Analysis

  • max time kernel
    300s
  • max time network
    244s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:03

General

  • Target

    85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe

  • Size

    56KB

  • MD5

    a865cae4f9a553fa100932e8786b80be

  • SHA1

    1c691b07fa9c59c1eb6a993723887a9ac08b301c

  • SHA256

    85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f

  • SHA512

    df149155fc97c72f9401826f614dfb16edbf982b64c6fb3d7302526cd9c4ee8368dcfdc666c1c1fe2a522115176042f135723e9390ed4755fb35b4ebddc263e2

  • SSDEEP

    768:9Wf9/O9lXRyz4M9XyTm/O94NOYXkGQ40d4Wg/i+Pet+F/O9LiAU3UF3333efYZCz:9EmRyz4gOmxNOYXF+yzTPSwjH33wk

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://fileice.com/LINKHERE
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ae33391800d2a93b668508e9af352b1

    SHA1

    9788b78c9f30ba0ae57d74463e232f954635b9f5

    SHA256

    b38fd58e65c7cde93dcd09bc7f42de7baf17ad199f94724521c934b44f282d53

    SHA512

    d4597d010a64f224fc6c28db1bf8dec31875eb02745e4d163003e5a81bfe25569c2fd619d6d5fb54e55335dbc3827b503a5044a6c7d3e1f8bd5674fd3f6b1073

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f43c7407e19614c9426cdcdcb8783e6

    SHA1

    6920741b2fc26c1ba94798596613c21527ed9158

    SHA256

    a7e4bf934f2af31feac75a701cc1f88cf8e282e7039b04f45af89d1c0ef12c3e

    SHA512

    4e9e0748cc234eef19dde6d5e4eadab12391a9183f93a3f00dff97da63298eb3ff4aeb5f0db237c140f322d920583e3e7051cf58bb3a1e44b09f25d42ab4871d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    025b28e4a99a1a2400c3cfd3b6028296

    SHA1

    e710ba56698671d3bad8ef0cca882a41645f64f1

    SHA256

    f89d9e4ceea0fdddfc31bb1fa180651672b51023606f0db50660ab84fcba0ce4

    SHA512

    83734659140b41e67ceeb7462061dc2517222a131e4e6f9d55817f8b652d7f64251f4585e2071c3b9068504e6f7f9c43482d5e1ef6bc49e213049a811bcc7572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04827ad07a951d3b017c731d7a11e368

    SHA1

    67c7d71fc63b4f96001046bb1bc56db34860b2b1

    SHA256

    41ffbe7c01b9d23c710043ffff47b3937eacc89cc9fa0c8515ef3235ea2a0006

    SHA512

    60254d3c9a87a4ee9fca381912d37d6802d07fee8cd987825c367a2d9cd7206cba6fd83e1df6dc0167384cf6e16e661d8c09f8783e712dbfe2c9f11b5e81ca09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e806e744e4b43a8c5731616adc22cb2

    SHA1

    0161bacfdf7c78169b32ba0fef40483ad4b7c2dc

    SHA256

    c82b98fdb55a493e06b278373a93d25d3dcd2fd36aa6b14f42f2e240566f5f0f

    SHA512

    34fc4fb76c3c6388ffd060a35190451dc69cdbbfefffa063ee11fda2db7fb93526c2fb08dc640cd65724a13670c4ebd0e56cbb2ff1a9932ef9aac9833047f8ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc34d687f21adb26df2da28cfe6b2a3a

    SHA1

    31020c2b53ad29afa261c1608594a3e07201e7a5

    SHA256

    6aa8eb6105464028547dd11eda2d8cf70461404a69d9e5d93da8b8bbbdae031f

    SHA512

    ed153d9c11f192ffe67a0dc3b5d19498180b170af02452ffbbdd9051fe5f2681bb1e4542b31a5bbafecd7e4edd970a26c5d8f34dea089f7d25e49c86ad0c2123

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7d6692ebf187fec622caa030fc21471

    SHA1

    0f3f0595955cab465779e172e7118521c2070e8f

    SHA256

    38c65217c1d04c35ec1fe4d969b1927634c543203b1a5c450875f76b11fff5d8

    SHA512

    299dcd9e0b00bb400a0b6689692b6c2eeced7400cc46c013ab67f454c9161d6dc29470ac350f6f2a204c832230ea185463c1e46a59d5edf890533ce0ca27fb5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0deee6f0125d1c7edc86e6bc86f7aae

    SHA1

    66a89b98b5b9daa3b1cce4069e2354846005a933

    SHA256

    2287c46ec0042035549b24fd98b983397a26616cd7a66c3deb61227a51393f81

    SHA512

    e23675271b66d9e4c4819e8942e0c0e89fbae8ed2cc403b0bc4547f8b31d9bf5a5b7b776d7b953c1e9b6678737e91857d9c466af01d84c6ccf9c05bc7e517efa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af567310ae86b71e88d17450b54043fd

    SHA1

    0abaebcbbc1c6807da0fa617fd5cbb34f12c7ab1

    SHA256

    5d23eab7b1daad7e1614ca424077a5183392336dee0fae1c4da0196025dfc7c5

    SHA512

    d47d42003bdc073f76923adf865e80029aadc45ce4ccbc6b6df452197fed12dc5b30091af338d3f94d87d01d6b3724b721b00b6a96d9eb1d39845c4d4cc26391

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    331551c8483aa3395980bff1a6be5003

    SHA1

    b1475cdc7a6103adddec93f2fecffcb3936ede81

    SHA256

    31b6ed291b3509eb3d2883a814c38b1d3335769555620c9950a9e191fd3b4b8e

    SHA512

    05b184d787ea15a5327f978c84bdde940ba305f5af23c45a53d9897cb7b453e8c789f6e974e94e60c7acdfa1fdf4b6f69ba96d5d326528fb6d6e4ba319d9b79c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86627e38ae3a7459daca9ff39db3a39f

    SHA1

    c037151355d62bcd43031e03af02f29bcc542dd1

    SHA256

    1e9d826967eae1c0351d2e0dba01eb157559fcb58b4aa9a98d96add2abad731b

    SHA512

    29965e66f639c84e34f7e15a8426c2ad84835f100e8d0941ad27f64478f2bcbdb567c1ac78a7e1c5b593471ec3271d123e328e802d2abd05fa3f41c0102a095f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff5bfad0399a28edc8ade777a6a5b67b

    SHA1

    3ce13dfc8d31df0f1090bf003a3e48ac20937358

    SHA256

    dd97bc0e22cc87902cc53fbc2121e02587da1008891990382cc8cf503dc12e4f

    SHA512

    ca1a66d4c64511296cedfbe6280de901fa719b6f3ea591c8d4e2970ac7bbd34864e2ab1ec148e3a21694fd4b66b19ff9914feed72ea34fee4ada302de2e94c62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6df9ac5346501d780d637c8d1b8abda3

    SHA1

    e0199fca77310f5eb5cce378a329a7045d908701

    SHA256

    e61419aeaf1ce95f4d776675737dcc0a8e0af693adc0158c2bd800af664526ef

    SHA512

    4dd49d005cd47687a35612da5a6dbaf24549f3a276582fbc1139d98beef06b792b16b930f6427ea4d513c288a4f08b0b2a7bf913108481a469d6199617ce1a83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b94ba5be814ad996a600dd273b143afd

    SHA1

    6b74f8729750bd03a88befc8cc7022001f351206

    SHA256

    6a92ba2a406197511494f92c77a283b24eb17edb9b34098dee030fe141e9575c

    SHA512

    b503d342c74f72999d9839a784b0f5fd1be4046ec101579222a18a42d23b1595862804d2078e470295cfee8136214737efc38c71cdd9df3cd1b323291f8eb052

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3c3703370a5a1009cda6a641c8ea024

    SHA1

    4a8bcbcf72c9f53b2a51843d84b641cf1c87bd96

    SHA256

    968ae5fde364a0c1ddacfc4dcb53f78fdfe68d1a27bf34f0cb7a8d9a6e00e59c

    SHA512

    0c7dbfc4dd1c45e822ecff9dce58306d5ea4afee08f1b47124aa7993c27e8621ac4c279a1307654107aa922e675b0643a5daae325c877ec86709d7250720b091

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99837fdbae9b54b0e2f563ae2aacfbe5

    SHA1

    119a599afc831de1f57b04d160cc56f8bc73ca36

    SHA256

    e8f4ea4d464f41ce2d3ac820e512220770e1f988d1a865049189d69105bf4559

    SHA512

    84d23e5f2b769d51d1a8a840346615767341c23886222b59d2297aab6475354bbe49ee3049050b8329f344fb43635d17a74f7f72b5b26998765725f8dc206655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c881bafc0979c82f4ee9370a8e650f3

    SHA1

    f37cd7bab9b173fb652e076d0ca1c0046571bca8

    SHA256

    146650be57c9a972df774bd9a94f338966043cb4daa5e2fb1092b3bfefed2869

    SHA512

    9462b75e37eed45a1f9a4394766578154b3f0868ba18bc144ba3978c374a6f961f1df9405f51bd01521d3a97386733834858dd4c87ad96be50a7b845367eb2af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea4e0e449aaa15c3d5773ea7af5965db

    SHA1

    77509ab2489c070166d9b1fe1429413d6dd8ba19

    SHA256

    ac6535bea24b53f64fe3440c7f30e883d6648eb2dab878913a873d1fab89ab82

    SHA512

    e509aa7188482b8f31b77ef46b990daeec28e5c14867abb0fb1d6fe6552ba271722ab891c4b5e39108e324553d49d938a827a55b55babfe61a1c642b2a753f4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    996721f34576978be5e215d42012ba81

    SHA1

    9ce5abba21ea5efc5d7ffb9ef139f14f8ab14378

    SHA256

    462581fff63fb931e52d06813e1f55afbc2462de114ec4d04e8faf4be76faf96

    SHA512

    35a458103a43e406b62d3c11d02efa37d7e2c11a9b68fcef86703c804b2600a6663143b9a546a52714ba3d765f5b42236ef3ee51b8a32d07bc9faff38bc94751

  • C:\Users\Admin\AppData\Local\Temp\CabFFA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar105C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\~DF6C6E3E6DC409AE46.TMP

    Filesize

    16KB

    MD5

    163e6c9e0d11c0d7eeecb249f6ccd028

    SHA1

    8cea98604651b835a707ca7b94747987e6bc1681

    SHA256

    9d66b13266a2418472d30cc09e5d5b9b25510c24626c7eeaaefb206cce6637e6

    SHA512

    02217706e157552c16121c62ca172d2e477c3c12fb610829b606cdfdf6f3f0918f737bb09168a860b12f5d615f53e8429c70650f823f8c8dd9825cecad2de0d0

  • memory/1712-6-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

    Filesize

    4KB

  • memory/1712-0-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

    Filesize

    4KB

  • memory/1712-1-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1712-2-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1712-3-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1712-4-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1712-5-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1712-7-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1712-8-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB