Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 09:21

General

  • Target

    85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe

  • Size

    56KB

  • MD5

    a865cae4f9a553fa100932e8786b80be

  • SHA1

    1c691b07fa9c59c1eb6a993723887a9ac08b301c

  • SHA256

    85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f

  • SHA512

    df149155fc97c72f9401826f614dfb16edbf982b64c6fb3d7302526cd9c4ee8368dcfdc666c1c1fe2a522115176042f135723e9390ed4755fb35b4ebddc263e2

  • SSDEEP

    768:9Wf9/O9lXRyz4M9XyTm/O94NOYXkGQ40d4Wg/i+Pet+F/O9LiAU3UF3333efYZCz:9EmRyz4gOmxNOYXF+yzTPSwjH33wk

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://fileice.com/LINKHERE
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e1f236da18acbc4536b7f303d8afc38

    SHA1

    fc113cffdc047a646c257f94be02996a592ead57

    SHA256

    b9a1709d29531ec0b769d1ddc6b1a90cfc2b267a6b4b2bea82e01616845d3133

    SHA512

    0a44d11065e4092cae3f1739dad18a9c29eee14d7b2143e89b5bcfef9540b81b40b4db072714982871fc90174662e727c47729c2cd50b851d65c8754b82f32b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf4c4b31d4ee3eb0f8980991edf994c8

    SHA1

    06dd1ffaad8b67f9ec14910eb0e2b4cf04ef2989

    SHA256

    3bc7bfb3573c3f33eec70c4709c4e24b933769687b27cc7c6590cb25999543bd

    SHA512

    f617e2e0c24f4e88e7c7ca2be900d671b8897d4e31e1acd87f65c3db6a405c9e765e6d33644ef222a6211fc0c062c83a82252785ddb1b9b650004617ccc5f0de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11dcb842dbcb8f0f71c646f83dc43b95

    SHA1

    32131b93dceda16c265c26a9d7ce03253c849be7

    SHA256

    004cf90d930de0fde01697fcb812fc8b6344a10c6b3aacb2aaa779e162c54afd

    SHA512

    cc4cc60e9bb0ab33fce5e8a6e607b41523d0809e6289ac8320a42fd67c56250be9f8407fe068d390aca62264ba1d02016ccbaf8cb0dcdb3459632075f1606400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7731722d0b045abc2538fb3d945c12c

    SHA1

    1301622cd551f33ef52d4f2f0a944f1534ca28ff

    SHA256

    17e92f97dfdba15ab8c62359dc45da173782ca6f51a9da0624235ef7a24d2166

    SHA512

    c2171e37a0413fba5ecbd7021f7ce1fe93c2a331caa4247527cf7cc898b5a8b2fd60107b16437d22de213edba9c65ecc3ce14dcb91d8efa1e139c6610c6cd5e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    707a6ebb68f41da9f38726dfbab2a764

    SHA1

    88dc722d525466f3ca8ba2ed07de39129a64b973

    SHA256

    f3f28c7f77797983479be258a01709f56c2587932e10b3c56be17dc2240c7150

    SHA512

    23914bb41597f3f4db55d22d9f6fc9da11f42697e3e7bbaf446584102c8801057baf624a379fccf4b9211f71c66ab0e488bea83269ff1a26bd967aab857e167a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62f35e72c945b7201c7abf72c03fa4d9

    SHA1

    f681612239b3095fd137f9187f7f50e408cb81ed

    SHA256

    54568149b01b2264c0f8570ae2c4b2f6d4c4427a4f76434645b321328ceed8c8

    SHA512

    eebb5f78a279d9634e5a975ff4e6e3a6d85984f8a65d0cd8c33bf19e30c78750fbb3883b34e69beb0957c8c3eb4ca086f048d9b4f5aa41f8b6df8b496873ce28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a81446e653e64eb9d7132a78e3cf0e3c

    SHA1

    2cf7b0a96a7cd0d8e58dfa5def05bb9176d12562

    SHA256

    1e9f88b937441e4ca977fb087382a79905e9a6d03a0e27eeea827de8694de749

    SHA512

    d7e29d87eca59f83ac627f27f49907543e146fc7dfec58f28cb26995842727e02ad5dcc6efd1d3dcf376d758bf1555323bfc820668ef7e2f10edf9ff4d0f35b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a15ec24d017ebfb58afc98e52d2717f

    SHA1

    1fbe0a1172e1bea43f057c18b6eb744dd78fed8d

    SHA256

    896dd8ca483ca464f16e1d31eba0fb2b2b6d69ef4f92a7f9de179c5dc8a4b89b

    SHA512

    78ddc352738544ea8a8f3b32f9bbf925332f2022f67599fae3eaeefda626086547b720e305779ef47e9014973127e751d79babe9ca09cfcc6225cc2e6161f92a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a64aadf738e5a18d6c34b6a3675cc645

    SHA1

    8402afb4d3402c99a71c91cfbfecea1edb704d7c

    SHA256

    741ed5cf8b2f6f84b5f9c9d972068b84d652062ed1e3fafe39b9f405329381ee

    SHA512

    0a3b57ce849d7e602e25ba1df7f1a6f7fb824204b9c368194137083a017ff7e182d055fe550e2040a4bb6d285da539e5200f6f195b0b3611d84b9b27f34ec740

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    184a46485997938aa691623c4ccd225a

    SHA1

    93d7dede36cf0aaaf562f21624866595113b12f0

    SHA256

    f5b7caf66d03fef3ea23e4f0c307cfa8dd284144e76abb1fb87fc83f481a76c2

    SHA512

    e99c6e95906f7f38240e5a07a80b659d440b5311caafd4f087369fb307cdf9d86699a132ab47fcd6d871fd7ef489eb973ead8a2d58df3b9494da4d0486864713

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51db64325c1eddcefc0574cc303ea7b5

    SHA1

    30e47edf935b154f3ec293364dce1d636e393c77

    SHA256

    a6e67952d9da5335ac6f94a65b40bc91acc32d767081c52595a8ae31e7ff70cd

    SHA512

    bab950e5b54fb96ed5e63b61857024696cfde3ad257b8e1a22c778e5e4df97edf74cc02e98f4d728ca4f28c603467655ab5b2a3bcf3a0d44cfcae4953ad2c839

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    814e48920a9d70e665cae99cfc28030e

    SHA1

    f289d3a20da07a049bf294e634ac7ce9bf85bffe

    SHA256

    3a1953f3c2ef8e9034ed61e33c309fdf1432d3c2bac043127aad12325e3e86dd

    SHA512

    5c2f35349b3469bcc8b956baf7c104438fb3d8000aea5c4ddffa7e60772b789970bd3b09bbe148838d8d69b8ce02b2dc0d8c7c07bc16b094b27a386a00b9e38a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d59a99ac8ca9da54d3a86048b218cf3

    SHA1

    d4d435c8774e1b5bc9c464e6c9531f1485e0be3c

    SHA256

    449e1de0b1a93f192dc1fdcacd2ca63b1c85326b7123eec719820ff317ec90e7

    SHA512

    60d25a0cb8ddd6ebefbe5371be8a31574b26f579fd2143597d2be3af6da52fa3aa2b47e318301a229243b587912fbf2e8986ff20ba834f7b5fae56eab4a8dedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2326466d17904de512522020689d0ea7

    SHA1

    f583c2efa193db4a6f711d32884176c435e9fd5f

    SHA256

    fc0d8927a8d6a2e7d6de59e3da741a741f46d9b3805bc6bfe3b9b8d641757055

    SHA512

    2db744f26e577bd95a7725c35dd6cefe9bdf9e84a9846d99e70b1d9d88ab98bc6c7acb9d66da7e364a73d9f403cc9bc4e53fd96def0faacd68bb70789f6b8c2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5c6004c26f896b19f0ccbaabf673362

    SHA1

    c2dbd5ea7dec04fcb3e66f9df6aad0b735f443aa

    SHA256

    0cbde48db0f4c52fb9f6577bb8afd7506f1c2ccf7560886b6f6ab2f084b8a749

    SHA512

    bca53605ca286ca1d2d303eccb706f29483184ecf5629d378fea36ebe725e118b765a79aa703278d90285a0326cb009be447abe746a506cfce3fb007cb9eb3cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec5185791daa5512f676b3f40a7ea587

    SHA1

    e06ad40bafa76ab081eb87747f0e566f35a73f82

    SHA256

    49358c74457132277d36fab1d371b328cf03e17031c6869ea24fc910f1bd96cb

    SHA512

    e8c2b0c598ad81a549407ff087d29daffadbb1fa6decdd723aa4af7c8608c465cfe5cfe1c4b907d7165313bc088914376d0446aad2403025bf10d5d46054c56c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a0056f89cf62b0029a2cfdfb333c3b7

    SHA1

    d2230330a3a5b0fa380d3cd30b26993cd70e1781

    SHA256

    45721319721453c860036634b465cf01cc44bfdbd3abc5938774e170dd53c830

    SHA512

    0e41d00646095542878990558bbee66a1da7cac6889c05d599e23bff3d5369eaaf5567b0c1f4ca18857e2df0c6ce089f1c7dac766b5093ec86e3f07433561536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2324192ad5e1e30559cd7834f8b8609

    SHA1

    28a7ea1559e404eebaf0373d4c385d2bfc0bf6e6

    SHA256

    b9f4fa2e931e05dcc4757fd8d584838960e895579108b03caa155aee12928c12

    SHA512

    b35e0b71c95446726366bcc6b9d84061d564b5550d07f29779786acc8992ae3eef0eb6720e4e9b23d809971ab0407fb9290f11040ba9658b645b7f2a45d52894

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    844ae6c5150c880a01809167434550a1

    SHA1

    643882c30ba5067b669df75836ff1cf210f8270f

    SHA256

    a517622e8e4fb0f670f00b9d11fe57680d7ca8f03fb88fa79da93a66c6656b18

    SHA512

    7381c81a29185ff1e9b72dee26f03a89bc0237adee0c8a52c1a06caf02e566c8a6903dcc6093f277fe845a882799e94c9fda3b8a76c5d05b989a835027380416

  • C:\Users\Admin\AppData\Local\Temp\CabB6D4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB792.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2192-6-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-0-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

    Filesize

    4KB

  • memory/2192-1-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-2-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-3-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-4-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-5-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

    Filesize

    4KB

  • memory/2192-7-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-8-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB