Resubmissions

22-11-2024 22:54

241122-2vh7gaxmfl 10

22-11-2024 03:27

241122-dzqkcatmht 10

22-11-2024 03:16

241122-dsgc4atlgs 10

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:27

General

  • Target

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe

  • Size

    218KB

  • MD5

    35f68acc0c3d5761a61975ec77b49cbc

  • SHA1

    f6d03e713bc9b47265141d9f9b83ae634d43d204

  • SHA256

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1

  • SHA512

    6a9d131e7c4f310ec77cf3c9c07c75dca279b7ffd6c46b252c559947900f1d754400fc51ce12b8afde86a0fd758e1b68d00a2e5f9144ad019d51bff5c67a4656

  • SSDEEP

    3072:HfVD9B1hzRAjEdJNCQ4woDZD57Wr3FKajQNR9MiYbuWjqgdcnfKvdHmN5b3SM:/jlVEEbNtoPajxu85cfAG3

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2384
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    023e64529d61d2fd8c5ea278292bbb4b

    SHA1

    e16973e7371d5b6bc105eeea8f094ac927b5cb9c

    SHA256

    2bb2de0ed6e2d458d987831201a74778486a29aa59b691d007560704ab96a94a

    SHA512

    a8bda17428f4d1b5245302aac82ad9b6aa5578239d0a72534a27e1d29603cd7d9d3db816c42955d0480f11130b7944f48a055a232093a7cf86f5f8a84b02488f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eab5ddcfb3da5c022b26a5419cbde61

    SHA1

    8ac9747ea931078710e64a6a4d9b128713272f61

    SHA256

    f95df6886fa7aaa93c3012b17b061d3fbdadec9916ac71ae5e006d0ba6e9ee23

    SHA512

    69c6654bc6e5f3037efc0f710b2f9fa894586a00c93258fdd9ff12f43cea3b03cbdee1c3ed3910876c6dadc93f8beaed2357efc786343b28f21bc1867fe20bc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a96dd8d1ad7d440b20b2327f8cf61bc2

    SHA1

    c3a0e7b74f4c0e2151e48fb7624278a0a95c8a52

    SHA256

    f4195ec905f8dc77cea3389e3b903586c7de2d8e6c1647a7b3751781bf8ccfcb

    SHA512

    52eab1bf618dba8aa663bcea96ee19b7fcc6d3515d95c3a994f35a736612133dd175f254e0efa70c68cd9f60d58d5d7eb7edb4d52fb289dd6571d1f0450d20ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbecc68ba63f3aea11b4d042f08c2b91

    SHA1

    d66337a16e5feae359f690d07c6ad434a60cf2ee

    SHA256

    72b3a8437f4bf4beb7ac7ee6f5f23166bc543cdd9ad4ec026a4f91a8259841da

    SHA512

    900d3eb1daa046d4ac370ecc64a594c385ca6e495ad49543b39d1159f53109995ad55ea7642caf3a5a445ab1ca8e132275a81e2f417562e4bf56108f19a8a2b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19cc760eba73ba598463925a4d9d10b4

    SHA1

    7c0e77400f08f55840e6e965c8d9de3faf12749f

    SHA256

    e1346fa81276c063c18ec70ebece358ccd67fc4a255e2c8b0087282bcdbb2173

    SHA512

    a345660250d66fb031feebb7b86382a29832f239b39d681d60e3c251c71a2033ce549f273927dff9c4f9e07ecec2f3a8202d5646bd970dc19ebd4278f36fe346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02c4f48b5f211dd91cc2b4932449ed51

    SHA1

    813f4d41af6fc32a7c857dfb13729482e500a7d8

    SHA256

    24c083527657a1e3d63ac6bb77e4df310f9688db9940c496ab8fc32ce8842311

    SHA512

    5f7362fd5731b2aa4c9c0075799ffe393217863b549a9b94ffe1cd0d3c4999ea2da6f8b413f91060643e0c60a485beaba785380bef8434f5ea4dbdf5e321582d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da3ffc6d07991fd8417d8ca4a48b59b6

    SHA1

    8af80a26fb2bf424d6ecba4748a70b3b57328b07

    SHA256

    91ea5f6b44dc5944e836d7192d32513233c6f1e587e27a8581e280ed0d628322

    SHA512

    068d1aca88436e7f2f9d784488db3347be6f7d205ee2dac55dc5a168477613d96424540cd3eb1695414a3784b77a485839de63de5486a2116434888ca935b2a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94778150b9cc40ac3253a6382fc06fc3

    SHA1

    c2427727f322ff156082c6935a283e083b1d3022

    SHA256

    007c219c2eac6fe385e6533f597f991d10c9978424243946b3ef23b385f30048

    SHA512

    40fa7778cb65971b71b2078fb53e51738dcd540f10c5de8a873d17e2cb3018ba60bc642ff5319521bdcc649975adcb06a52f8b64f30c51ba9d06552ef0bc9465

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e59112aa8071d9ed6dcd477936d00f4

    SHA1

    cf2027caf579760fcecf11e67f8e7260dddd83d2

    SHA256

    5e68d01b1ad3c2db0d0e0113ef342289848b38925b71e3a95d6ffc991d801082

    SHA512

    cc77ee98ae7e769a5b88d24d3b748f6944a2c4e8c4e5cb940b45e8bb37a5e7a4e147058d88703af96b6094b3d15751ae4c92f72bc4568c97aef8908a2eb66a61

  • C:\Users\Admin\AppData\Local\Temp\Cab3036.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3152.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    705fa0b6a44bb730d72865a569b24ff4

    SHA1

    5b2a84d825324c752b3704197784d74230c7913b

    SHA256

    f7d82b6e7aef520d3bcd0e23e6eae3255e481c5dc235afac8eeace5507ccd0f1

    SHA512

    5306817a7b77a8777c60d9affba0a381eaeec396164d6dba88af579ac228b8576d87e25403e605c55a561378d02be30cfaeb56e56d8eee4a1ca387ad119c2839

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    73953fd26fc9cc53dcc2fbe24ccd8592

    SHA1

    e35908a8586d0dda0561538ab0038f6b235b38d5

    SHA256

    f56c9400579210c28351822ab3230ca62ee20d763c3374685954ac6923c491de

    SHA512

    26901bba4fab1d0a9bd82e9b415357196b20a6c897fc95f1e08065e0282e357a1546a6f497f0fdca35501c28fb7adbd5aaaee5f8b796a71d6bf8247f78c7fc02

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    1450d9a4621757e0a1707175806be2cc

    SHA1

    64bacd140b81880cd238ee0fa7a319271d44de05

    SHA256

    2623478d35dd6a3efa2f353cb5b5e6b4c6446dc1677911a36d53764ad24064d5

    SHA512

    789b22b894bd73719bb422d752ab84ee2481031910f756d6d53f91b8f1b4c41079e899d10799e0bfa0dca10cb3d306e88b38926611ec6e5e822d6899c193d55d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    9d035ca2899390e96470ccef9000e4c9

    SHA1

    f8ca22b8650a1b030b475c33868999feb5772944

    SHA256

    f379f37a46df5ff3efb28621baebb9b6569bb0e3a9ce1224def06045e00e8951

    SHA512

    8654064f801697e3485d346df735c028adb0e2ac00467e98bf63ad350cea7976d24465ab7594910cba07fee606d78e6e41fed203558ca307e4ca1c262dd53a07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    2ad922563c8b577a373b7d8155ee66b4

    SHA1

    2feb14f417a7249ac6eb2a9f87153dca70302f71

    SHA256

    c84456802e28227247b5572d317107893b2789dd45c477d2f3820185922040df

    SHA512

    b2b97946b0a2419c9ec61ed4ecf7e8b7764e560dea5979443c3f3db0343255961925b3ee59894ea9fe2fc9f5ea8f73aea747a17b4ae71238a650fad550f939e6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    152b5ecb184d350d65e04b55f69710d3

    SHA1

    80b086feb8cc76ff4cac40766822f6ab21eb65e6

    SHA256

    6dfc8854e3b6a6683f6b647b1ef2ccee7622cdbf28d400014dd248c06edfb775

    SHA512

    8479382e56909fda5fe25ff80127ded93ce427084ebe4b6938f8e439e6b2c575b9db7beffc7c1db1663e34ea1c81f719678382ad77c0fd25257df3b950b3cdf5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    0401c65d09845dd17b2fd1f9a0f8e379

    SHA1

    7a0a3547c39bb2c70ebc03b7dd81a8762a6ac6ab

    SHA256

    75c6584dd43ee7b57c2300573a6a11280eab0a5fc914cc0a6287cb67e7375af3

    SHA512

    b37e73d07e20a4cdf913b772f4cf53b55f049870acba12f47bb9ee30cd4e565f1b94e6e67de94fdb7239210a77ef1e69b07214f59201622e7537e309153e4eda

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    1KB

    MD5

    7379221bed69b9393c071b06a9d9c8fa

    SHA1

    0287873f74e0bc066e0543273e7c496634a37a6c

    SHA256

    b975f9634c3f37f3a83137e64e35a0ad5724318633d20c6ee6026b1a3c994e44

    SHA512

    a7d07207aa6013f392f9c23b639dcafc795fb8ff9079a3c7989cde4be72b2f6c07dc87cbe74824462bfa876bf09b08b85118240a05944cb3f7ec6aa7c9e26385

  • memory/2384-144-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2384-136-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB

  • memory/2384-135-0x0000000003220000-0x0000000003280000-memory.dmp

    Filesize

    384KB

  • memory/2384-134-0x0000000001EB0000-0x0000000001EB2000-memory.dmp

    Filesize

    8KB

  • memory/2384-137-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB

  • memory/2384-138-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB

  • memory/2384-139-0x0000000003220000-0x0000000003280000-memory.dmp

    Filesize

    384KB

  • memory/2384-142-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2384-140-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB

  • memory/2384-141-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB