Analysis

  • max time kernel
    140s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:27

General

  • Target

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe

  • Size

    218KB

  • MD5

    35f68acc0c3d5761a61975ec77b49cbc

  • SHA1

    f6d03e713bc9b47265141d9f9b83ae634d43d204

  • SHA256

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1

  • SHA512

    6a9d131e7c4f310ec77cf3c9c07c75dca279b7ffd6c46b252c559947900f1d754400fc51ce12b8afde86a0fd758e1b68d00a2e5f9144ad019d51bff5c67a4656

  • SSDEEP

    3072:HfVD9B1hzRAjEdJNCQ4woDZD57Wr3FKajQNR9MiYbuWjqgdcnfKvdHmN5b3SM:/jlVEEbNtoPajxu85cfAG3

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2264
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b581d72a6ebf30bd9b88c122f437f9f4

    SHA1

    c05e607357fbee993ed700fdaa8eb9421f4baf21

    SHA256

    b98f9676421e0daa1f2e324b6f6ff057aae1340ee9ea9fb82acabad591c3f9dd

    SHA512

    416227bbca9c6e65c2c390b6a766f29f00e4def240f0647f0169ef2737210da566643aa9f33ebc16353151a2abb4114d06d8d5d4ebfc24ab67fc0f773445c497

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b214041d0cd9cef3863e3ac7b463695d

    SHA1

    20a16e42bada6996d254a3d4dc9a7f7ee1828d54

    SHA256

    7909b2c2e52e91f317b9da2666bee19b00131cc682f89bb9608bdc87b52dfed4

    SHA512

    96675862f04f291e363d7a5f7d48ef673cd2a12f4027718578635ebd82012315578897bb3808eee039e593e5a21f0ef6011552e09a3954e41b0f21fd3f9fa09b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0c9564be9bc527702c9ca36b28e3d91

    SHA1

    9425c5ad750519215a5f03e86614f3f3931a7075

    SHA256

    634b7679c34ee16da5d12218b67faed9ccea30099c08efc703adb888124a2957

    SHA512

    5f07ce3ab767d69034dc354b05688a633d98fd235cbf2a6b335a7a392c7d6aac73ff5abbcc69c8610bf806936861621afaabefc19d07f878bbf560e4df5a260f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d47be4ff907f918926d1a6f7a40aede

    SHA1

    aeafe7c3e85d67c3d3b303f7f5d0cf074ce9f04f

    SHA256

    e9e30114770157f50b5fb95e60ce2a42aa53d3e96e0fbba03fbe0e8358b45d58

    SHA512

    d93ae9b5f89e7f10575a6e9a3ba55e0eebc3b6976511741c990b94fea1de4e44cdeedf109b1d9f66e389a35daf1d855b53c9bab83b243d227bfc9c9726482237

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b0535ab88778126de4c3be45897cfdd

    SHA1

    127e1d48079092c558df49aebd05426fae1caa72

    SHA256

    269ff520f8115cbbffecb250ca6e59720a35d7b6b831469eb88e1d26bcf711ad

    SHA512

    b2dd3d70c2ba301bc7978ab794cd56fe9c8169d2aaafefe6c9a97d1fc4920665e6df9012622e060ac2e6d61639b9560a7dfbf08d39958ede0c4c0419c347102a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ce7824a607b41bd51c18bafeb913f34

    SHA1

    6ff198e197590f6c1d7eb155c387f516d7597a21

    SHA256

    d1310bde9fc1e92a9f6ccfec527b9d6b398b2fc15c50e402523901a5def98506

    SHA512

    3b9b06a38584ae3684c54436a80dc89457c1edbf8e7b993d1ff2d1bcb97f4f2188b45c11b02023e0379ebddcf60b0d7385f2a7c035e1c64456d74489565ea1b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a4f41940ac7c58ee9cecf8fd3e86b34

    SHA1

    38843302bcad9100b86e16202cd103b63999d2a0

    SHA256

    628d1696a8ead7380eac83728956cdc2785300951933b2dcb23a5bd9147fe280

    SHA512

    b036d6dc2be74a3212df14b2d7ad0ffbd2412a9a0f553b47de2994b796435927e0de8933684063d4507b40db9324a41533792de7f4b8167aacc06b5cd489d39f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cd89364c1fada62ad13b84a8fa1c090

    SHA1

    43b73650bbda1994c7e8968761d823f6600cf36e

    SHA256

    194f8eaf1e87f375f2774f188b30deed5b8126c96dfa8f758d0c26f02cdeebd0

    SHA512

    f1d4585b815b5043fe3d6efad982ef5f33337d505ee8d9641908140eb27dd75a137c2df13d29acf9c03369093ba1e4c2eba900af497a90299182473e8afc2acb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c00bafd314f77be4245121e969d500b

    SHA1

    71a9661eeeb74ed9352d34c0e7dd709d56a70483

    SHA256

    faf6760bd8514c72bf2235df0fda5105b899f3dacdcc9d6ef465b8147c807ebe

    SHA512

    517d2f9d9e67e026b889c9588c38cad181e9643b7362883e54de88d41572a19849e66dd5771481876ddd53eb5c15cdfed952914f65a2b659847d9e320940ce67

  • C:\Users\Admin\AppData\Local\Temp\Cab760C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar767C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    f9e995f73a08846d353940074fd1583a

    SHA1

    e37eda2549b006e2290f4c81c993fe87d5da612e

    SHA256

    f5394cf32d0cd27e9b79fe82dbc007a838681b785a02e74a33fafd172dfc1c0e

    SHA512

    2753a0bab9b3adbcf6a335f6ddd4f12ea45239f84b29cb4e235d5d549a218b7be797986cc3189e399674e2154a13d82805b86e2e175c0fd789f8235f90cf84dc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    f9533f7b2989f7ccc6127fb2b93d72b2

    SHA1

    4f3a79b31d184bbc5c3f241ea859b79bb76a6c49

    SHA256

    9573a0a7f37c1e369cd8e5e70037297367a295dd2eb5e636b3417afd49cc3a13

    SHA512

    24d4147d832b85f8f2bbdaf2644c71d167466638026fd92846d02a26e599871bf4c37f1f91b9f50598b8871d913e9915a0de95ed7625d871c8fcd3664b9c07b7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    8b0de3f5b1933ac02f6b6d8e6d609c6f

    SHA1

    1ba52afd2fd57e9420755526d963bd77fa092bc7

    SHA256

    ebe86f094ec66aa0d04778f589943712e5ace5311895c70aa6029bbe62da79ba

    SHA512

    ecfaaf25bc08cb1c47f7a9b911da8b6e82468b88f873352fd11502a612371b28b085d1857dd64b85010d6ee2d558e62939d8865cb3396eaf73ca4f10b7cefade

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    d57b6de2789287310c9cfcd8a64fd3c7

    SHA1

    4f8aa8e57470adb5d6baa20d013ce02cf098c7e6

    SHA256

    d0bfe5992529487a50d424f1918b0270cd4fe6df20560c4168c89d4606f53a4e

    SHA512

    0dc9ec3feb68b8f9814c237c34450febb67b849cd8984537f8921a99fdffe05cefa44371fc806d3bfa50884977d06ee6d9f9a98280317439bc9249142ffe1c66

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    b9f8ca50757423a230696519c3ca1d95

    SHA1

    634418111b5e9b24bf3d1c9fe4417cfa7990b146

    SHA256

    5f26b258ec11ccb2903d2b29630a646fa3077e47c5ab6388cf99e177cee97236

    SHA512

    2c52b33e4a1d1e02fdabc514f295de7467ffb39f3e3f1a8c887fb18d8904f681eb2017016ea3f9ca6f3a55ccd60d324fd3479a84071c14a5ad10982ccfcc53cc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    509ce2be143a1d745743869bf302f9b8

    SHA1

    54a4a4df22e6e669a32198e495e0a32ac4549d9f

    SHA256

    e9859e0c6c6a6c589653fcc25868c2a09f913ed023e3f96fcf4b04bac44596df

    SHA512

    fcf920cf537e69a3b8e960727b08821462c2db062f17a25bdcac2a157d78447471bf0939d5307ab27ec1f49aac0579c5641ca1d02fd4617db530e72babcfbb48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    0a001c84014ce86520a8fc60b0be2e3f

    SHA1

    e9732a42d0f964bd40506ae363bf84a9752aeeb7

    SHA256

    7d6d7733637c65d9a2ecdceedc2fd0182ab4871f74547aaebae675d898e92fa3

    SHA512

    dec01ab3a4b42253570dca1891812a5126424e82e91ce0e4e0dcf6b6cc1f4a6d45c170de694767445e5ae749067c609c14d4a5072602c5a335faccea5b8f1c45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    1KB

    MD5

    de9596ee4f03a9f540036f3f93c4bde2

    SHA1

    ee7e68c9343618ae56d59179a1789260fff9889b

    SHA256

    c9c0ce3a74de32f63b494a4c7e1c51b125126fc06ed000d66cd1b04e7bcd4962

    SHA512

    192883a8320d077351c05a43fda0d83284e2f6406af33474988a4db6ca5cb20da373352bead2dc5d1c0200f3d046ce178dd23331995935ee6734bcacc6d86cf8

  • memory/2264-137-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/2264-134-0x0000000002A50000-0x0000000002A52000-memory.dmp

    Filesize

    8KB

  • memory/2264-135-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/2264-136-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2264-138-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2264-141-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2264-139-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB