afc9678091c3740ca50323ed17a92ac9a5a503498c07e0cc537880a02d2f8d4272c0ec8707c444406035

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea6e94bb20ae5184d9c7d8c5fafca929

    SHA1

    bf21ef67688be20d681ab826cbd5cbddd20a0d56

    SHA256

    133ea37d51e8cbc5223ff35b3f33c01c7f3f82b838237a3eadcc1aa34f73eab7

    SHA512

    d2ae00f58c4fc9136f8c6c7effa678bd4a5c9d3ddaedf9f4bfd375b456ddb6c97aa84a3d72b22fc7404c0789548f2b4c22f5cd386e0349f3ceffc6bd6f9a342c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6e22cb96d075d9d4bf77b5c60cc7f71

    SHA1

    f146bb9a5d6dbcbb93eda6f7c090a06e8385b8cc

    SHA256

    d98d4071f8797f4d5ae09bbb609a2765f49427fa420c04fd08d850fdf7798c45

    SHA512

    94048407a894949f7c30cf7589aad2382520d2d4873342d3c37c6ff6d7186c43086e6ecc1ed8a06694df48793b65d20487a61ca7e015c528ed7971a20728c1fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dabd9ba36638dcb95abbca7456369c03

    SHA1

    3cb68241629403873a2b29d61dbb7f12033e6d18

    SHA256

    a08b9061b944a20b7333ec637aabf74fb448d5788840d768d703f4e75c8e8adc

    SHA512

    da91b22cb4a9aeb5591e5670e65fd0a0bbbac2759858a27543444d0e5536c3058022624f3039a6be29a272aaa5afb495091b2286a3583fee24bd8a800e7248f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b44fff7edd7b264b1ed8d6722a22d8f

    SHA1

    deff3ba093c045cacc019265fab4683798f0611e

    SHA256

    55af7227b7c9967bde345069a3d32f5166c0b95e192221243d45fba8069237b2

    SHA512

    9ee3133d269933ec74cb2644d1613cfcf28590adc9f910fcd58f537a44d4da1fd2fd2a4e3fa734764b15b859b43e2f44033af778c29185b9e987087796724cb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dd9a2c32794dcad5ad9df1055da6eb9

    SHA1

    856e757bdabf2ef9274b9a789d09a4f47b3c9028

    SHA256

    408ffe718a81b16e94b6bf041c454b9f380a1cfc3beb064856e7f55e91657ae6

    SHA512

    251f4ca7ed67fe04b0930be123622d3ee62fb1ef1cf9fc62889bcd216ad6ee756c474acf338d6dbc6f2f3115aa9cb4b5931e2fabdeb0f0cf985331c752124bf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b7cc63089121f9b2ef537471414941e

    SHA1

    426f1bbf918f0adebbf106611d31835f66bb379f

    SHA256

    57e3bbf9b057ed4209d5bf4415841205ddd73135ae7ea0343376e0b4e4a532f7

    SHA512

    9b31a2f05464ccb641587bb8670ecd5ef490bd3ef719c281ef5b95ae297797b73317945de33ba640d659b86a2be4b661f2fbdbdf61e76491ca37517a2fc8ef05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a5ba01d7244f43b1cfe7d5985cbab97

    SHA1

    2bb394d3c8b8ad0f3aad7c293d71da41f4814f4f

    SHA256

    a3931ead4b450a899ab65da7a1228f8a6ed874171c4c3183d9e186c0da6f2715

    SHA512

    fabfdb86d2f8bf0ce3db83702d4abfe6e29e31eaeb188d247bc454025d97695e5f43091f0e4895c69b5e41fb5dff2ef3e6a76df1e0ad84c367245e08f06c5505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89d72064caba30d612be2a1317aa0b33

    SHA1

    56dbcce64309615ec3c4fcf219be69158340b5e5

    SHA256

    5a7b610285fbf062e4cecba4d9886710bb42cc0dfea5d708f2f4ae045e5af08b

    SHA512

    584c4317ca22b471932f4766450a20ca8e4d0850420e101e9c46e08377bb0b6c5391d50b657de43ccc32478a0f72ad1022a755c8023db8c0b1056d008c6da54d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18b358cd0d3e9c988e63b9a96ebaa668

    SHA1

    656f372fb9d10ab11cf0f12cf4e02d992f5b41b1

    SHA256

    f9123272e0dc4d66599153500b8ca82c1fcfcd879f6fb89882656ecd75830377

    SHA512

    2260393138b6da1dcd296d872b7264e09f73fffbca7433ea34d808997c31f7f592e93a573a35770ac8f8db8e65d09ee02fcc77afee8f5c76f1b9da58dc264a3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b945d2074d2fb25c6ec176ab2302be8c

    SHA1

    a56c52f42e0e0f7a1707d71b1a938c4097131ea1

    SHA256

    2a2147f10e431a017663a87dee1caebfec08020f07a4e6dae6289f40d3d2fafd

    SHA512

    cacfe4ce604297bacd3f204aafcb6f8503f2b65209bd6d3b22c4cf5b38ffde718b0b54aa82272a6c76bde44a4cad131bb45960a2943ab7537d4b471f41c85b4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    088746f980d2741a30f2fc6310e5fdb0

    SHA1

    efdc238a2f62e64c9d1aaa389a7af4c599503b34

    SHA256

    c261d9ffa6299162bf8fb8d7e575c7c2ed111bba4e917dde459e488db3dbaed5

    SHA512

    08f360560e2f71cf723df86f955b04e8e719e5b619ac478e3035b7f238509b0946d53b8bc71e98d7763e7938238399c90ea2b37b5a846593900e227934783664

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    048bc8d51eb9b41162473f94106a442e

    SHA1

    d1639e98c685f1998bc7d62187ab7e4532afad69

    SHA256

    99d43a849476a517c58a496fdde70f96e27679d4f3842c45415ad5549b34a56e

    SHA512

    f3d4047f6c8d26ad4a825b44e43fede7e3b6e8277228660c37058d578d9688e52ad1bb0c52c0dce6c056bec159c574ba1b54bccc314241f2e0da981b21efd64a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a9db1d62d58f48956ce10655ae58a74

    SHA1

    254014023758440d6ccf05a5c276654d884d314b

    SHA256

    eea0b8e43fe8a6ee7afe4f19800889b4218b12b2255a6f565162aa3eca7696dd

    SHA512

    2a04f42366ec3af7235654428fe4b74cde5b9ecdff0cf44cd4afb500564deb86d2bd57bdf8c45f98d6a27802cd7fa52ed84f4e6a23e29d6712bbf86706e02827

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46e5683f7a3002ebb86e8022c8130fb0

    SHA1

    7f28f98a202418a1f43e442d5b29515f9356c783

    SHA256

    f713a96100a9accd517a4b8f56ebf79944274e26b4d42ef95d851fd68059ce39

    SHA512

    57264b3a68e9b4e2f271816ee93d093117750db0bed73ef82e345c32e58ae3b9e383cde3bab39dc57fff449c061a3cd9b8c177995028aaaf226606771d41851b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d0adb595c8469b4d7d3127781cb9d28

    SHA1

    6e859850518a2e7a72372892466a8fbed16f7724

    SHA256

    58905b7155b255146b60496bfaafe6957cc334ef551c8933de5724d6b2ba1054

    SHA512

    33d2819606a6005748a0e8820ee008b4be7b6fc851924b9a4fe873c6949fb7111a6e26f77a48a077388f339007a85048b68c8c6249cf6014cad53e2954ad79ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a46e48f61c329ad6515739fea01b5de

    SHA1

    826a5c1df2c411969a65d6b812c56d0c423cc3b0

    SHA256

    746a148c73c4fa0a410b6ed7274daddee141122ecd0a0c08e475073f5010f24d

    SHA512

    aba4921946f50cb2b0a3e1fbd597efdafa1b7dd0cfef6172913b4e8b6b24c3f72604e0b2891d7f2e0e8312f58a08f81b3b171f95ba4c8ea15f8a417774433015

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b135a6f2879c62b6fb5acf7f97e85e0c

    SHA1

    5e02a7e575a66ccbfec340d5ed6a4cab96d512dc

    SHA256

    36ea224794cac5daf528279d2f5c9729fdf67095696a55558dc0691797ac790e

    SHA512

    c6c11442cc0940835736fc74173ceab4ce56688d20bd89c4229836aae9142a72f96a026ee4e3bf0bafe77c52b995dcdc14413aeac1f499a24f2ad3cf314e9cb7

  • C:\Users\Admin\AppData\Local\Temp\CabAFD2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB0AF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2412-7-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/2412-0-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/2412-1-0x00000000009B0000-0x0000000000C62000-memory.dmp

    Filesize

    2.7MB

  • memory/2412-2-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2412-3-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2412-8-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB