Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 07:47

General

  • Target

    1016c7722d95db13685306204d0ffa68049ca1cda676e77537decd54012fa83c.exe

  • Size

    434KB

  • MD5

    53187e898aeab830a8757bf6fc9bd270

  • SHA1

    ff2195999cf7f2fdd963670c2c272732611b8705

  • SHA256

    1016c7722d95db13685306204d0ffa68049ca1cda676e77537decd54012fa83c

  • SHA512

    7de9c987ed55dcaa65577c501241769705e555a2fd4b94a73540623e49d66ea9264bd90419ec530f6d898f397e9a3133b0fe205f9c5cd8033415d1c0c75858c8

  • SSDEEP

    6144:ppMMVVbRp29RG/pOys58DDDVxnaDvnrzkmIL3E7QPQLEowGFzfws:UIAOTs58vLnabrYmIjE7jws7ws

Malware Config

Signatures

  • Contacts a large (926) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1016c7722d95db13685306204d0ffa68049ca1cda676e77537decd54012fa83c.exe
    "C:\Users\Admin\AppData\Local\Temp\1016c7722d95db13685306204d0ffa68049ca1cda676e77537decd54012fa83c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    581KB

    MD5

    ddc6dbb095b6843747423a6528be80a5

    SHA1

    b3e5f6f71d239cd3151db8a9884a99dbafd9eb40

    SHA256

    62de9eb7a8edf0217bcd1251033663cae219c9bd051e92003a6488ff8d83df0e

    SHA512

    b20a13872f70d8700cc118c5c953c27274006c6c9e109aa435240472347048ab3acc25e6f3817482cf55d652695583efeb74c85f740bd20bbf95902025fbfc23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47906de704f89c5f1d920f42dcce7b87

    SHA1

    0e022b7b03d31174d09b137e1f99c30f022862d6

    SHA256

    4b5afdf4d7e39f1be45b3fa29e0028d9cb4c2e09d899ff88af3be085fce3e94b

    SHA512

    19e53fd600132995ddd4a221bf2216e6432554540b64ab2b3c07d823b5dec15014e857edb4a05bce413960c99f47c564fc42928fbca16d2988267cd8a83c80fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab45abc1b1d2f631683c43857546875c

    SHA1

    c68435d943694f0c23b50ac347a2fe645357b989

    SHA256

    c70ead92ff9ad5a0c2535a0f3cecd40ee9c3d096b7da4c807394df3f7f36b645

    SHA512

    2e2340b50d9f429a9d38ffb8e9624a6657f5aa210848a58113ebe183042768b4261df6a4095136e39140fc9ebdf61686ea8180c6d2173c4d0847b131c27f6678

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    927d403f4ffd966af1f01e90096a0cbe

    SHA1

    60f23c83a83c1f36d58268116fd4bd09e496dbb5

    SHA256

    fa9fc284790511c3fd8ac543bcd43ba587f863c80b1b770cfd3fd4156450089a

    SHA512

    dec84301862bc20c783edec3ef905781f3e5474182c13d294801482bd0456e8dff5c2c339eafc4f83b30305ac7cebf6896d7005c65944c3fb8b6adb290f3a0fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    024ab5e94a1c0eb1e0c5ab0d850e0696

    SHA1

    2aab9ed9de83828f8cbe7675d3aa6175508eb818

    SHA256

    49b04deb33cc79d771d0c0e18608b84a3d81211f0c42ba309c86f330dc5b9da8

    SHA512

    3fa7e56897ae709e59c70bb4dfd7314433631ca699f3700350544a05f8b992fe13a43c7472ef1eef5e731bd9df111f93a81a3d7ec85f6bbd86509a76a732e613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    125bb5d13348cd73e2dbbaee2e0fc91e

    SHA1

    8b3fdc196ff3a6b291f0a01753d3b0d32c085f89

    SHA256

    67c9367c8347f9c1eaf8b76549157f7448b95e4359c1e77298723f132be588e8

    SHA512

    f4930ca2d67556b0117004befa5d13205d556e5880cdc9396bb5a8115853dfcc84a12ae54e847d08c21c9d0290f927f6b4f71d1b832205d7855b9d9805cdf6fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ed1200cecc27b88c052c03730464144

    SHA1

    6212a720ae1ba13cb873d1fdc86e5112ee170e7d

    SHA256

    40242b1b7e7a615c8f57e6d623a77bb0725a95e488aeda2c1ad599d056f3e8e2

    SHA512

    de19d5b10cef019630a3e077a5391916fd85b6077ce6b8f4aac585a04c90d285ca3c48f61007af3d4b90afffca198dd84d5e364632ade168724a42a8c999ef9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94c276f21f396460c5f5cf133f523ad9

    SHA1

    570a51da510369f00ff0ed91490770e78becd842

    SHA256

    bd2839c7da6c55eff5188ef7b68f00741beda81c37f6e9fdb3312215dac2fd9c

    SHA512

    75954476fe5b531637878e6798f37a04eb794d4cd2a4d264b94d6205757c207ed180fa7224c0e588ae3a146f3a9e7ad819a09140b1d337b018efa849611d0186

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11baf1408bb6fbd7dfce2d79195156d3

    SHA1

    de7ac88609765ac10dd877ce91566e2a1233ccb6

    SHA256

    09691d8b9b3f573563517626320a6b5a609f2abcc1aca814259e08a9295768f2

    SHA512

    1a2190d6ed2ccc2b9c8a23bc72c757ebd569200835da6915a0df4e051e4ba83e9707cfbf7eb4994893178b9b09a4c36cfbcd18cecf1e6e44c328567d3e52bf5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eaab7091550eb25f4e1f80015c34fd2d

    SHA1

    65bf64113c17688ce277b3a86493bb0d0f17926d

    SHA256

    3a8adcef32d0d1f4d8051db097a605a160a23b6be993a40a0e75dc4860b40e54

    SHA512

    7b1edc1fb236e61b7e973a73ce526c092ac953a2ac74cd3ce1736aad8788760c316da3d9d15da7c395f34a0f4f1adeb9962847f1a09bd3130e5722e87ee70017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ebfc4202e64a8a2784929307574f911

    SHA1

    5dcf8ff918fcc029ab3f49849b98e870766921e4

    SHA256

    4e6a83593d84fd2ff73f3385b07c26eb1c9dfd2bf3604dd067b86d3874b77341

    SHA512

    f708997058a65e0af216d1ef3342561bb36db64466d1e11062bbc95160f365698eb2a03d07b60ee0d85e68fdd00ad8c0a79357750ce2ff25c9e81a3cf21403d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8af71ce7db7e8d20664d838e803561e

    SHA1

    c574db43255cefb3c9cfb0b1df301cd0f76bba06

    SHA256

    19fa1d8b4394b8b107fd9cd2f21d1b7337ac2d8fcef3f103bfbeaa1634eff522

    SHA512

    7b7034acb8282661f8706e6d1b81cd4e09c2b929de31071f35dda646b44fa4cbb5313f7d7499f69ad8fd3c67270c8551a90e521ba85f2f85f776bbbb76c3aa1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd2af296a2121ecfd739091ad2ba4f27

    SHA1

    e8d80df4f8f54e37d072f8ca795b15a72a3e8fe1

    SHA256

    bfd6a4a2046e88053c8c463f24f2da02aea350b79f2f86f1c592e4b195acb3e9

    SHA512

    879e095e1bdd1305d78af889ae81a215fd71556becf8fc0f70a7991a8ecf0d8ffcfd0ba66e0d9fff7c4053d3e7ade891e3317c596e2933d10c3ca790c7402ae6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    245b5fc43ad1b557192657427c4cc3f0

    SHA1

    02190cb0d8eca1c8bfe499c3aa40e734b47f090c

    SHA256

    01dbb39ce70a7832d5d83e7df6ec03871881c3daa424f93b083b19d506096b34

    SHA512

    a43a3354d3baacd9dd5b3935f6f0b6daa31afcdfaf81bfbf73db049f4b54547d7a8e82079fe166de303a2cf67d2a6992b7d00f1cbd11342e8d44fd69dff3955e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    294eda262d051f96a0fee0a3514286d0

    SHA1

    5b671ef3303995f9d1038002575c83014c46ab2e

    SHA256

    c7e672b587bc9af3d63c4b406b39b33050490583130e80ec76de575cfb64cced

    SHA512

    8e903dd07be8b03a95ba222a618f72ae86975e781d99a222d9e0e6ca74e6bd860199d7b713204d028a02497632803f708102c9fc7fab63dd320d20a78a4c179f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef21444a6076f699f8260c6652fa2018

    SHA1

    39b05a5e8a2ff66f0820e5abd8414bd4376cb98f

    SHA256

    fc865a53a2864c32e5457066e66c5b934101f0e2d28fb23c4684c17001756a30

    SHA512

    2848197777e43d47bacc42c416a7f5806ee642f7ef3c3679a0671eef329c1648a888967946407adc850605c353cce4e658a6983097034f4c244a9adfea15e9ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d983d605ad88b0fb15cb95a6d280abd3

    SHA1

    723ad46aafe23c13d6ed7456b7165b17414eab45

    SHA256

    72aceec2e2490e3e34ac7bdc35a0a913369b883a071d796acd51e5060db3a80d

    SHA512

    f38e4fb7eda6fdb1895270c978bca2ce542db0e8b01a274697391638b908d3ceefad75fc0e09b39f7105cb3eeba4fa56893357085bcd4a8e74d0255de6e03334

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9faf32db23776e13506149b4cfcd5ef

    SHA1

    03fdc858f2cb60b6687261143328d5cff507743e

    SHA256

    0ca9adfed0e77003eead11dd127267d0159f700d6305745a4b309429e1f15f09

    SHA512

    dd02076fb977513254c800294f9d236048588fec491cf882179e28fcaab1f7546272db6b656554674a6b7809b735ab8f3338dfa1aa1817244c56545026dd8d85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cc357816d448fbecefef1f349cfb728

    SHA1

    65e5913cf5049cdf2aa933999bd7f1706e69bdbc

    SHA256

    08da98a47b7b945a9ba5b287454f854c227f13d7a71651be3bb0f829daf18b1a

    SHA512

    196452edaa528d257bdd4c5da85f036fe0b126f781fd65dea374f1de362338fe92739d3c992052f23d973c59493da87b1389b537a0250732c7d466a5001a29e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4297dcf894ff2193095659df83768199

    SHA1

    c73e9b953c33666bbf4c0b8c15b2c321660c60c6

    SHA256

    270356fcb171f386b103cbc5826d737fe2e3e721acd1f84d68f13b87c4be255d

    SHA512

    a1e3ab8c9b4865a75ab778a111d7c97177095e3d65d7071e452c25e9c0d809378ec6031fa15e085687f8f41df9ebee33580eb545c2c65c9f92770ea64ba79146

  • C:\Users\Admin\AppData\Local\Temp\Cab754.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7D4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b