Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:13

General

  • Target

    ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe

  • Size

    85KB

  • MD5

    a1f719b70d6459764f3e6cd4fdb17070

  • SHA1

    5b51ae48a3cdeb22b75758b78daafb0b22552934

  • SHA256

    ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9c

  • SHA512

    c7e670d2f0f99244539d468be51e53e21953945816a1c78662d57f3d880d291ffd434931bcd265dfe04d68cf87a0789609a5027965af77b262b13809ef4c70e9

  • SSDEEP

    1536:jSIQGZbD3sPauwMJnYUuy2DqgcQW6zut:3QGR4J5nYUuy2Dq1Azut

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe
    "C:\Users\Admin\AppData\Local\Temp\ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d521dcacb72b7861475a48eef1bf5fbe

    SHA1

    531dc32c0060e2b475ba58a1dc331ba2ec371963

    SHA256

    1f654eedb275a55c9e29667c9457f7b078b046a38be20d1745b69b373cfa7ddf

    SHA512

    eca3e76dccd81f8ea6085137689113a74a5b59b80dce215997f14aebd0192a5e95e2a49b3555efd7865351cc6b304bcfd3d4e1fab1bb903502c468cd6b573306

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a12b8a9015b0d2b5ced1d683719321d

    SHA1

    1989802e97f5b03ef00608d437114d44c9fa7769

    SHA256

    d5c9d000783d0b384b0640dfd9c012fbb25d45b487e07d09e464f5759de2a4db

    SHA512

    3420d68e03906b3eed6e0c47df52b80e06727700f613adfb0534a1579cafac10121db91a224615c2261d6394fc39534935e1b5ac7ca1ec6921fc9524c1d67a73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd84a78cda3c694dd359a4292dfde97e

    SHA1

    276ef4a21b0a46f2a18e9f9bc90437b3854cdabe

    SHA256

    25ccd82dcd8ac78674e5f56a9464ebda054e17c0db12c7161533f7fec147b88c

    SHA512

    9ecdb71cb31ad1d30baf0a66ebaa469ce9d304d72bd393b775631507787cd205445582953b7a0dd766084ee8e0c5f640b6d2735600534676ec2b7d09194de025

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79e80c1be9bcf5ab31c51dc43d82c978

    SHA1

    bcb66536f7c78c2557eb7b527ed432feb5616233

    SHA256

    b23f8ecb8a122e1e4c0be5e4e8a3879d50d479ceb66a194e8005e3f7a1025c15

    SHA512

    7a9be013b7c697adc31cbda3be48c413e67dc92759f49714910a7b016e013657c4a59c8e8890f5b9b410a451b0a773142208b2a7631482d0f28399e023d69767

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a25e92c6cb68dc19fe74aba957765f5c

    SHA1

    d333494e1c138caf4744e04dbcf091191dacc245

    SHA256

    6c2ba9ade3592c3168a1950e1c01d0c741f3442d738ab4b588aa628247937dfd

    SHA512

    77f74f74c2f0abc8d9e3ad6ed6d5bde72b78fbd0160e14d1f9f2c61f82546809727442e82df2ed3a27ca1947f2ad5eefe36f0049a2d75387cfc9e2c1a3b5d9ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df9ccbdcbff82d1588f33c60bec4d4f3

    SHA1

    b98de12cdf0dd9011372cfa39520754aa43a62b0

    SHA256

    e7668679846975f487401f154fcc16f3c44d74960e3b59ed9752246f8cf405b6

    SHA512

    2975df7341e4125d99d64b230e722e37e2dbc8041bf96ee04a968788d0bf7c4af97d8de46383ea68a1ba1b40e89a5886500f1211257320d9dd98c9a020d76517

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    142975bba52c6c68d775d1e2c7cc1a24

    SHA1

    b65fbb65f27c5fb4bafdf00529c2bc85550fdcfb

    SHA256

    e65aaa3a1161d30989debc50e62ac6e4769a0c322a6569bf9a6899443e18f505

    SHA512

    c03fe9844d9207a67aaf27fa5215480cd2635f8afa326456e6d95b07be9c4a5a6b4397959de3d056c0ea3076730336affffe13c3ffe9abbc0494bcf96987ec5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c784fdabe6953c7aba5f1de9bccbf3ff

    SHA1

    55e31d4b46ec1552f1cbb77272956f3f9a4941e1

    SHA256

    50f64fe1e25ed5bd44f3d827fbda5f119921577c43fa06bd612b0ec7c4ee2cd6

    SHA512

    bba245d99254407027d76d4b4bdfb393b947e95086f4db41081d73540ee3486caed32a1f680c0e40ddcdca104aa715f77786ce6eeaade68e409082fa4879bf38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcd0db3d16287eee2b818a16970d96e4

    SHA1

    360a43ca35f8a49313c1ead88f0f80b1ea761a8c

    SHA256

    8ab03cd6577f07bc47dd3994697d71074da36c890af95ae59f43073f26deefd5

    SHA512

    7d1a678191e338dbc3fe39ae9dc390f827683b7bec02d1ffcded0c9b040a06499be0655a72d4e5506f899cd61ee6644ed8db5aca950b3629f356cc0668d94403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    981e3489c4962750800fd4709543a7c9

    SHA1

    eadb0ee7fbee68135e2af1aeed9d5b9fff9e01c3

    SHA256

    a3782ed2b9d720b58afcc45ae17cbc899e91143267b3a6824c315135ba7fa994

    SHA512

    ff772fae86e112361248dc1c18fa3329324db7a553c1b1b30500db0d917c8c2f53afa70c8ba4668c4e7f05f291fb0b1088d48e7e0d8343506e0e22c2d1f817dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc3a83d1703b505585bef6f3b9b931c1

    SHA1

    473e1ea600c00bc048b59719d09182eb3adf33f1

    SHA256

    9757ff7e3f0bd6a7f9fb88b342d08795ac3f440a02d66a82329a0a636db97acf

    SHA512

    7ddac9e61e29519accc7005f66f82befba006c558b0b690479ad6dd41273d280348aeb4282808546e77994058dc1cecd90ea265508dfb28a0c34b9437ec08613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ada63aef17b809de541014d06659d76b

    SHA1

    2c62dd940943dfbf56232f88eeed108d70294433

    SHA256

    0bf4728b1ea9d25c7378b96e538732312d8deda4948b65179e81d2fcc54e6bd7

    SHA512

    3c16c380ee9ad3cc0b8f8cb35e36309eecc1e17aea3c3600eee3422b3d47de22703d25fc89b8b665efa62c4dbe88e14c54718c753e5b779174846d4c477a5fc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bab4556bc492124cc78cd6ef2a72d4f

    SHA1

    e2afce4a6bb8c0748afc4e2dfb45bddbb1a7e398

    SHA256

    d911120b4965ec96041b25491587f34e2cd731f0295bbee5d44f53e5469414f6

    SHA512

    a42134681937695caeb82e48cbc828277526337f1cb7d3ec2a26f7cdddb34f36eb15da2eaa77d442b172de68a3e6408793084c7f8a0398d25a5032e40ba84b34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dec824008f2fd0cf77ddbe15a498258

    SHA1

    b588f0d8f5fc4cb8fb4ccd3f5c38ced2ffb6eacc

    SHA256

    c8dbe3d1b471af3313194d3e5ebc2551b5322d5aa05effbf77a6d31bde0a0985

    SHA512

    18a4b7a76163aedfa362988f8429e1536b784b831c7799ce63db27ed113f6b02d492e78d7d152cfb8e80660aa7f5bff5bf5a70955f9d79d12807e861fde0330c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4bc1297c8739d0b7c2b3177bde5da5d

    SHA1

    0bc90199733a61c7919dbf9b7abd95c3b8844ac6

    SHA256

    f0dd858a52fbe294ec74e515172d368ff3d608b7ffafe0e1cff93eee4198f73d

    SHA512

    cb4440b00c8de6f7137ae0fda5c4f460d0a41930f1d82a3e15e686b4a7cf90b8f344739afd7b045e7623e166a5b8ccd7100cd09c86d3771127ca5e5dbc2bc0fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bc2dd5f55b423e25b9b3955740f8cf2

    SHA1

    44b4d47c6e15898b807a3707e6231038c22f96b1

    SHA256

    ff6878658e6560a03529494d654e00d3ebc0df36434812fe87805adde6af9323

    SHA512

    13ec700e4d8a14e92b7378dcfc3740382af743bd1bc6bf737bb3bf0b875ef3d248bd82f13615c7e13ae89c43011ab99fcb13470a7d4579448c37e054016adbe7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a45207f4634fd80ba7798b48ef5c3e67

    SHA1

    936801fd999444c9fc99e7f1dab9b4dcb3bb2c85

    SHA256

    7cff631bf2b75c11cc1fc34b70c50ebaea73d6b3a5690a2971ceed2ebf9aea84

    SHA512

    f2f3cd7053fd245a1f10063802b872d80a18e6bc5a414a1e0893f89f5dbabe3f09f0058046cd29cbb3243ea633108691d4d4ef8883180a8c103116abf3750038

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5913d53dd9baf55ee9ae2baa2f5f72e5

    SHA1

    73d30fd4263b5a483e16d541b0631b9bf13a8dd1

    SHA256

    72b7adf109d07688a6669c5d3106209ff166ea004d663d81719448a5eec95778

    SHA512

    06782f72581d6efad128d35271635c63ed7edf2e96cee2954673471bd198afc2ea7a1e65ba8225e7616480c631a1483b8f28194ab28bcaf31cc16e5ce8ce39bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99e621ee163ea597c7e0d1cfa8efc611

    SHA1

    794eb5780a3ed6ff900706880401e55e4e3a8889

    SHA256

    8e62723bef2956eeef9f88b44274af0af6734d1c74a7d273383826a45a9b2b99

    SHA512

    bb89e45e0fa3540bb6cc4014b911e780ab7d87f7b455929c12f72fd8829b566f491a2a31175687bb4f6a1461997030877ca21b2594c4400b2446b6aa6863c6a4

  • C:\Users\Admin\AppData\Local\Temp\Cab77F1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar789F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2856-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB