Resubmissions

22-11-2024 22:54

241122-2vh7gaxmfl 10

22-11-2024 03:27

241122-dzqkcatmht 10

22-11-2024 03:16

241122-dsgc4atlgs 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 22:54

General

  • Target

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe

  • Size

    218KB

  • MD5

    35f68acc0c3d5761a61975ec77b49cbc

  • SHA1

    f6d03e713bc9b47265141d9f9b83ae634d43d204

  • SHA256

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1

  • SHA512

    6a9d131e7c4f310ec77cf3c9c07c75dca279b7ffd6c46b252c559947900f1d754400fc51ce12b8afde86a0fd758e1b68d00a2e5f9144ad019d51bff5c67a4656

  • SSDEEP

    3072:HfVD9B1hzRAjEdJNCQ4woDZD57Wr3FKajQNR9MiYbuWjqgdcnfKvdHmN5b3SM:/jlVEEbNtoPajxu85cfAG3

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2264
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2c8 0x494
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4028
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:868
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:464 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a5d59031144ac6ab3dbf6358566aa618

    SHA1

    f6fb4567bbfd07f0df27083b36a179e00c263c5d

    SHA256

    039ec47b1e431e2555dc8da6bff06a3c78b242c01c9553286128c0f94d4c55ff

    SHA512

    a3049b32be6a7e8a4b1522d32df205e6433fa81fd540893ca917eb6ca33f51f79ec5571f144727bf145f00a457b4705942f0c55c85ddad96a227465345fc866f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a988860b03479abf60836ba5f04675dc

    SHA1

    5bd62ab48c54a636e852f5a8794bb71a1a1cbe51

    SHA256

    e77b0f7fcc02c28de2ae4cc7db1232ddfee287483a8ede6bb9999a941b119eaa

    SHA512

    d385560f9001ee0b768b4e6b829d5669a6cf1ca0d435c0b4efdcb0febc38b33101c1ea1f0a8c3dc49ea0e962c47f749d22f2192f821e8b724f6b6e018d4afb26

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XH3Z2ZON\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    5dcf6f53db8f1a34b4d35ee562634b4c

    SHA1

    1685291c3fc2297e5bbbaff7360864b44bdd09c5

    SHA256

    bf76e40ede13266939559fb2347f9855e577f5ccda003611807c5c15c00b7277

    SHA512

    1829da94e1fb249cbe016cf33689bc84742f9e9a79f666113f1dd0ee9d8691b3164c273c940551f131e98b13b98e627c2a348c0353d3459aa533771ce72b0034

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    6bfc8379ea59310bb2024819b8491211

    SHA1

    730c496dec38133c3362b0a1b04f91ed6bf26b48

    SHA256

    946de55402a08137a3c3981bb231f9b3c9f60582e30d1f43d8252ed5442a5498

    SHA512

    e77c79bc8f9f57df5c0f1cb58b6eef79f6fc32931030ff76e767599bea20f34c5f5ae4f426c0444725dbf35077559fb84e4432030944467f7b9bbfac67730798

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    a78dcd7c50d4536c24d693c8994e87e0

    SHA1

    521e4781ce5229832f2806285724cb3a454cda11

    SHA256

    682a01bd6df1972a184ca2ce9ac21cf0f3e7215b61389c2fd974dcc1b9283516

    SHA512

    2fb222f1d9b89694b7cceb3c2085378acec6ee196a6d05538179d6ad28ae04353ed08e25b40153d7a83498ffff0cf121faf338de75972494088fbff6742e8fcb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    cfd1379b09123fdd96086cd235f53e27

    SHA1

    fcecacab6a1115d342ad4967137466d74ea64548

    SHA256

    21d4490df248284bed1f2c65a7e404c5afb9b5c7c2528b5c1a439fc078fa214a

    SHA512

    ec6f2755dcc622c8f91b6454cc23c2a28c25253744899a0b1e832219d953084b9a180954c9d88abea13e1b850b20a682d1214d699ce1da12546e9994a2e0a35b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    be2c340bf7342fb9922b531a501a2734

    SHA1

    8645cb1a0529889265a541b83c2879bc2f61059a

    SHA256

    d6c153ca79cc27f0cd9738b203b3ce5ba4980434cbda8704683d3d29d6c78a77

    SHA512

    dbd5f62b3dde64831ba6bf0b26ccc8d71601e6c30a4bd0e842b14214ffc0f43011c92eec10131b883e45f5d96c16e8795faabb76d9604e44eb122053a8c2a1c5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    ba293e7fec187ef9777d90d5ded97da5

    SHA1

    1798b8c5204556d247637726d8ee01a04e753630

    SHA256

    39343a843942909e97bfd22296f18dc91651ffeeb5ee343ccde868ed7fff43e2

    SHA512

    eb62e9cfe61fca9645d63a38428678471128d2724fefb16873b055aeecab509d4ff8b1078cd2aa7b6b7cacd61ee71c393db9d0bc0ab90a0e8544ff658dcd4fc1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    29c446e05055cccc4d04d0ee6419af0e

    SHA1

    cce9bdede5909f04d9b027e1de67d6e0ddcc8f81

    SHA256

    dfd406ce88540bf298704d0082194ed7acb26d9ed64daaf94c52d22c4bb3b4d5

    SHA512

    0639a929967f7a286e59225ae5ea4359de93d29951e8cd3cc4b5c4453d8d1b7451b9b916f963b10688372d1b16e1c645b864e40008e4214d2e115e25dc982c9b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\0f5007522459c86e95ffcc62f32308f1_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

    Filesize

    1KB

    MD5

    0bb9b3e1c71fe0ae3db7beea85a980d9

    SHA1

    a2858dfdf93f24129675b345a1146b0e50f3b792

    SHA256

    5671cc7644c53bcdf15d4fcff12e044ed29e524fb70a9ba22d89a45dfc05182d

    SHA512

    4c0ae4339bed7d042d4da42f56424c49edf2ec5a49b4849a7c2ce4b0750ebfa470f67b14fb4e174306a6ed863775409ac29cf630197775b08fc1f3260d6ebb9a

  • memory/2264-136-0x0000000002E70000-0x0000000002ED0000-memory.dmp

    Filesize

    384KB

  • memory/2264-138-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-139-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-140-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-141-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2264-143-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2264-144-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-145-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-146-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-137-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-135-0x0000000002D60000-0x0000000002D61000-memory.dmp

    Filesize

    4KB

  • memory/2264-134-0x0000000002E70000-0x0000000002ED0000-memory.dmp

    Filesize

    384KB