Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 10:16

General

  • Target

    dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe

  • Size

    5.9MB

  • MD5

    4eda75adfdaf4afd6307178919a74524

  • SHA1

    4573925b2e3d7ba9a7ba3b054fe537393040cca8

  • SHA256

    dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0

  • SHA512

    391f35f9af8ee68e4aec609bbb489549da4a7d8ecd0956079ae99c8c06ef17a2ad0b976be1abcf4a33fee4a332ac0086fa152f5d472d0ea7d09ccb570c1c8737

  • SSDEEP

    98304:6tef1q5cDfiOGV3gMZeqoN+n98vdb+jgJJRTvvliUxaJUq2sovOFOYi58G:6te86eVQMcqoPvdbs0vViUxuUqgvOFOP

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe
    "C:\Users\Admin\AppData\Local\Temp\dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pc.weixin.qq.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C1B8D87CA29E93F2FEEB2834BE22FBB2

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f52ffcd37c1cf02320ecb25be3c65a3e

    SHA1

    59744184cae7b609a6f29da56eea34986edbb78e

    SHA256

    764caf1fc414b1e0311703f4e07181cfe6d9d5330551a1122648ad28124d32f3

    SHA512

    78bc61d3c5a990bdff9cfb13a2b196f0b061e713c5be4c3533fde265ac7cb82309c01bf6b2b0773f51f55e71c75c3bc8a7f2efcfb7e48226cb913d274e0d6d83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f5fc7f733f84f1c9abe06538b7f7be3

    SHA1

    8241092d0ed4b5fc4b72d86107881d38c92e22db

    SHA256

    b5c8a0867d8ee4863396c1d25c6b88b169950e09f2515ed7e82cd9c95b8441fb

    SHA512

    c49d3757052fd117c141a06c702cb46a911a1069e5f36e1a29968ac7deb678451b48ca088b959808e61bc42cc7027002f58e239e7da698ed1c740fc9c0a4bf35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c178cecde0b7e359d2815a57819ccf07

    SHA1

    f64b782c95874dfb0bb1808406575ae39745ceb6

    SHA256

    3e9a37da61d75cef63004cbbc313462df2ce0ae9631e21cd82077018646e959e

    SHA512

    1efb71dbae799acc5d57086c0e5c475710bbf170815cdcab21e294b98c172fb87905fa42f1436303b2ab10655424cee57fb46284aa1a624abd66a88dc97af5d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c663c4ba9bc86550b277e3d5c8ee2efe

    SHA1

    8f36a1e1021f9fac7b882acd88b121712b95ce07

    SHA256

    76dc107b641f424a36c2ca0ffc763abb09c06aee76fabd0b81f20860cdddec57

    SHA512

    9dca2fc75944e8bbfc561ef206d9f4259050c19b765e2d4a89b8ecd1147bbe056abe109b5dcab9e0451d05810b0672752e8d9c99e4675400e1afa5d2b0c89747

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    692fdd03720d8190ffb92697082ba3ea

    SHA1

    40c5fe40bdd55b0a2258752e2938b288862c48ea

    SHA256

    1521c3e2d53df569edf4bc2b27324a2200e22c515a0b7a4fbea37460a5c21c9d

    SHA512

    6d139f7f4c9acb99ef0346a875dc98640bb1f6b5a754b85503bf60c0b16870081f2e4438a128e42ba59e48068412fad431bcf62814a2054bff2b91af41ec92af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adf8828c7eb752cc5ac4b4ad79be2726

    SHA1

    a0c84dab1728937379de383c8d5bb756c89c92d5

    SHA256

    ff048868091af10eb8474ab46780050d7f0344585555653322382235d2d9e87e

    SHA512

    5392d2cf80baf2498617b4fdd492f4022c08a3458c46d72525923f2cbd3a8a57be6da31b15d776a2dc8475f428a0cf9b8825a2e4c6b4f26b41b61937aad60cd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f63ddf3776969e1fc342682a3e14877

    SHA1

    b6b030d2761337245de1dd7f97a040ce3da8335a

    SHA256

    385c45c13717e4a78bb4ff64da4d6e9ec964201d00b89b79a5df55d84bf96cec

    SHA512

    c3e4fe184f29912a1352823bb90a6f4d67583b1c645bce19f851ac5fd7455133c10ec21b963d37266ab5168230e5f6b894f6b644cd10dc7516eed25752327478

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16bf0ba802e4e60959d75098253c73b8

    SHA1

    d832ad4a961cc7fbdac43b45e3857f7ce75c47cb

    SHA256

    2944c2662074c689d46ef9b12985acc32174bb195257d7e3de33801b8b0bb976

    SHA512

    b6c7ee44626347bca38648e86a4ebdb5b3cc2935b90aa457887e68fd6e3375c0f18a583b3b8eae69a06128d70a817e3748020daf028f5fcb26eeba0e24c0ad02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5896c821c2660a34e4e621e1b40b519

    SHA1

    aa14dc0037f9b37d932ac9dc1c4d65908d113598

    SHA256

    65a8994f28d89f1b0390fceb331291617dfc40f6927f55818f6209cb889d0128

    SHA512

    2b47ace6a751d9ac3438bf8fbbe3d5ef9a67370c58940946775057569476ba27ef2a340ce75c4fb4e8c626f7a41ff68a86906f96e1f109330f84b429dc0d24e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d70eae09e96d56b89ff136f1d958f22c

