Analysis

  • max time kernel
    291s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:41

General

  • Target

    xxx_video (2).exe

  • Size

    608KB

  • MD5

    2bcae695288cd75a2d71c0dbb69359fd

  • SHA1

    6a0476b62c069d42a2d8290b7d467d8a136312e7

  • SHA256

    d51d08aef8661780261241ddb5bb2617b1fafa1ac1cdcad77e825c16faf48c79

  • SHA512

    a28d5299addd39b0905745889cc478549c295ba9a19d49b1b0fe723840c298d0793203627ea5852e91ed2efc6684d2cf7362ff2958e52eb30c859cab497b0e96

  • SSDEEP

    12288:ao7VLRpB3hC/K+wAN0PdyT9ElIdq5uMumzu5FEiXqv3RZF8N4E:9P5zZI43

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xxx_video (2).exe
    "C:\Users\Admin\AppData\Local\Temp\xxx_video (2).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SonPw.exe.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SonPw.exe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://pornozud.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e97731cdb7cba212f570f3b924d6eee

    SHA1

    66843a0b945bd935b8c663caa3464e190910e189

    SHA256

    e26e1237f20f22ef2f8f90bc80977ef5b560b96af431e0c55063be8b3114d036

    SHA512

    6f7baa3fd44f3934de4efe2103c2d461aad259b5889a74bb0f3abff451d46e22455e030621293508d1c6defe69e500ee6f436589e72f7d5a990944fb21dfb5be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9099dbf2a8b34fe07f9076ca5bd5a5ec

    SHA1

    a2dfdc82283b66c3274ce160836b6a845d79fc59

    SHA256

    9fb261a3c9f8ee7581b6c2cb34025dab1def6510c7b0a49ac49894ba1d5102ec

    SHA512

    93f62c4b2f399ad73742440e6b643c7d5f71bb0ba68641515566f6577ba2c378f3e33b0e60041ad5097f31e7ad182a3a2d431e4e4fd92575184303c102381cc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34662da50b6d37f49e2a41c442716ad0

    SHA1

    bed970f9eac4497ce586875e3128c673fadf4761

    SHA256

    ff9f5a32d3d849948f7239fe21965c1177f3f716dcad3fafd975604e54012d04

    SHA512

    174ff780f8dd2d9ea40af9408cfa21e80f96d6ae168aed792dae60f2eaa7b04754a514131fb0ce251175cf1b547324f4bb144a509dc154719fa9864ef2b0aa7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a56df85294ba6506360ddaf172dd425c

    SHA1

    be83327ddc5f21516b43bfcaa9a47c2d12c2ac54

    SHA256

    966e76a83a54b0806369ea352197198b1e99c059ab189a263ce916de802cabb8

    SHA512

    b4067c8ce47410e6d37474dfd2549725eda62b9ebf3f7345d71d63daf46b16c1ccb7c5fb5cf3a84768d11d692d5498e6ca42f1b06c3c4d0c7c9bd9d6629d274f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a8674df2c7682fa4ad68ff748f2b9bf

    SHA1

    55bf445953809569e64c267fab9647ef9cd66827

    SHA256

    8908d7b0478f06de83c26bb02f7cff7149ec0065384698390e492b760ede7c0f

    SHA512

    fc7415c6d62a3b75b2802ac1f29dfc67e085bda538349d4520df87e7c88c6a424bce747792b8bbac73e00c79a1834cd94f73e12a03371d3420db027cced06ccb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    787fdfd8f610b47c073d396d3eae77f8

    SHA1

    85de174c29f3e7c0eccc9dcb77df1c33167cb2dd

    SHA256

    01d507a4fbd8c746e4034c09d54d6f8eab7a5ca0e2e039bd24abfa831c8d4505

    SHA512

    6c2a850e397e739d42abac79c9b28c459009a604fb113fd4b2055c6f6a470f67c304a01862503731e43c9f7d4fe74ae68adfccc3e2c64aad6f6925f0ef1a841e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c1be225227178c8a9b59a5e7a28ee9c

    SHA1

    39bba66551770e621bc748d95a86ebc3a43d31cb

    SHA256

    7005735e26dee11a98808f5f87c0e5ac477137ea63b5ba556c7f5ac366ff2794

    SHA512

    d4c82c484b1f0a3a4637a37d6c42666f3d886910c188a6ef2851c9d2f5c7019d742a75e39f0675b51552e9b1e4506aac66077b4e1afb743bc7fc0adc33db74ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d5e69eca229fae2cc44056f7229d456

    SHA1

    1b2faf5d45197cfff96813ebca33409c20f6e396

    SHA256

    8986b32bf58efb32d4f54e002fa952e3d5611b55bba41fabe91bc4c22b1ed00b

    SHA512

    065251979773b763865887c8463137a35140a911dd0a212b37f1d4e314b25c64e728c3ad14e70ac16384fb99ceb40be819f6d2ad0fc62c6999c9bcd6e4645bb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c6dd648a159c60f2350f7052b2938aa

    SHA1

    3dc76e616e2e838ac8ff16ba8df2a3e063b114c0

    SHA256

    ef9968e025f323582a886fe392b2573508e42ef520de1ceac6926ed0d039079f

    SHA512

    dca001af6a3237cc96232a3040d940ee1f6d8183ebb36b3d0d38463a38d5854069ec7a55da2820c53f644e540bee931a4b10522b8798acb9d45d0f6ddb3a06d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e17109b7122c69e2934eac349bc51ff5

    SHA1

    357d6c51c315aeebeae21523bdf38ca01befe06a

    SHA256

    62e5de4c92a24dd86c5d38ce92ad6bfe086e28655e0ed9bcaab85ca8bd5070d1

    SHA512

    0cf2ea2ac0ddf3c512e6dad48d2f3aeb4d41e45bde88ff015c00f971c889f8db955aee4c2131e63ccfe070e234d9212aeb8131ce57149dc1e09438d0faa21c22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89faa91deac287b4d74d09a050069d26

    SHA1

    94390f97985366a611974a553c5d583804dea6fd

    SHA256

    d7eb9d4dfbe60cbb099ef6314fb02356e0d288e4bb826549e57cc49e9ebb5079

    SHA512

    e2f4070b3210a7d3bf9feb919e4760dbacc13a61df9d2111a754d5edffa22eb10c4ec3ec89e138367fe1d3584b610197b7be1ee2a077732ba586c42559f72c1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20a0a2c62a52e89146d561261225f5e5

    SHA1

    3f303f5129327b32d560dd8aba7da2e3e844d5ce

    SHA256

    f065823733b11ba6b6b0d042277c56eb34168ca5d7a298236487dbb91fc052d6

    SHA512

    8c6a52008f7e092936938a954852c5aae631f21783c3867fe7805fa3e7cd8affbc2c660a82ee68823b79d27ef994f591ca7149faf11f2ce10adc25408dcb6f6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    523f5e68a83770561d7c42b1ea0f043a

    SHA1

    077b7dbc597449d76951a0e8a7fbf704494b2434

    SHA256

    d3edfda4e62db47234d888a9b9b9cbae2c9bdb7e38b6ecdda350b9bb68766848

    SHA512

    1c7d64725c7eed9b6642be477eb5aceb839346b63405793a3625cf495dff6e313287414a56ecc4e70056a0fa03ecf43c9a2aeb1f12cdb3c7b809ab819c98093b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b97632f17dd56cc900bda2bf12f0d60

    SHA1

    ac3e9f3f9c2d51a1ed4a773c4d633d0234d0e44b

    SHA256

    41a682d3aa0f142900f46603fa7bcb5d5e6f9550a49ebd66757b0fae9351d6ca

    SHA512

    f47ce771e3be7a405af4f8dbbd7b3c960a235b6630bbc15478b85f9a0640ea24e1731a99b7b2701320b90864ad6baafa76862fe36f762214d2b92861a943adc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84f311b67c343093991aface6b46f92

    SHA1

    969f3afaa8a91fc903687a2cd00d2b5ba35c68c7

    SHA256

    472fcc5ad8548e49237d7437f3f706d2e4d0d8055c9ed7887c3002515b69f28a

    SHA512

    f3f3d5c463e7580abaa333d6988249699c15c65351e3b2f24ecc79a6ba870d91a8a73834c53f529de51e8953ed60826f79e6becfc15cea5b36273089fd37e25a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f16ede81f91225a09368ea355f54745

    SHA1

    40e7c6532c232c9b031387752b41155ca0d50cf9

    SHA256

    6bb53893a7bb1c3edfe1da14e416fb3f971c86d47fe9dfa92a92ce64f1b8180b

    SHA512

    ad724ba5aed703989efee87b317a73c55f0f94b1d3f423bb8fc38de275a9dea18d40c19df9c4873510473ffe58f76e4f24eb90ea7ef1e8e7fa63a43ebeaea9f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34da3421c518d6623e747886984af2c0

    SHA1

    a2da535a257c34ed20fcc5db5f1cf4b16d2506be

    SHA256

    7ef05d3032100e06709ced85d56e845e4c783add156e520f6444c0b6b1c18111

    SHA512

    151ac521931d090c8e090b989f1c528f7f82ff23edc76b15107b224a7ce9f9feb92cb91b3d28fef553364d8caea2f480c434106928cb8c67084de7c7b40579ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85a53d326013836810473cdc953a7d3d

    SHA1

    0389b0c8faf1f6ebbf8192a54771504979f121f1

    SHA256

    58c3a5480e3c7bcfa6aadb0136dac3716d77b047bbad289085b328c73835e35f

    SHA512

    297630aab8b120ccd959f2d170c2ec4df628a5164ddcde54dbc3d467582c46bc9cf22fd144c88b0d70d5748b533d49aed7ab45a9f293ffba133365f5f70dc908

  • C:\Users\Admin\AppData\Local\Temp\Cab6E7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar766.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SonPw.exe.exe

    Filesize

    221KB

    MD5

    0281bba49b8475542e9021eb64fbbbb3

    SHA1

    c5a1bce7918e88edcba692c6c54ff9bbd80ce2ed

    SHA256

    9a879fa5427056f857e48b62637b8653d46e29ffad34a5c5c15bf6bfa86bdc6a

    SHA512

    fb28dcd9f0b8d0a3b188510088e68351d09004bfcdd382853ac1052227461ba1ed95350e10db28605d6a8be57a484f7d30737d8f7b97b1c81885d60554c51cd6

  • memory/2128-11-0x000007FEF5CD0000-0x000007FEF666D000-memory.dmp

    Filesize

    9.6MB

  • memory/2128-0-0x000007FEF5F8E000-0x000007FEF5F8F000-memory.dmp

    Filesize

    4KB

  • memory/2128-4-0x000007FEF5CD0000-0x000007FEF666D000-memory.dmp

    Filesize

    9.6MB

  • memory/2128-2-0x000007FEF5CD0000-0x000007FEF666D000-memory.dmp

    Filesize

    9.6MB

  • memory/3020-14-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/3020-452-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3020-451-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3020-21-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3020-22-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/3020-20-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3020-15-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3020-10-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3020-8-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3020-9-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB