Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 18:51

General

  • Target

    SAM X CHEAT crack1.exe

  • Size

    3.6MB

  • MD5

    38023663c5bba5e8d46cee0612e57a51

  • SHA1

    fd21a4aafa31ee8ebd851590e0ec79f7996725ac

  • SHA256

    a02b92ae36ca6fdc300a95a3e29d5a824f2f12a91e0bb6a6f499808ac12c816c

  • SHA512

    c8ab8e304d5e224153d8c7822646e9127520929cec32f655b69ea299540e6d824b9b7e57e6dc3c17ce97d6aaf71cda6dd499f9c7f6e59237276f5832a13573f1

  • SSDEEP

    98304:E+woaBHtFIT4bNJFY3Oqtbh+KH4kpc+DX/0Huhd:E+nAbjBHYcKYODtd

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SAM X CHEAT crack1.exe
    "C:\Users\Admin\AppData\Local\Temp\SAM X CHEAT crack1.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/BNXa5rYFXM
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    4023c3b3e64cc65bda01858f5840fc1c

    SHA1

    edbcb11197c3fc52794819707f3bdf3419fad9cf

    SHA256

    5d8f5f2413550bf1e60c8f89cd477781ea0fca8c98fc320fab90aeeb9616b0ba

    SHA512

    6a1b8babc2b24c3f1752bc96f1f27d10416923f58f2f93b92db36ee77ab3738de77a1ed8e1dd74dd5bc261be24655d8c51e02767d376f5f93714c78444587d73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaf926eaf7301d407757a876fc8a3d37

    SHA1

    996fd66a2eaa2d62afd6f822d6506c27ddb25c16

    SHA256

    4382d57683be1e617fae42e2134c13f6d37ee2256dd644a71de8b678ef1853d6

    SHA512

    8fb6ca141f8f1ba46b48a7e6107afe996b431700b4ef916c46ea2e12d9582f2f535c0a98e573c577951e0be67decc1a68a71df7267ff7c4ea84267b947815390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbe2ca1590474100a7c8c195c74cf111

    SHA1

    a27e55ccdcd3fb3f87df64c945cc7ecbb91554a3

    SHA256

    8566edd3838bbe870598157447a145a6005c03afc24c7fa9c171f608769b6ddc

    SHA512

    d07ebb90a774156bc8408d6542fec5075df53cd59d9131bb6aa942dbaa2839e80ddb7a7a42ad3ff3eafb15cb132a19907970d44781a43498c79239e6bb6d7f52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2561d9710c403260408f3b7192234319

    SHA1

    29b607182f74c3a8f3a2ce5a2ec7f3895ded6d8e

    SHA256

    dca8a096ac28822ea466b95d31a9b5fb3efe1c0f0165120caa9b763cd92926fe

    SHA512

    908e7f465afb3b099dea063b4b58dc5c30901f84965c31c54e1d22264c190df06196c100f6c3dcae5b2bdac7522208c1657b85d1aa37d61ea8fdbc8193d89249

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    680c2865f789688f5d65d3966a43feb3

    SHA1

    5d427021671b310691f491ff1d8048ce9226e512

    SHA256

    da3712c183aacf1ca4cc19f9b10780f242b1348a6dac0885c69bddd4393038c0

    SHA512

    7bb700a9cf685b4b251b0815c72983fc879e242bea66bbc080da53c1ff5212605ac7042a1c9b3a59c913dfd306d43e3d0d38ecea22f1aa06830dffbe772a70d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6476485687cfeb87596331432ccacb6f

    SHA1

    5c2adfd6ff59b7034d566e76e5d4d8e9c85cb2fc

    SHA256

    392a0eb94363050e050eddc85d0d5e8282345d2c259a113933478987ead7eea7

    SHA512

    235688b00207653c9f465612fe2b00782e008374d3fb0158b916f9256e19a1ad3075730b209ff03b3433cb81ec87a207d335f2ac572a3c436090ffe680e01f51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f4bd1cc4deb60d8e41b30bfc2b21a06

    SHA1

    0084d3adc359fb0284f1aae9c693d86987b4c6d0

    SHA256

    a88100d0a7136e26eb4f2c8a4359395ca5fc5b37edf45e6870c9eed2dc310806

    SHA512

    b03e244b3eb0dae73b264bffd5661fcb9fe11273d3ccac8b3e6b89436cde860c7685e00e5871ec78bca9c14d78a06fe302f26f09ccbbfc0e722fe70d76aee86e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    257390f5dfe9f2022e2bd1cc5b87eef4

    SHA1

    ffd72c2e7bd65dbcdf5b4304ec269ee2245d1499

    SHA256

    be064609cd5c897cab608d26e6982fd9321c504e14f7429aad28828b3005fbc2

    SHA512

    10fdf482caee1eae761facbefd99a26ec63d4d5942ce116f7b28b6295f09288c7f067d6cd19e625358007e4a7d7f81dd6854823af9ac26cf08455ade75eb3676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e529d606dfbeb5af842d8c43b35cda37

    SHA1

    d726b10cfeddce4da78ae7086ab4c5e0bb178126

    SHA256

    0ea287a338161f318572ecbd62ea01babf0f70a80404b7739a637dc602945656

    SHA512

    bd2e0b2e305a1e7f26b3039d795bbd23f6ed70131a3b61ee1ea34fcff759ebb7fa5f9e21b44de2f04ecbe59a5809121b227caeca731c759dcf5c09a43fe18811

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60b4e3ac60094c42d62c3a04cd3aa63d

    SHA1

    5c630db25f2f18c34b5009fb1ae39d5ac0c75944

    SHA256

    6f34f21d1d49b642199729a1bd95619937f85f1d22cbfc2807e95a18467f74c5

    SHA512

    f51a8000aa0eef92d13291689c611ebed8cc911619d61d88441ceca8e98b3c88eadfd77dd5067cd2d9d05e60d9f1e01eba2f208ca71cfb622dd0ad7d23c80ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b526ae4f31714e5dde71cc0cad6ccc4

    SHA1

    39a234a8e64aff819527329d3e6922726c3ef363

    SHA256

    e9dea0a4d5dc146804b9d2d6dc3de1d14a41a6406a0501dc548b6fa37e58bf32

    SHA512

    422022012579f0e8a59c237b27e259c22470b89159466885c60e46167714b93eaf85cf08cb13e9deed8c296d42570ae957be59bedf6f517227503c6e068481e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    043ff4adfde506919dcf8cd5dd25070f

    SHA1

    d954c9c5e0dadac2e03e6468e7abb1e917dbabce

    SHA256

    41a7ba7f3d8f3734e7be7f07aaebb0f744ead426170fd76babdbbde028742445

    SHA512

    3900c3d5fef27fe707c3d9876e22752388f600b905fc27cc99a86cc10f5b3dac4e2a88d0e6b9bc7fd230fa954b4a79808d8afce6088085845beaec3586962b2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d463feaed329329a8c6dedc4b43a739

    SHA1

    eea65becd3b67e16495d11a67253c9d08c6e42e4

    SHA256

    eba60d1ad4ba41620217aa4cee18baf58342abaab238f57074847bb1afe6ba85

    SHA512

    29c313c8478590578488dfb716e810e86d384d79936c88c83edd9d74e60bbdf1a3cfdaf5938a5feb1dfbbf96899ec0d676c936acc5b25a10d12d153102b2ee69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c26ea6cc67fc679b3ca85686ccc3fdca

    SHA1

    e23028ceeccd3973fcb4aa858f6799ec66d730a2

    SHA256

    aa04113c0239e76f54e3bb21d574aa56ab0ca2b478aa27bb9b42dfc54216b796

    SHA512

    148d3b475c7eeabc9d7d7fe8acf66812ea18d8fd1ac265477b9cf903b561f4e441eed46ce14a6d8c2b4dbaf56ab570af846defda17a61f3d5d4ae8fc22fe80b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba55ce1ca3d497c66df130a9eb780674

    SHA1

    a04aa8ab10333b80e2681d231e1fae0ac9e24da8

    SHA256

    5be91c35b7f7613731c2a0cd68497285ab537d26b4a881d83196f30c4f5bee50

    SHA512

    6d0296f0911604f8b271f3b61cb428dae3e1eb5af87163f535d907d17c4469a053f4f025a6a524b3d11092ed8028b379ea4f0262c638e6e49055b011b5e26bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    249f13b4587fb7283d348459c1903788

    SHA1

    f65c1f7d709214099eed9878528cdf2fda5b1d5e

    SHA256

    c608efd47a36cb598a8359d2b35aa453e8243182c54df28b30ee28eeaaba7f57

    SHA512

    15a21745bb460d0974d8b7245ec197be4c8935b9808de5e9c1e8a39bdc369750b3589c805f0e1d92e78682aed6f50f364ab8c025c8637a2cca900a4b4feebc71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfde749625f96fa4398ea1d1308a0a2f

    SHA1

    cfbd6bef574b8b0ee550382c0f49bcf592c3c9ae

    SHA256

    5b509a5ac590f955c167a4d2782bc4aba2c30aa26dcc19930fbb3b4b553c08e5

    SHA512

    7e0c547f64171301a5847a307375d7a3d0ae1da89e7c55d6bcd974b2cdfd30b11f051f63f840266027405cdc2c7b11e390f666ecec02c52820d564362cd9dd57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3da62b22a1ff460c9c77ce1eecd668dd

    SHA1

    44a5c847611e71b16adabe74aeeee858ca2bba58

    SHA256

    2ddec658d26c80a7c534744251403f9bf3afe593d8b18f10054758cca4690a11

    SHA512

    c2858ccd3199468d45348f4ab7b9e03af07e45d85eb08784b962b67be7fb00b831c2cf55361fbe7f73b23e0eb82ad3f21f94d329e71cbd5d433f17a0a2112f7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ec42cac88461aca51c69b7583d05f69

    SHA1

    806236fb34d71b90a2f8eccc33be2aaa7c672261

    SHA256

    43a25ccdd055fc6dd7df335e38a3a9e278899427ba498bad5eef7758c2bf9a1c

    SHA512

    54f25b1a63f8109501c3c1c09565bb26993c98f59908a812a792f137381260dcfe9f33ff6c00dcd77d7b814be40fb87ea00888901c869388a3b4e53737e58ca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    579f7b72893a7dff47469a266a6085ed

    SHA1

    66644f01735604c827f0809b5b0689f098212e8a

    SHA256

    fd22455692eebafa0f81ead8d3637215a89e9462bbf014249c7cc019b80bb0b4

    SHA512

    fb5d5e865ee333cc06337aa000136b9e97edc82a369b53fea79fc0391efad932571aeda897ddbe7d3dc61db8c9b7cf991448364e3b44639732e58a48aee4ea75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d06f71a848a98ce954ead5a8990cbae

    SHA1

    9842aae242cbefe937e194660f46e33b47c6b26a

    SHA256

    78bc2033172b3a0f105cf143ea89279436700b3702bc3dd27c1b3f32be7afaae

    SHA512

    33a3d22a51d85564e1e5817b995d520acbaaad53a98790ccbcb5d25ae967ea8f9f3f58a060f4caf1fdc29600d3c6a2a6a4b114310d555dcc73cbf5f177a1f088

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4ac2d8293b510bddfc16eb4b834d02d

    SHA1

    b727c88c394c1bb2ac2acbd01b7898cf9400dc1a

    SHA256

    31c59d83b9f5cb78d9098aa1e6cbf674734d2e6f03912f25ac9016de6a04263a

    SHA512

    2ce5656d7917059f51934707b873ebc15bdc768d761fce0ba308e1a878d32d128b4c5b86f22c6d79bfe962a1d9b652418485e3b0d1e30768a4c519cef19dfc93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5a2e89bbd4a0f6afd3badd72acfcec2c

    SHA1

    ffa35d6f8ec2d66570c38a21b85545e4d93f5126

    SHA256

    816a333dce195fe2e8c816dc7ee4558fffb8351e310885e63f945d0daf5ddc31

    SHA512

    54e7a5f76264a9b123e797271120de6e37cc020515c5a14ac664c8a06778c08c93a82417d108aa75ccf739f08110f8fb99a5a4c254304aefb88755ae57455255

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z8d0nzh\imagestore.dat

    Filesize

    24KB

    MD5

    8c3f4d467a1caf59c667d102592dbebc

    SHA1

    69e3eddd4c112f5dc7778dfae9c3124d32cb88cb

    SHA256

    991c301aff6e253a357dc5110acf200d8a7ddea172934b7ec2d6a29d3174e589

    SHA512

    b8c0301a3d32fc9d6c5f011aa9d7706e4ac9a27cfdb4d4faec4c42f8d198ad742e44fe42cdcb0c55893dfe1c0c52ec96751456bd76c0c337369e783fac6ca135

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VUUZQMCA\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab9EFE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9F01.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2836-9-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-0-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2836-3-0x0000000000520000-0x000000000053A000-memory.dmp

    Filesize

    104KB

  • memory/2836-2-0x0000000000510000-0x0000000000522000-memory.dmp

    Filesize

    72KB

  • memory/2836-1-0x00000000000F0000-0x0000000000482000-memory.dmp

    Filesize

    3.6MB

  • memory/2836-4-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-5-0x000000001C850000-0x000000001CA64000-memory.dmp

    Filesize

    2.1MB

  • memory/2836-6-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-7-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-8-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2836-122-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB