Resubmissions

22-11-2024 22:54

241122-2vh7gaxmfl 10

22-11-2024 03:27

241122-dzqkcatmht 10

22-11-2024 03:16

241122-dsgc4atlgs 10

Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 03:27

General

  • Target

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe

  • Size

    218KB

  • MD5

    35f68acc0c3d5761a61975ec77b49cbc

  • SHA1

    f6d03e713bc9b47265141d9f9b83ae634d43d204

  • SHA256

    aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1

  • SHA512

    6a9d131e7c4f310ec77cf3c9c07c75dca279b7ffd6c46b252c559947900f1d754400fc51ce12b8afde86a0fd758e1b68d00a2e5f9144ad019d51bff5c67a4656

  • SSDEEP

    3072:HfVD9B1hzRAjEdJNCQ4woDZD57Wr3FKajQNR9MiYbuWjqgdcnfKvdHmN5b3SM:/jlVEEbNtoPajxu85cfAG3

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1244
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x518 0x33c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3364
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:468
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    55e40aa7a274d26f0bb8e2117239d1bd

    SHA1

    3174d1748da1dea0226e5b485400c5a139b6dd9f

    SHA256

    1d11d5b7b9240006ea7860d39703d111fefaae92f3c67259f0c743417e634a8e

    SHA512

    4b6de1f6ed69e04740b16428e984e1476c0e3ebb37ab8893454a1c271c2fce65fb5c4a355f1db0eb00560a6f951ee8102fb9629abfff5fd1ab363ef53cd2253d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    35f9d64e8b1ab1ca4af015c690ee83a4

    SHA1

    410bceb09741e78c8495159049f3c3db7c108d60

    SHA256

    d4bd73641efb16f4dc9039adb0f2b9cc353b13156f181441c4f0f5decb49c72c

    SHA512

    9c7b2dd90c8d3f6e4ee09c586c640e4b55ef284b2e41c2fdb979eb240be9ddfe081ce679ed49cdd490e1d75ecfc211776465ca2f32b4864a58199386e0d24656

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M6JHG9EK\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    41aa7c77149db4f974c02770a426dc92

    SHA1

    16c28b76b0550feb89f9bf8b33ea942eb3ac93f8

    SHA256

    81ebf38cec13407a05e7ddaee5f339eda3ff16126d726c156fe0c21071021efe

    SHA512

    74f5569ec42dc70311a6c81f19534a83e85d14674b0c3e7b733eb9600e4078dcbc7eb812f6c0973a7d9bc03199ddc19e4f609c59a02da2f84cfa0bb2e6fd8b79

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    7ad20675dc8079158d20a3081712d2bc

    SHA1

    9e4ca69179fdc88d8d9e5a86c1bc1d8a32049922

    SHA256

    5ab3179e5453f4320ac0905e90aaf44a62cf0f2aae1469708cd6dbb9daa22008

    SHA512

    6310be3b13e8533ea017e80dc7feb12a37b0cb5031d0ada78bcf6e63beb4ea51851c08bf95311017c0348e170d94087ba9cd7a2c298e38f553b88fe6f07d2a21

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    7e76291e92159e438150c96c483ef6f7

    SHA1

    6e9d2ecd81eb344504b2b2469532445967dbfa70

    SHA256

    02d8995b772cff7ae5843f7a0f09ff369cbfafdaebb54a3023c3c511a589f196

    SHA512

    d3cbcb9b4647a276a14e7771bbf1057ee2cb4786da9b7bc7907389279795bb4abf2277527babe2bbae8770f76b5c902af2c57013984b7db27d44e4674e925131

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    9f85d5bdeacf57df5bbaf399711ab68d

    SHA1

    59211d1a5e4dd510e6774f5690dd94cf7b3bb884

    SHA256

    a34ae7dd22334f3c972cb97ee31b9d593ace65ca84ac177f88f25b842a780d17

    SHA512

    c20ab15b04f5982d6ffd26cc1c67fd0a6c17f83163cad5b41ed650a7eeb9eed915eb6361ef4f44a6c279324fa416c062ea2f6de81b48891f9189717fb08e77ad

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    ad1d715ee1bca800ae7d54f85ecec75d

    SHA1

    221a8debf1e4eca2c8a820bc427eaf36f63786b1

    SHA256

    57933d753b9309c07c63194eac8e363189da3fffc57dd5453ed474d338acf178

    SHA512

    2d51581439fb7c12ae2383b308002d4f32e494cbcc62ceb12db49c238518c4ea1d8da4ca667971f2e233f5cdc50e1a8f076a5def51d96e2df18e166e185bde9f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    049f4849240ae78db7a5fc25e181c818

    SHA1

    b4b99c5ddf701ca3bdb789134569f2d378d032bf

    SHA256

    84d662dba36193619da408bcce39ff7efc6c288b4fd5490023750062328051da

    SHA512

    289d8b5b10286160531917f960d20f86d8f509a6268cc36921b98927462c3f0748c01ebe8c09c8fe602c7cb00be5e6446c6419e17f0295e45afdab41c30a429d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    01467e34c9d70d0dfa204896605291ec

    SHA1

    42f927eeb689b511253a6cd855505d2b2e3b56ea

    SHA256

    e63450c45b3ef09b7928d99061e969b0223a00c0c7e6c4cf03b5b124e92bc748

    SHA512

    5fb12cff55ecf3c626afc6a9be693fba4b222f753f18395e117756f56588f3b74564fa2fb26748161df0dd845ca5eaab3f31b8385e34341329a5d86197b0d0f5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    1KB

    MD5

    399e1863e3a84fff50b203ab7fe14634

    SHA1

    638c47ac8538c705ea90af8483b5f9aa3aacb71f

    SHA256

    9c65cda8f7840c079e92cac432a0990b7e6bcbcf3f90cb5d911b6202ffb7e8a4

    SHA512

    19d6cb4d3b67973db5cb41251953751588bacfe57d942d5eab66ba9fba716b689bb7a784a4fc0d6322d43e334f870d0674d10fa62489029ef1e898a0a5432d81

  • memory/1244-134-0x0000000002780000-0x00000000027E0000-memory.dmp

    Filesize

    384KB

  • memory/1244-138-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1244-140-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

    Filesize

    4KB

  • memory/1244-141-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1244-137-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

    Filesize

    4KB

  • memory/1244-136-0x0000000002780000-0x00000000027E0000-memory.dmp

    Filesize

    384KB

  • memory/1244-135-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

    Filesize

    4KB