Analysis

  • max time kernel
    140s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:48

General

  • Target

    xxx_video (2).exe

  • Size

    608KB

  • MD5

    2bcae695288cd75a2d71c0dbb69359fd

  • SHA1

    6a0476b62c069d42a2d8290b7d467d8a136312e7

  • SHA256

    d51d08aef8661780261241ddb5bb2617b1fafa1ac1cdcad77e825c16faf48c79

  • SHA512

    a28d5299addd39b0905745889cc478549c295ba9a19d49b1b0fe723840c298d0793203627ea5852e91ed2efc6684d2cf7362ff2958e52eb30c859cab497b0e96

  • SSDEEP

    12288:ao7VLRpB3hC/K+wAN0PdyT9ElIdq5uMumzu5FEiXqv3RZF8N4E:9P5zZI43

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xxx_video (2).exe
    "C:\Users\Admin\AppData\Local\Temp\xxx_video (2).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SonPw.exe.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SonPw.exe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://pornozud.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2862c0a783ab7df080ad742a1f97ea7e

    SHA1

    987325ad07362dcda94f928681952f1f10183f6d

    SHA256

    fa3f3e265f2e860f93be55c46f4ca06a45469d367f64c8bedeaa53b76a0d9c1a

    SHA512

    1c390518ff8bad5821b86a2042c7c9428d4c4c17fd02dce5d25c82e6d0881987e1657d34911909d63232825fe1cc35b4463cfd64fa7c6e8fa5b0896ff1df4e7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95e050a07d6b9c2e500e0e6c1207c409

    SHA1

    eeec3eafbc4ad2b9c41e0dabf3d3bccb0a8574b7

    SHA256

    26dc5bc7cc345e064214a12b216de1cb6f8b192a0236919cea56da6504422992

    SHA512

    4b53c8f99f07a6efcb2bad43675f98a76657148865003ed8bca35e5d9b0c4fd34b1a69dfdd9d4f5a299bcb47274db7f43b7c433a4c2786064d6f39fd8d82e4e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f974572cfb4cadf4bc3df9911e296b9e

    SHA1

    be053954aabb3207cb2e6caa799745306903b542

    SHA256

    2d6c99a1309577e5a34ceae639495eaa37c300d9407924d2d19e6bb7dec15c12

    SHA512

    49c8c32ff3c3b21ff00fe9b6dbeb7eb4ac88761b207872af889e97b42ebda74c95f331d95d4d721ae2086488598c152973b0498b7f253288ecf69d5134c619b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edf43c40067497970ad6c08ec4e4348f

    SHA1

    cd00dfe4eeca1f621c71f8061604b7f1fc878930

    SHA256

    563479e1e0f469cec700fae208f0e0a075a24d48c7484b06c32124b83ac2c6a5

    SHA512

    5cae156eb5025ca73d08b624a718d7e7a9c3f0871bfac9a9089b82139c5e5beafc05aecef0783538f6c4c5bdf2d83db8a47dbcaac2ce7ecd0e9f239b6deb4e9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2ffbdc1e0196721cf9e17debde5a4f7

    SHA1

    cea29badb29ab50f7bf79854506520830be9c636

    SHA256

    e8befc24e3e206064590a2cc5fd3768033aa19c26d11da031c7ccd12767fc72d

    SHA512

    2c089b689c62fa507ea7637094ad988f88991d7b5d43b8a06738a74c3de57f512398aad5291bdd7793c6dfe7341faffca34efb42a871d4dbaf1e2a1165402f30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ebb3473f0bf6e7cef9d353a3dae6e82

    SHA1

    45f02b6cb34042b3df7db28f5cd2a13e47e225a1

    SHA256

    c375429ec7686f81c4acd263bf79fccee583464b0cfea3d71efbc260f9d2bcaa

    SHA512

    cc71b656bf8fa8f3518408e34e27547d118dd266656bdc648ae88ad6f10e039e0980b5a1abfe6368e017847732462b6eb47aa7769c02fd473ec089b67fc8b2d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe69d50eb8458d5b287d2260e76948f3

    SHA1

    cb0ff4c3700ef24c65f17df5fa9283e138bc532f

    SHA256

    1548b16553803a70bf1b1c3ac450698ba6c9cf44e528dc8aac2be0adddfa0a77

    SHA512

    280ddc009d81f3d908384b938e1422ebe83d42949a1777d38171711e825aca6b424c5f09e37c613a081e20261a4c1fd42b9f7819a25059d4e4a0020d52fb6701

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b15cf4842b601171aafa670691029a0

    SHA1

    083428a9cc9002e7ccdc56182dc364efc67d2997

    SHA256

    eb7bf522b36aae8f19449150edced0b11d9aa98745c5c7461770c7e833d0914b

    SHA512

    88868dd1eea92f74414326a713b0c5e1890f88a19c774062be35557de1d46ee81a128eb22e3ce7f144cf3d2b8457ad6c6bd289dad00a61e3ee229d85f7b4ce09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e031a089e6a406042a402e135f2982b6

    SHA1

    52722b7df65e6a287d72d6de973e947f91568a33

    SHA256

    21b9e211bfa49b9d4082094491f1862d93ce1d59f162c9adc20a9a195323f225

    SHA512

    9323a0d73d4973693af28eff07b1b0af84af55b3ae435c11a79cb55e956c980f9afbcf5d8980f5235f956a5fd00398071202788b9abd75f71f656426a6b4c02a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    336a75ff4cecf060e94b1528a11fe979

    SHA1

    2b4e781a85fbe259a1a3aa70e40f839b01a7d262

    SHA256

    ec41adcad1433eb5162b2b985c1b5639db49e4c03830e2f06b0b31cdb511c93e

    SHA512

    3b1d668e7b8db5f3d82bdc7795baea52f2c2e1ab07f62cff68dc9e497c1d089cde15dc5ff857f087d422bc67efcc1478848a8a4deef8ba4a777e56b5e49595c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee8b2d93de1bc80d44db632a8f758dd7

    SHA1

    cf7a5afe20d85230c25b63359582f04e2f5de63e

    SHA256

    1cb787a9b584bbd1153147b897211886841d504e8f243f583f865a080029e4e7

    SHA512

    fe3ab30fa8e836cbc4d631d9e4e484ee7fbed8941f02674bc7ce019e2bb72ffb5ec1f88244cdf1c39af04186df9dbd252406db565c6adbea29fa4ac3ada514e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82d05c70834cb2437ed5320eed16c708

    SHA1

    c986a474f6b038da011992c06cf0ecbf8527d0f5

    SHA256

    71ea8e777adddcdce58e788d98e454b1d1d4ea8126127bed187e1836189de697

    SHA512

    ae118e937b81bf64b1d273f97903e86f3c08e0316f706e46db469d47adbe310a4f1219ff8d64ef3dbe97a2aaa21a196d3669e01fcb55d28b34aa8894f6d3c3ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9269cde6fc0426c8085b71c436e08b4b

    SHA1

    086f550fd2b3af4695d54226b545fd506e8b6080

    SHA256

    575c849bac989e4d876b22fa88f87f19e8a4f3d25709bb7b69d96d8d193598c8

    SHA512

    3d119fabea712ca4adfd2bb4eff4dae3b01a99e302152d88602f8c5f6f88162d064be8665867805628e761b50592755579ffe272fafdba848282a5a796fcb1ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6be072cec3ae7c50c7635270e79bf4fa

    SHA1

    5673749a3c8a1baaea398490acc9c83dae449ef9

    SHA256

    f864b9e50c4c37d0c16f0948e0f7ea6399270a7ed1387c945aa2851a3bca3641

    SHA512

    c9e2e4877831d98c6ed97538c23226858d5b694c709d41394ee3bee3e3a7958f6f394ad08c0b487fa54a337247f0cec49c884fa32b8c0e81178b0847d85210d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3333cfb21926c1df79015dff242d8e5c

    SHA1

    12132a9a6acbe37a35a60b2cf7d229a98f90e037

    SHA256

    a20dd945decdd3894f87c65b49d229227341cf87b620024273889f0936052d6c

    SHA512

    1066ef7a6d64807f3e09f78c5e0fbdf3214222dfe2adccf4c4a9f63c4c8083b58011628e6e185201aaa215efc8169da29c956d7012241aba90436a7c467ad10d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd9bdff25b8c831ad10f7b987c3f5dee

    SHA1

    098059d621da47d0038ec00ed19d10dcfab3a5ff

    SHA256

    fbf0ab94046713b4ead131225ed5cce05a5898b12d451d80180fe0f60de7ae82

    SHA512

    fe03611d9c9b8f9eaeefec9b154f941d6f20c8159c3a592ad1a8aa435ae3c7dd01dcb62d0e62f23e38822db5b9c97a916b3a539e522fa74f8cab20cd734c3dc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50d8c53b843bcdb112a693d90f2be51c

    SHA1

    488074375d981cb72212bc7a6920289f3e6fc266

    SHA256

    ff687742470547b72e940d658e0d73db31dbc9743bcb22c5c1dd0fda035aed7a

    SHA512

    138fb195976202eb53560e33bd04d7ced51f9398bc25ca7012f2b67ff16c5e5249d70c3f7e196c873c5bd90eacee7c6c221c06d2339a103292dcc411c10a0050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd16ad8a6d1dfda8a46bdca2fe5cf4e4

    SHA1

    65b839f60d40126f46c5be8f8ca5070d6c6e173d

    SHA256

    0915923ae8103bc5689c6496d078912c0ddcbe08fcf7b0917882d9ae7eef34f0

    SHA512

    2b8149aec7c779d617875ca1ece05c4f2c093b76b4ce7f19c20e2764d01536413dd9635dbc42905e13c777a32716dc0031f87ca02e3c82d8508ed9b0940ba499

  • C:\Users\Admin\AppData\Local\Temp\Cab8134.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar81A4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SonPw.exe.exe

    Filesize

    221KB

    MD5

    0281bba49b8475542e9021eb64fbbbb3

    SHA1

    c5a1bce7918e88edcba692c6c54ff9bbd80ce2ed

    SHA256

    9a879fa5427056f857e48b62637b8653d46e29ffad34a5c5c15bf6bfa86bdc6a

    SHA512

    fb28dcd9f0b8d0a3b188510088e68351d09004bfcdd382853ac1052227461ba1ed95350e10db28605d6a8be57a484f7d30737d8f7b97b1c81885d60554c51cd6

  • memory/2156-0-0x000007FEF5BEE000-0x000007FEF5BEF000-memory.dmp

    Filesize

    4KB

  • memory/2156-6-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2712-449-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2712-9-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2712-20-0x0000000001F10000-0x0000000001F20000-memory.dmp

    Filesize

    64KB

  • memory/2712-8-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2712-7-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2712-12-0x0000000001F10000-0x0000000001F20000-memory.dmp

    Filesize

    64KB

  • memory/2712-17-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2712-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2712-19-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB