Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 11:40

General

  • Target

    cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7.exe

  • Size

    472KB

  • MD5

    d133cbea72078419724b6f11cc0e36f7

  • SHA1

    2b2b850902e51f39d76c5a032b431e3ed675e5e3

  • SHA256

    cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7

  • SHA512

    c77c247c2502be6aea421153f57939b8cd89f69c7143f97d399dbc626746126340d4713906da5a12e0541635da122d9bf804f85b76b56a50ef2436a51907dda2

  • SSDEEP

    6144:ppMMVVbsmffCpJipqLXRTvczBZBH6wGFzfw3DThRtUA7c50M5iDcp/h8CAM:UtmfaXioLXpUzPBaws7w3vV5KV5iDZM

Malware Config

Signatures

  • Contacts a large (966) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7.exe
    "C:\Users\Admin\AppData\Local\Temp\cbf539751e6ef7624de831aae2f1855870b11b47b15572536749349f65e9f5c7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    618KB

    MD5

    17c9d90b8820abc4df2ef7cf761d5d81

    SHA1

    1aa03a5ef1928b5cb32b41d222a81f35dc3d1090

    SHA256

    4d0ada5e25d7a7f234b25788d68a38418c9b67716af8e362c5274613526113ab

    SHA512

    6505061e9ee53fe1cb60d36ac4a2816aa80b8e7776a4c65d2bf32ea0dbb0183f59291d31b7fdfe1a8b521bf1d7bece56124175c0aa2a750b489e962a2c711c35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02a0957fc47fe5f4dbfca187fc0b465b

    SHA1

    61fe65709a03c56f15bf5f4d298145c61da0dcfe

    SHA256

    fde19d3db95c8ee37e74dbbf74f2830d0b720e24af48082cca41fe72dba29172

    SHA512

    2d58c97d2e4723439ff7c3e8db60449a146b32823d9bfd1b0166d5d6cc06c747a064c8b8efa58da9922c5e94dc90d0b88bf8e55dd5b8eda86d18dd35f2f3334b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27f8a3cbdc9cfd65803efb3e198e5716

    SHA1

    1b194376d4c67a9c91d1befa1c9e4cb4fabecbb6

    SHA256

    c09158fc72e68be39d1159e0cd20e20b40c2986f1e188b2ebd19c1be10330ee4

    SHA512

    37e17b9aca7c692f463aa1645199db8a9e83022a185a2874e467c37bbc109d93757fdf3412ee784e931cf4672e570fc51f844c2ede107aa5e6ba3d3a76ff677e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f94509afd81f4c0de16ab9b6db32f9f

    SHA1

    e88f71badcd5ef611d043b7a6e385297362c86f0

    SHA256

    9b8f696b6f7075c24727446434dbad5f4a48b8bc5315a597fb3e99fe937b6f6d

    SHA512

    b5687dacf45b2a2e184d10c21e7d750ce2196fc7adbc2ae158eae8df20437cb4627b5d1af8e111f7a8c3d61d5144f22bf3efa7959aa32a24fa06e558c93ab80c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e1b3e6e92c378c0e56ebdaf28941e0e

    SHA1

    fa3aa9e62bf67bb3ca10b9f5de27d8e25216209a

    SHA256

    bbcae210ed5c025a30eae422c938ffb3c5e8e425f1728e78feffe9b723b0afc5

    SHA512

    81c49f71c65c66a07fc09a07ae935ab78a7f37450bb291e923ee8a98d411799c889fa3bb4ca8cc2d868db6e0ed6811f3ccc12ec867791745987a561173b60e25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cfa057c827a965d82efbd151b484958

    SHA1

    b2dd4413f986f801cb3f22d807f1bb65b37ba562

    SHA256

    8fef8e18210d37941b35176f788a8cb309b439eafc05658620ef9b877abc6355

    SHA512

    93a73ebb5f9cfd539f9eb6f4987c9082ed5aa6b3d2e50932554eccfce44c28bc637da4e98bff90ca0c86490b42e9490aa85a882acb261ba8563adfb77c790589

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56872973b806100242c03c5a89ebb2cd

    SHA1

    790523f67ff180e017dc5e9a349e9231fcd3a3fc

    SHA256

    86615d1adf4e793263f50d02af2c9847147156501f1e35430dc4a37e56527d32

    SHA512

    4cd23ffac724478df4d23719f7955600dcf01e7e3f7639da8df98a7840914b95ed215d2802e82c7d095d1936a54d085afdaae0744414bbc4940497c58055a552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae9ac6180f63e23dd051019fb8c04a0a

    SHA1

    b219cd1e9ebcb9bba0ade8e69676c89f7a06a562

    SHA256

    d19001dde996647d748c84ac048fd31e70efc487342bf623451c25223f9bc00c

    SHA512

    589c250b24c09739f88ddc0441ac374db30c1408990d9d89f7c7d5403b2ef633d2c147ec7f740fd956fc3dc06a1851b2c66547fc77b631a4b6c58c444e02acf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b50f1b770e40da8792fc8d947877b814

    SHA1

    56b889d0306740362b243828fafa5bccddaa594b

    SHA256

    bebd19f85a9fa86678b649af9b579c4403c6bda11b2cb41e42e5db60cd89c369

    SHA512

    a01af538750784f88bd7b80ecbdcce91027fc2e709b6ea8fcf368a5db2b1debf8c212cfb16482cbf2937d01133e8fbb7c2de491e179987c86b50c48d77bdeafb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca26f917253106478db640f250af9580

