Analysis

  • max time kernel
    464s
  • max time network
    454s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:09

General

  • Target

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe

  • Size

    218KB

  • MD5

    35f68acc0c3d5761a61975ec77b49cbc

  • SHA1

    f6d03e713bc9b47265141d9f9b83ae634d43d204

  • SHA256

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1

  • SHA512

    6a9d131e7c4f310ec77cf3c9c07c75dca279b7ffd6c46b252c559947900f1d754400fc51ce12b8afde86a0fd758e1b68d00a2e5f9144ad019d51bff5c67a4656

  • SSDEEP

    3072:HfVD9B1hzRAjEdJNCQ4woDZD57Wr3FKajQNR9MiYbuWjqgdcnfKvdHmN5b3SM:/jlVEEbNtoPajxu85cfAG3

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1400
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e6ce18fec8334d52ff8da5a06041cec

    SHA1

    8305bc806755a06367265f44a6b19069ece0d6ee

    SHA256

    19e39d873762c13008877a9130a019e5f818a881cacf1db9d005cc27543f1a23

    SHA512

    f284b8a11f0b72a8742cbbd206bfc388af91a94fec382d2ff5a38635c04acd09333e21c0f9789fa0c445001dfebf9bffec10a1a564ab82e17f432501c6086bc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f9f39fc88234d5e5f39984c0ef616a0

    SHA1

    ea8f3e44be3738e9bcec906b4317e9904de6294b

    SHA256

    42b311b114419d318f812c5103841a49a5e67ffae2221020786c42a1ad1e72d8

    SHA512

    f4eb74ddb42057c91f03200a63a7927e66f31a25803227837acb883d8b58ab926acdd76ca77680217ed4600785cdc3f0a22c95c2eb8cadd06bf1a13db6c48897

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc968bb7dec8daee9f187ef3030a4c70

    SHA1

    b47ee6243192e24de7599b07607ddcc11c5396da

    SHA256

    cc406ee28727b1cd35c2e01be7a255d740939ccee6d59a4ea80fbcb5d49940a3

    SHA512

    06018385c574f4ac2e8937ddb1d2867f1cafd461ad4344791f74da10590b3fac5b1dc7c9544604b436414e8cea1bf993f12dc8eb47ab793762eb701334829a16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35632ff9fa4a6c41e1040789b1c01198

    SHA1

    5b07f5f8f9b5663d27b207c13f18fb75de8e139c

    SHA256

    bf06fe5195ed52c5854178c678b8d4e55edd6f7ddb677e937417181b7716f7be

    SHA512

    8cbdf92dbc5cdfc1733270383f1c88156c7afba444a55efa3139b318138c74ba791216c673ed457f96986574a207705ee4941a31d21ad0ffeb6d05cb9c7e356b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    555b9717ee6a1140635afd44f79384b5

    SHA1

    59c38609eab3906a2564b01e19cbadc4675c2765

    SHA256

    21aba0dbd07880b321277075588139ff7f0d5a04bd65e200c7c91906f1c7e80c

    SHA512

    187015123377e8b9c4fb7b1a71014e6903541f0d816134793b981f74a143024db074d4f28a446dab8fb7c185ed07d7949a6bf22fbec29b5ddc9a3bf587e1050c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    206ec54566e6200034413730d5b67bd9

    SHA1

    fee1a18e7136f44ad17a119f486406878e38f903

    SHA256

    59986b1e7c87c73086ef8d39534236dabeebdbb40273dd6bb89e846f5108c162

    SHA512

    059da9c4db7c0fc1e96621dc9d605149f2f873a3a621e30c4d5f605c9b37f503699fdd2eea544dcacc2d443fa31f6ee3167bcef7cb6533a70959b9cf925ced95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81f3059996d12b00cee4f46487d6bba0

    SHA1

    f15863a1dce42b33e627ac75f589ddad15ac75ee

    SHA256

    2f685bff378815d5202cfcea1fe04dd3847459b9ef80c7f1b7ba640835ecd304

    SHA512

    17da6c8768b931d24595514b4b27dd9a5d356df357a2a6a17204127befbbf9f9d5da4ee6dccb7afe00c75c0789f23c4bde755bdfad955bcb8b8d89ecb5af6fca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b750126466e86eb47d7c14deb29327e3

    SHA1

    0cbee7bdfe47e4627d3921c7d939cf5649a4aa21

    SHA256

    263356329e4c31741d31ced139ec194edc9803cd821636fb86d0d36034d942e9

    SHA512

    d8b4745233a355f9bff758a2a0fad327376701fd65072776606f2cf629076372d354e6775f6df93b177d54065a548d541fedc983091439859c758fd56d5f13f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18a24858827e18f2a04e89f0e3c8b3b3

    SHA1

    15c054e5de8ca18f7ca5f40c9fce0b4da826a15d

    SHA256

    cec5cf42e77aa9bc8752a69e7e5d41acdb8ec2d7fbf2ebd97be1eb0910317f03

    SHA512

    be4b232f2631eb70c99b49ad8fd89497ceb4ab08c702893fe465360253c84cd9f6a552dd0c417ed5ad23d65f768da0ea28b3f9ef098ec2057b73d8c07308e72a

  • C:\Users\Admin\AppData\Local\Temp\Cab6C89.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6D0A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    0937d62afc596fb759c2a2fea303866b

    SHA1

    e44ca084b944efd9a21216b564fed69c567b2465

    SHA256

    0ba631a295753c1c255049c16969a841b8afabb3c5454a8286053dbe7c497f47

    SHA512

    2218f6be26cfbe93cbc0a306aa677b96218a63317f609db990e2a06e031fba116fb2d06a7831f4f5591c8b928b9760d12c220499b63c141397f863c702130c39

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    7fe64ca0527d050a3f52a7b60537f1b7

    SHA1

    4c4b6a8b0c0dd7ebba3d94943da0a2feb7593399

    SHA256

    05dc890299d921189b50df79280b7b40a6fb3642a40f98a292606994ce7c382f

    SHA512

    5d93ee6a210fd8fdce1c16daa4c7f443ee95bb7f0d57e8e6f1498fdeb07ca656d101a49eeb9d6ad0300343578e1247b00a5d7cf9edd56f82096ed75831d27f44

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    edda92de4349e1e294d7dc8e596dd1a5

    SHA1

    8f26c376cec4778ef13af1331ca53d417dd1e2fa

    SHA256

    e4f294f8093c7060221601b0a46a0411ea3330cf23220cb691f5db12398bbc0c

    SHA512

    67bbfb471e2ba597d75d2c9b7970db66b87f3fbbe197c88660142615f3dbab8b7b6595e1edf91fb51c89a897d6fda4f0627645d29db37099773f10f7805034fa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    02890a92a36ea2e463f643360f63539d

    SHA1

    0af4029cd1ecdf9e0c52e92ba257f7c4847e130f

    SHA256

    87ee17a05df08ff8d67310f9f32e93a00972ea3fbf40d830786722a6c0073dae

    SHA512

    cb413dd9ac74a1388eda6b120a3e474c9204b9810506dd54087b6e13e2529c68b9ac6c5dac2cdd43414dca1880ff91eacc35192f9c3509b8f2e67ac62d23185e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    4a27792bbd9f964ca9978b5240d29e29

    SHA1

    af2c85152c5b44a068397d75f065b810cf4c196b

    SHA256

    f4b44ac8dc00e0600a0dd847b95c2b9728d67d62f1151837990c91e0ad7f9c4a

    SHA512

    eb29f94d9efa4a9d829b26670189f086598b15af27b6526aaea5c3e1ac5c34d12a6c949a5154e86db77da157ae370b6e3c4e250989a1e75813195f5ed9e270c3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    d22c3886e09afb3e11cea5fc3a1223f4

    SHA1

    c53c44b0c669f34648224657877d550ca0150380

    SHA256

    fab590081bd9a87229c3f0203b7bbfd7c7c76d4e362e090d47f573838fdb07c1

    SHA512

    10852b4e4bcafe86887f2698ad08cfb33e6357549dd12e2db048e64489d85713230c7bdb83253cd393f48c4c0a5663964a8467248e7199e9aa369c090af4d3fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    9b4feec15d7b40e0e570680e16e87c8d

    SHA1

    b6cc87c44636da88cc38145fb489246ea0d46804

    SHA256

    7fa218b867158327aae32dd33a74ccd74b1e24930bd60dcb5bcc5818715afc66

    SHA512

    f3b112b17f9e964d5e21723536e1fc7825ba0b5c33306623908b4850c7a475db0cd17fc24f67a010e8f4b272f7a2bc4f02c3f9da4af6d6ea05b83f2c83781cd6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\0f5007522459c86e95ffcc62f32308f1_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    1KB

    MD5

    525efebbe394ff257cf65eca6a5b3a38

    SHA1

    bc90b4e8fb2c205f7158ef6511f5bdb21b9d15ab

    SHA256

    cef3c058b71a418885afbf1268315189284a7baabb40b18c70fb6add7dc575c4

    SHA512

    7db12a914b8299cc723a4be0a33d8e0189d1d00959733042cee95c6d9611d2c632fb7f31938e8287912d78b9b37825942c3a623d68fa56f11994a75e6c4405a9

  • memory/1400-137-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/1400-134-0x00000000004A0000-0x00000000004A2000-memory.dmp

    Filesize

    8KB

  • memory/1400-136-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/1400-135-0x0000000002B80000-0x0000000002BE0000-memory.dmp

    Filesize

    384KB

  • memory/1400-138-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1400-141-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1400-140-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/1400-613-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB