Analysis

  • max time kernel
    89s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2024, 17:33

General

  • Target

    29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe

  • Size

    232KB

  • MD5

    4d95c4d423d1da3acd25310442b5c5e7

  • SHA1

    89d22ba59d9d43efd3c0b7c957bba77e80949b0b

  • SHA256

    29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98

  • SHA512

    9d45e4dbc353150b863932fd4e897b2f943227584fc4845d57e75ff7b7fa4fb0a147e95b72b6e5e710f379e74ddd3b956854e0de6a558f118707f11c5fff0554

  • SSDEEP

    3072:5I1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5bG:8i/NjO5YBgegD0PHzSni/N+O7P

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in System32 directory 2 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe
    "C:\Users\Admin\AppData\Local\Temp\29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2788
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2584
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2716
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2548
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\WINDOWS\windows.exe"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • System Location Discovery: System Language Discovery
      PID:3064
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "c:\system.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    306fe5c52eaedb9789401b9c12854027

    SHA1

    9d02ccfde5572072b460dcc0e87ae39f1312b66e

    SHA256

    eb9ab51a2ab862715d8c48a5fbd386ff69ced1746b24e35bfa3071e4bee614d2

    SHA512

    cf04c697e0dccf6ef06a057ee64cf51272de25f3f57d3a6471428c804fb6b876de8b45d833d5c608ecebe19ecd70d69b74ff2c302986cd07abe05972961a0627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82f48d83c1d1f149d45b37377e6a5c01

    SHA1

    af1ed4e137f8df5ea0cda48ff474cccbb1d679ff

    SHA256

    0b3e06d28de8fe9a6e9e1941a3934eefad7515202e4af4ee39287333e043f057

    SHA512

    9c55c415b156bb1190203ca3aaf9e79e4800cad7f50bfdaa3014bcf4926df957e5da694d3dac2854edfde00bfaab60cbabec2ff9322015ca2d49f6fe4e8d4ce9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3c8d0f457aa960eef3698b5293728c5

    SHA1

    69483907763b771c3dfa9d44e8a5cd0744ff48fc

    SHA256

    48f312990c8318220f1c0921f107b9d5edb0d5f9eaea7b83f9cf66ab49ee3552

    SHA512

    cd98f3fa974649e31d2ceecf6eeee77a25b812d4b49c96d007bee1cb0cc7200c576fe98a62381e7e63de41644be5add6d139028704b99314e618692f22a1441b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fca9101a1c38f76fe154c68dd450379

    SHA1

    3df10d7f5543d94eeb0a621139ac2ccbe732157f

    SHA256

    129929bdfab79fec70138314af02af286d41028fed7296e29c25d9e67e6e8f43

    SHA512

    44cb2d0091f778c83dca0a1520ab7d40fc7e55930d4263da9fe9e6f7f8f0a43d150b69f1d47d3aa438ffb8f6b28e934bab69fd1b72c0955821e95187c9d31ec8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    657e9adcdc3f3e94bea1c44629321c5d

    SHA1

    3eba23d999c124d561a22687e6ba3f65dce883c1

    SHA256

    35ce43503accf4c2946b3bbbafb5bae8df5fca5acd752a92f82023395e082f58

    SHA512

    7c3e86d2683d6910bd46c2beaccee90d4e745bad29b72a9a122c55fd7e6ff0b357eb5c690347a4905323d26964e23ca274fffd6c9ec0158fb02fd08d656d8268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89fbf2f5ab14b26866d3faf8601b4470

    SHA1

    f3a223b470dcaefbc7fb6e3a012d6f680794818e

    SHA256

    8b73645f1fc500a49b7641b19686c60b90927d27d049f0ddb61121ecd9b9a371

    SHA512

    06d65b2a06078a3c9ce616ab714239dae4fc08eca34d1c31d71875b0a6e3988364aa8343050638c0af9fc09ec2ae4ed9f9db325280d0fe48053877c4baa58d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    614a274272394951404204fb49befd11

    SHA1

    3e97e44e770125d15584486a64fac829f767afe9

    SHA256

    03eeb80457f43640999854582d93258edbd4fc6c2502e12b83911a9d36719061

    SHA512

    934a7fa707a8608a3a09e2b650981cebfcfdd8c695d83e1f172ee05ab71fb33d8543ebacf338584a3edd3a65e001fad3b1bdd7275f0d900ee635f9890633efb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03e4ee76395b6dbde478ed1d43913438

    SHA1

    04818840235c40ac22f9e34a0335ee86f65f1ca5

    SHA256

    d86966913087e12ac3d78259800bfd34215ad5627050ea7c33dbc12cd0f5bebd

    SHA512

    6979a3c51c196905e16c1f8a1b54bf6a2c94af149c97fc94ca18f4051256cb0b259a2235ca33e6f75fa4b7ac0e635b584adbcf0bb51d104faf0912215a1f15bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f1ccdd5c275d18b523ae6d84f0544f3

    SHA1

    565ff999154a39988e3e06d2a2778865a3d4eae8

    SHA256

    23da55a5ac2e655282f27cc757a33dd26d66c0c08429df164b1d3f899caea231

    SHA512

    95ebc4d9c9d3842373622cce1ac3730923c1d1111a8d152cc78cd995dd826be82e2a4025cb8d2721387e370227e41bf06b13f5e287b7a504295880a386ad7c0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e20a8d8809f09867fcf27b8b08cf3d87

    SHA1

    c5c7a267d976d754ca9bff4216f1f7aab27234bc

    SHA256

    ab61d520d35a4a2ca2cbda055c510dd5ae2c994020a73593c64c511ef3ae25cc

    SHA512

    e59d1138751c6f0046bd2834d2c23a06854f292590e9906179512f011aac3a3af4415f0cf237a6bba505cd5802e97739ae26b0d13ba52cc2e3a29903443db472

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0b4625001afc03f8eceaae3c241cfae

    SHA1

    e0b64031145920684fcc42481aaad66c9bfdc632

    SHA256

    11e0e76d445fc05ca0be9c35e624f1f728d073b4a012d2cee33b8b1cbc519fb7

    SHA512

    912f27d14692d11b4053edb3596f97b2ea4ffb44a15ed2f4398db9c50b592c7bcfaa674c706220cc425bda323360997e1196839c1cf2db014cbedba77ff12887

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f4afa8deef1bb1daaa8fca246769b29

    SHA1

    5dfd6413c067d3c6c007c545246755bea16df7d5

    SHA256

    290bcac790f589c8c0812060399b9417a3567cfc71a184eeb3a0bbd8ca2c97dc

    SHA512

    ff2f692c9d302222ae5ebcc54f5949bc0794e482392cbcc24ed214808e0c8526ed69d59769d86aac98cc6c7ded9e694800a46f4e9576534fceb43ce485a57960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c843aefc739ed68340f9e418189ea854

    SHA1

    6bc56e69ba5239078d9051ed116972a800fe3e96

    SHA256

    143a1e7f96ced1120a28528b98f56644bb215c30e24cba2f010e0dd9e2a8e47d

    SHA512

    109e762386ca651d789369afd45fd9bd7801bba16a2b9ce0d2a2790b2a79df88b8c2d69fb48e13126fef758f1fe0d89a581a236c1e8953a5c533ccf6cd969c15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22acb0f07b2280f8840adbf5748ed171

    SHA1

    a9a13d652c8dfc79e7019a4933170be670168962

    SHA256

    635a37f068d593f9cf5e2bf2bb9f1ebbac92c662483661eef4e9c5f21630d5b5

    SHA512

    131d03c99a0e5054264d6b4af4eb03b93b72caf453da2927679f8717dd237eecee351948819d7abf8d35a6acffa65b50ea9e9e0b6678fd71c10af753b345b52c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9063577b6381232b4c76fc74386028f

    SHA1

    410c3d7e31b512a6701f9bf10384bee92f11c4f0

    SHA256

    da18441979c28234f08c437cd480525b2d5bd9db9abb0c9828e8c4c0967345ef

    SHA512

    5f72b9ed4efa029d52d2e435b341251fc7d96de726f7ba8b386bcd2c642ab18d9de542b3af408c6a7d2faad8d3bfe3349182c624a2a3a9158d1f84ccd63deccb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c22cdfb55dcbe5a45c88846a187434f

    SHA1

    7277c401cb5ad9efad4e03d57325ad1be5de1ab8

    SHA256

    3e35b6b33c823f6a80de66c1c11f7d427afa627bdc077a9fd17a064654274d5a

    SHA512

    e5a03f8b9a7042badbd86fae179614aa5fcf6e18b483b5cf7305e2b78dc77e6cf560747c561f61209865423eb610da6c29cdbff09e680331113648b7b7ad3b52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5983a8ede61495aff8f92c44deaae554

    SHA1

    3933b69f593be118e34b030691de616af4694b28

    SHA256

    df76fd236c19f77a2b42282dcf50c11ea310e086c682103a6742a79ee5718ef8

    SHA512

    f64d5e5b5f3e351a11f150e50f10273359868840db276f83f1c08c6555abdb38426a7487eba27a1f2a866d0dc50fb9f25445ec35354686cec895209bd5238674

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f63acafed4b3c9910a556cf6d33dd0f4

    SHA1

    b1a280ae41775f26671a286f5adccb60405e549c

    SHA256

    1601948dd3f057d005ae38b3bc0035fa7ebb0390089a5222087d520e82e322d3

    SHA512

    eb94ea85cc4bc341bb30e73e9991caefab67d750603ecc2ff8de4412eba667094ccd0f95f255a7194a8aa1657bf978f55da0f097216806fccdbfbc5b8d731900

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A945D7E1-B19C-11EF-88C4-7A9F8CACAEA3}.dat

    Filesize

    5KB

    MD5

    cbfa1643744a6f9fe7ddecdeeda51306

    SHA1

    bc303e4a1ffe91cb6128c262e703970a101912e1

    SHA256

    432a2207fc7d571e49653273bcb261a8e3e89cca8201199e16685b8f8da64245

    SHA512

    9d16536cb8b3d7be5daa7f512fd4af1e3ecadd6fc7144e1b8da1c7f44bd521c11b1fcd2423a04463a8467843e578b31676cb3d8cb5ebf156ce196e389f7e7885

  • C:\Users\Admin\AppData\Local\Temp\CabF73D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF7BD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\WINDOWS\windows.exe

    Filesize

    232KB

    MD5

    35fed8afc492377cf000e1d5124790f6

    SHA1

    b4fce707559f5d45b56699767bb4bf23878c492a

    SHA256

    48603f4762fdb05da3ce798c3fd44be9956b75695a57d9bf1ed2bb85bebe8a72

    SHA512

    57f7d827c70037b9feaf2af1441340dc3c5f51e026824e758821e4fb2f8b8682d79fe49d341a92dcd035ed40c64aac572e501f64876bf616dae5e5781c75a1c3

  • C:\system.exe

    Filesize

    232KB

    MD5

    61cefd0baa4ccb946d78647efc691488

    SHA1

    2f87eebf19a772c0ba96fdfbd3d468d38a9fae2b

    SHA256

    d4818e191b924efadf0308b05f338c4f6028df2c2df3ed4d7325bcdab266463b

    SHA512

    0f08252273f217f162e7a65ff4e6709c06677e5c249ca0b3dad5c2bdf925c15c0199cd4a3919f9fd59b9669045ae335dfd42fa78383b9e685099b07498030cf6

  • memory/2480-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2480-326-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB