Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 10:04

General

  • Target

    08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe

  • Size

    7.2MB

  • MD5

    297896830676f90adfba999a29954268

  • SHA1

    4b6e74e0b0c9bec0d5955c4b85d6f731ebdde377

  • SHA256

    08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0

  • SHA512

    0fa63e3e766f0a4bb3c311e2be12426674296af5525dafb2a6a5a71eabdf000dcf9958dc41c3e2e73a6698b69f151a8d3d89279973650ce388331c0ce98da8c1

  • SSDEEP

    196608:FYgMJpm7T/1EE5cRnHLcfLUwvKqjTY/mvZCVkR12trqbB:FYgMm7T/KEeRHAfwdmYwZCVMv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe
    "C:\Users\Admin\AppData\Local\Temp\08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIIgnition.exe
      "C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIIgnition.exe" -install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIGuardianSvc.exe
        "C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIGuardianSvc.exe" /escort 2476
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2924
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\IgnB0CB.tmp.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:448
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\IgnB0EB.tmp.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1560
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp.cmd" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 2 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95

    Filesize

    727B

    MD5

    f470e4a9cfbefc92da69532e162af1e6

    SHA1

    e754a46bb17f82bc23b1d72222a4090c07c3c6d4

    SHA256

    e0d82949ca6332aabbbc665d1895bfcbb3727eec80970548c8893ff39592b6d7

    SHA512

    780ccbdd95ade9dd41865193d00da7c260df0033699b08ac683730365850548eb871853909228a9acb9453c7767f5b3c18c53b4f5e5417f97a5718f37dfc5681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    719182e07998ae9226d45680aa1fe178

    SHA1

    8f8b03c110c129cb3a35841ed959de7a7266ffec

    SHA256

    8f1d64c2c4dbb6ca892083e4b4a8bdb4585597e1269c218340c6b12517bb3dbe

    SHA512

    2df474f0ac4d1ef93b14deda32c5476da130bc41f37c0a5cd0c271c990914613c3c788116a4b87d44876695f71e5a131847fdf96d609364c06cb2f5ed6ce76a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA

    Filesize

    727B

    MD5

    b8c9b821e711a6914d4050486cad3db9

    SHA1

    76cb62122d0c138c8fdfa3f0f8afad071cfff104

    SHA256

    91f57cf87fbf0d9e2d75515d8a8d2ea2a91d00aada466a22a754ce6706871a5e

    SHA512

    2eb543118d4d292c69b1ceb1098ed954936d71a7387cc94a47f215972f30a04f33800864b6c1fc075e0dc24e7de1f8feaa11f35f047155b3b6c82f4b8cedc8e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    4f2f44acff5c280ecd26b5e7144aff24

    SHA1

    d542052f27cf058cd2bd7d74e75deb8a009bb334

    SHA256

    c9725747ce7f281ac09f3a2287a236369b00e99f310eb837c45b2b4f66b82030

    SHA512

    33d4fcb341e625103b16af3f7b37f4fed5e8d56256980e341fff71356d1a1296192741b96be97de703d8f54af24e3438d0a514edb621ee6e42b1dc4d79089d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB

    Filesize

    727B

    MD5

    ff40091b1fd272db403fbf05cd0cd28e

    SHA1

    4f20e2f9d55f6831f19fa8dd5e2476529d243295

    SHA256

    a53975e3a270aa9640566a6256e9a4ccfb98c9416d81825eb8559c1443c2b20d

    SHA512

    001813f6c385376a55c6d98e99d904cc30b8d31b3a78e3718882d913228d1986022571f2886e2dfa373adde707864887785c3a92e7051941a2d0551ed0e7a030

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95

    Filesize

    416B

    MD5

    488083971361d1fd95de4ee35dbd52be

    SHA1

    2b3b15477c309e0307a1e883ac7ef4a289a586a1

    SHA256

    a7cdd0fcec7646465c0a751a6f7c382de85ed6b8c332f3d375d4628bad690b4a

    SHA512

    afb572ee9b116ea39f9e046d66ac6023a9d97907a899819f4af4a34c115687624bcc15b5566b83290fc81a38f6a6990e53298786fdb1d248da5d79188c8ede87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    bcea0aa4763ce2352527ac18ace0c6ea

    SHA1

    d359ab5bbfc085a391968b561fb7de84d55df91a

    SHA256

    e900002bbca4ae38300766dfe3fef31052459c314625a6f4e56b613f0e80f635

    SHA512

    ce8ac69c4f17bff6424ecf98243cce6175ee45b952f9fb02afb0afa1b6ae108c8e9842de9d4e48da46ac898007cd6d67e02c90aff24cd82613504592d930ced1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA

    Filesize

    408B

    MD5

    ccad0c3394822f5bbe212bad674392a4

    SHA1

    a7c8c9d0ebb9ad966dd44afb1385570df94c12cb

    SHA256

    9ce0bd628c3eb18bd3cc3fc9967a4e0ebc7b14d5a5186749f4431adda0b1d7b8

    SHA512

    1490f08361ea8a71b86ccdc6ff1718e89ccbe2d27c7550997fb8016f930fb203e92c0073c3f585d2d70eb9396b19fce055e40622f4892e44aedefffb93fa1e00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    4d3656361b93a4a427bb4d15047b52f1

    SHA1

    c3a99e69e3c428c84b0f88bcc6ec9beb81a46f10

    SHA256

    6ddc3adbd0cd07005d69c2887a59839f76cbfd0a301a354afbf4fe7b6009d2ed

    SHA512

    b3d8da0cb4295c56e41ac56713d7a98e2639132e01009e187cd80a67a0125c2d730c973c943efd5e234ddb4616b2c268e65cfe04b3273c181edb9fcc1d5959d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB

    Filesize

    412B

    MD5

    e5d08031f0dcdf91ef82d797268cdd90

    SHA1

    07437fbdde579e636d038d55ef7a1ba7d252349b

    SHA256

    a627b657faa056a1385c344761e7a1f408f9ca8de4e130d1b8eb61a09e6b5ae1

    SHA512

    d90948ca90aff7efadce5024a4c70fc56b8d5a510aa1895942adfd9c70880e21fd3fce23f0117cf7404bde6fa5dcf6138ee6ef4542a9e730593f08b326070292

  • C:\Users\Admin\AppData\Local\Temp\Cab9D89.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp.cmd

    Filesize

    333B

    MD5

    53975e4683335780016ae5d38a19103f

    SHA1

    fc7d521940927f790c76626692778cc8b02833bd

    SHA256

    d22e855b8ed7ecef402ec2ff475a92a2d575b93644c1352c8f5354fe2e168cff

    SHA512

    ae3f43c6567fb83dbc013cd39e24d02d15c234187878d7338ec1b355ffc13bb67c0ce4aa8fc0eb005f27d86ebc77e0ffeccff06abee22057132ad302e8c77806

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIGuardianDll.dll

    Filesize

    1.8MB

    MD5

    7a44e3665f03c2e46912b59f1614417e

    SHA1

    e152394adbc1165d3487b5b1ebe92d79b13c68ac

    SHA256

    41b48537b2dbee585bf08b928591b05a116bc6b6780044fe5e35445e0a3c58e7

    SHA512

    978953ffead6638487ffda8306a74112428f58d5c626fd6a8e822900bd578395cb05c8ad94a534d8265665cdacbadb816df27bc55b07c267bc372e6360f816d9

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIGuardianEvt.dll

    Filesize

    309KB

    MD5

    bddd0f98e5a371119fa23a3350198f9e

    SHA1

    76534fcf26d7f630343343bdbee3c92b1547de15

    SHA256

    e4139d841096cf863ac8244e08f27b5bf7627acc91264c08719fa5e326b557c5

    SHA512

    ff8add02ebd1887b3e419668f5dacc87c00b9b582db63b926523040a8da754d47e561af43e36d88b7aed4ce90ebbf6d7287cef2d7a35e7d920154087030f0a17

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIGuardianSvc.exe

    Filesize

    419KB

    MD5

    0927b7e7933491dafd1a7b0876bf4578

    SHA1

    0bf0aa0f82efc24f927e099691fb3b1847fbe34d

    SHA256

    413dbae208e147a42b9c7ce622caaedde47e85462a6561ec41db7fb1977c972d

    SHA512

    88b6c51f3673a5d8a3bb795977a2aabb263d37cd139e788ceef76ae2505a22dce1b4ba6171120c0f0ea157e0fd42dcce34aa03446208b2f1f7af8b3675a353a4

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIProxyHelper.exe

    Filesize

    74KB

    MD5

    4ac517ece48fa1683df19e86eed922b1

    SHA1

    2595110478889d322b2079f042270d97fc4a4283

    SHA256

    4c64ab865ecd6bdde8414983e5520c2195b501379434d00a6ec6e357f62d4104

    SHA512

    7571b0b21d8bd36ca660e4129aa3556a5a996505557515da2a80fcecbe996a15eca277ba381d63df8a0bb594ca3fb1e18c152f95d226d3e6402384ee15ad671d

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\RACtrl.dll

    Filesize

    8.3MB

    MD5

    ca26ffb2fbe9c7f58d16d7d8aa34a6b4

    SHA1

    301337eb796d98290cb9f438183eebdcb5b57fb3

    SHA256

    c247b359cb9c2710e071dc1f74c354b09438f9c5a8e119abf90cdb7ba62be354

    SHA512

    d06921b5a8fc3636222ae61c87274ebbc7010b3a7944b09e3a1301e16de2ff50e6c6b4f777dd45a8637d47ba37077c8161aa046652d679406664be1234ce5222

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\WebView2Loader.dll

    Filesize

    109KB

    MD5

    1ecc586392d0c11232b840d16428d28b

    SHA1

    6597cc0538e7a1eb9d12a13731d395cd9069413e

    SHA256

    e7ff2415d34a16314724b06d678a53e8d115e93f8ea0e714dc0932f2f102ec49

    SHA512

    21c31e34b4e0ced7a1e6b64b3791e95eae1098d325c7958daed3150de436fee9cf7f42489c323c6d54b5c2876aa6c73fc8b3b15f62613336bd2ed6b8dbfd16b9

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\deployinfo.txt

    Filesize

    147B

    MD5

    e9eee57322fa0882ab7e1e3421c2c9fc

    SHA1

    4440c749c62e0152414cef3e503054442937d01c

    SHA256

    82ffeebd68b19780acaf8548fe3294fcf45ce8fb6208815a0c3ea6d3f3df5f6c

    SHA512

    b2c1e13558810954e6e066e9977f3edab3cbe7e85fd29da9124327d58a126e18fcbca4419a6e7cbbcc2af46253571592c9ac691187e8a0ca009e7c16fbb80ed6

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\ractrlkeyhook.dll

    Filesize

    13KB

    MD5

    2e82f902aa3a55d8c87b40f0dbaf3e38

    SHA1

    ef6ba5f71d59ee76685eaf17c6e296848df55711

    SHA256

    a7d3b22dedaf702edc7a06a338a50ca6996b3867d0d2c9dc767972db9963d9c2

    SHA512

    3d1e00e9d8a660e5fb07eb7b229411ab7441bdc54890afe3148b6238b78992a9a65f92ce07ec951b1ccb226679cbfb3f0f7af6ef447fcf2702bc38b492258202

  • C:\Users\Admin\AppData\Local\Temp\Ign9750.tmp\webview.dll

    Filesize

    396KB

    MD5

    0a20b7a69963cfcf5892edd327545990

    SHA1

    bc2c8c9552378988d36fe74470d42482489d4e65

    SHA256

    c265df685d31f2e5ba706484e5aa53af3dee519df20cdaf4607e48794d096a72

    SHA512

    77fae39ff0de23be3065b0861bef8537dc1ca8739b3e1bba0a46126e48747da32015c632a8f86f8c9bc6626e929cffa3c7bfcc9fdc3af1e9e5a5ceab3eb46889

  • C:\Users\Admin\AppData\Local\Temp\IgnB0CB.tmp.cmd

    Filesize

    957B

    MD5

    eeaab2a2a68f495f647043ca5b156c2a

    SHA1

    6c3cbf0bbae973664d63b4c79bcf75b246aa79ad

    SHA256

    c4e9a450a5ecee8a91878788ad768ec3e44cba4745b495943630da3442bd8fdc

    SHA512

    504d0454492c06ae8b3fe317995976a080a9969bae092738d65b40c258f18e99337fd1fe7413f9087ce5b6a32ef1fc4e9e9e95e8e8df76b532943bfc6467755f

  • C:\Users\Admin\AppData\Local\Temp\IgnB0EB.tmp.cmd

    Filesize

    957B

    MD5

    435b170e2ab69cd279a2f5a6c5205c6a

    SHA1

    67f0b16d6cc2ebb7032f6f7f18ffa64a846fe270

    SHA256

    15c999f89b6d12bf82a4646d49cffa37096c51d4494d72e8eb0fc0a6939c3178

    SHA512

    9121d3b2a3039d0d7a6fc8ec05527d24f523acff0a3fefb7ebba6774487e2c6e6ac46d9ed70442a7912e7bdc77deffdd98d44caae46909db924cd83728204125

  • C:\Users\Admin\AppData\Local\Temp\Tar9E14.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\Ign9750.tmp\LMIIgnition.exe

    Filesize

    7.7MB

    MD5

    cdbdf34821c788c28766e825f1033b5d

    SHA1

    c9b75a25c015769d41df51f14c72c2034fca5a55

    SHA256

    8015e7e3bfb288702b25d831813962b65b9d9fe669ca7becf6cf214084c47358

    SHA512

    487d4b1142c440d45b5fd3eaeb50d078848327924c576f1388e4d5b540aa7b7bf75eff696a405f1e489e2dab64dee6380c9b988028c92351afc529253a685446