    SHA1

    f5ed7fc6d506cbb6df195da42d38a2a53850e847

    SHA256

    3a4b03da4e7a570039a898f395b64d5c49cb974992112a872b98c5193deea665

    SHA512

    f2da8ebbbef4dfb705871be195cb1bb5affb336973b37d7d96514d9afaf38548294153f867e52aac227c43c993f8942a39673e7e35baae7aaf267cb4b4a6b4f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c388676dd993d7a0b32091d76e8ec881

    SHA1

    8e3cd61aca1d9b28c6e82a6d67002ba868c1cbcd

    SHA256

    9a37dced3bcf859d94b2e7974c7749652ec6569440bc59599dff499da4e84af3

    SHA512

    35b4151b3617b677e1a0cae01b9410c5623c540820e7ab04413a897f0502405884a026a5d4df10f7b74524e23fa19c345c5a9e19f0cbed190ed55b9b87491135

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85ab1b8d87bad7024ed859a8369d8a0f

    SHA1

    910f0e2ee49ee340dc42e07d4607cd90ec5a3c2f

    SHA256

    1bb00c15f4736116fb43c60e3d98ef33966db7c7292274b7bff72a374c6f838f

    SHA512

    afb4468eea3072ef63772cfa224f438da48c999a4ec7a05187c5807b81688925c0386fe25645d0ff2791baa3e06c3be1415d6658be07038d013a992b66f567e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c0e7be7f90a2c81a8ff131d3e627647

    SHA1

    37b3d759d5d5d88a5c48941b1b57c6098273f954

    SHA256

    f4325e3d599d00e2532f9566d0837ab6afdaa82001e495589df3003de0b876b0

    SHA512

    a6b9e7241cc1e3f11c19f9256437a4aa2f3680bd83c049758d5534e45d02a901a565bd3e09cc29cb9b4bdb4080a5d978842c4301adcf015872a3d89b05dac7a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3150bccb6628fbfb6ab21f6e67dbeea2

    SHA1

    b0ee7dad2ab53a20bb618466dd5bfc48cdfbed0e

    SHA256

    6d5ae50f5843bfc4b294b2dc05b9c136511ac21590121a9b1dfaeab2efa9c24f

    SHA512

    b07161c93accaa463cde97e9f45f26c3ed70834ced55300fdca7106b7e36bbe5cd1126b06222dd3eb095c5f5cfd45ccbb276329b90e962654e54363a1b39cffc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6a027fa5d2ae162d439cab195143265

    SHA1

    ab2898e6dc12c7479fa3794831dcc16bb83f333a

    SHA256

    15b803e36c105458de0670d104645f89f70a01d15098c1ace5080b02a996d187

    SHA512

    e60eec5edfe2cd5fb7a524132fc658d527d5107b7b0acc1a5bd74e0608e4a7d09d6fe84d8e1e9987f9f41d9248f852257f0ec93cc30c17e89fe6b743f651aa87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6446b77bb8ab5e8c31763e46865f1231

    SHA1

    d15c6333d63a8827cebc23524bfa579a65d34487

    SHA256

    a9b5911fb0dffcc7389cbaa3752684d15d35955f21ca723ff4fd1468a7db2732

    SHA512

    c479be58cd33260ce528975d8878806bc62c36707d04c627efe432620d1886cb1077af967694e3097cde549a4fd2e44da7d66e849176fadb21de98151eaef0d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2aa7655ac947402a0f4e4fed39045552

    SHA1

    96d41dd2eaa96b8c07bf1a99133a8bc035f2192d

    SHA256

    7699e04087c44fa85cd1c321eda8ba292bfa32e621bb8383bada96146ab35ea0

    SHA512

    6499dbcd1c1b2eb0f44914fcd79e25e27cb7504127b42a3e0bbb995a4afbbfd2904aaef0408430a9fdba8fb1cde1cf532d82e957dfe2c01ce11e7fff1fc15679

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fbdc7c636e041a488816790da7554f3

    SHA1

    20c42fb1194cf4d76418523279638fb01820b1b3

    SHA256

    ecafeff652b1eb1642a1087c6fa1e32b631c1d7a73e325a36ecf5842b6e2bd62

    SHA512

    343e8e9da064c858036df1634e7ee3f6f5e4ea7bc9427d316ad9df48eab68e3e9f3fce91c627b44048ffba0039823d33702dc1559f08ea37d5236802f8c160fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43ba793502a74e3b7ae1c16357752574

    SHA1

    64ca34290d2cae52e311c84db0fa49fa951ae83e

    SHA256

    3ecfc03bfaf08a644a9fda16aa87bf566045af925e1f2323da44816842af91de

    SHA512

    7be8cf3bf4ad683f4d867f078f4262c51e3250be6a9aa7c5cd05c9a93419ccbace17568047518ce519ac5383555d0f2f1567f68839ee2f9fe849bdc2b98d88e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a7bf20444ec29c1442498791fdab8b6

    SHA1

    ca8b173f0a021de68f8fb8bcf4ef410bd62fd86c

    SHA256

    fbf99d8c4eb895b1d1f19c24243daa9ef14820b344b49a5b3fcd58d712df806d

    SHA512

    c8b0fc2ab6aa3b88df8e784f28c01198e70013ebce2b1e2d92dd1ddfcf127dc90fef325d4556a7aca12d532db26a4f11a29f9a38e368d694b2081e2094af9974

  • C:\Users\Admin\AppData\Local\Temp\CabB3A7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB448.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b