    SHA1

    47910b31bcec3d1d8db31ee8981bed7f9b534e50

    SHA256

    60786b6ecc0fd5c03318282bb903cb2232649f5f3742ded98295747772972b86

    SHA512

    bdb74daf284d79721c427b24fd8683376f78a40cfb3bf1371a2a2948029a4cf3c213ca65a27f9a8d463c71b02beeed0b6be1d46869edf5e764dce2cb58e2925e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    160f02aab7782a7df83d77549f52e09a

    SHA1

    ea3509a4750e6be557d03c54d9c04b24474aeff8

    SHA256

    866b4802aede480d45105996899940eaac78ecc718657551da6e02c459aba926

    SHA512

    e8e9cba9aa48b33dca9d21f2030d1d952248ddb858d779821da070d207fbd1d9621af9fc740a2b7c8b270053f4cae72d5c7b99dc3fcc62a3dba648c23fa54a59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bb1f604b5ff6ed0750661d8e33f92fb

    SHA1

    059518a42b5141ea25fc9b23b1241d549cc85279

    SHA256

    734bf14cd3c718856ec61ec0200c34dd483631841d54b5a7d92f3bd9dc1656a2

    SHA512

    7683a447757683626a49438e6879308c3b1a63de86d265ed3208871f34596c9ef80532d0df4e5c2bf2b0e757f0196b09ad36e1a9579a143b7c44ce536fa7ae71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac9d1b76084d6e7137b999fdecf18f70

    SHA1

    fa7331a20ec20b410ee369f97252aa31c15d069f

    SHA256

    909a884a370efa0b1c33ab5d683c9836edf4b2b85d0246b374531580ecd75664

    SHA512

    2f19c335d3b51f58f039c41becd99fac24405b167e81f1fbaa0899c97d6066da16062c626625cc1f85078c690bf87ab5cdd01282997be54c38bcc301a5ca8061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88efaf6022fc77f4bc347cf8482fa6e6

    SHA1

    91bb23fe69f100c4e0bce6b3c76ac03a30ff8211

    SHA256

    6b78223ca355a727e83493e3d95051ebb79e14076560287f47a5abd21648b732

    SHA512

    fdc771e40d45bef8fa57a42e73f46e0c341258658196064d4e170cbd2a1a23ab1cae4346207bbc5872599ab65e711892617e44e3d354f8ed4e56bd6127e5246a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9c91ae27f0034284360681499fa1dbb

    SHA1

    2287762bb92c8044da4a07ae3f870a04a02ea4e6

    SHA256

    a5be2482e4c6cfdbf65eb151e79f1f0dfc36168c1ae66c1991432b78bbab8715

    SHA512

    4bd6026d2f837f94ddea026c913c24a64c47acefc56e2a9c54c7ac5c1102fa85c9fc43f8047590d7f1113aa1dc0ae255a385cd3d451673d581d63b5dd7b8ed36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1009fb1e9b9344e1cb8a000586fe1b92

    SHA1

    ada8ee03efff763bcec6c3a3774dd683e67736d0

    SHA256

    bdf4a98faaedac018b5e785d1cb9f9bb1db411541f7f1b93f39f25115c0ace7f

    SHA512

    46ae70f8a1ac6adad577ab10644c421cfb1deef05d3c34ca8fb8f38aa991a78c7cb758227142093d471d857697a0a144ef06e258771839637b3a3d8acc02b50e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    765652ee59f78562f1e7dec6850b1af0

    SHA1

    0fcb0de9ec1b59a0f46ed6d63da4dcc62db310a4

    SHA256

    7f3a3da89b0b4cacf7cb4db3000a6862cd108899fff335dab3a0405415d40a9a

    SHA512

    15d990b8425772ad1f6b91a8736d387901c1371eeb87bacbaf7280f64f2ea6a445732b751178f85d0f20ada9a02d0a5644675837270f854558a19b6931ea7dd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a8c96e58c2925eba57c0354735307a5

    SHA1

    05f57aab44371da632efb5e4906cbc5220f90b1f

    SHA256

    8ae123ddb70356c1c78ea6d886b06714f59e93d8711ffbe979597599bf578e83

    SHA512

    2cbc133f9ff5382437847618784f3752d10be2e05c75e03bb7eccb57c6e8806992a97770f42b6ec4e54afdc8d0615d5a5387e1a2313e88d200bc3542580ea759

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    930f3030a5152a7b15de0ce42b764912

    SHA1

    de8f6f2c027554a2e31b995cd790d48e9cad2be0

    SHA256

    9419bddbadbca90edf347dc93be125463eb3b0607804405fbbdf1434bfee8b55

    SHA512

    ec177ade250ebe6babdda5849d28aeda640e58ea00ec92fc26af6839782d3e75aa4be23b2b64a52bbf1767bca47aa8928ad53a21ef6abed286b97affd0ff1c1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a96ec72c6e18bff0492e516eabc67c08

    SHA1

    68ab81214f9787f294f2b6cb81b4af6130f8f538

    SHA256

    14becf2e4c268bd8c9ade727d9e86b858ae21072d42418b709aefbd3c9d467c6

    SHA512

    bf2c1267a1fc813ec1bd3dac960c9b5ee96f0e21d074165dd0b21d18e37af138089ec2b365148370c81a58468d87603760bf60b9b12d2171c37391fe4187e437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91aafe8182dd1fb571f0a1696cacac3f

    SHA1

    27f69a5503380969e91f32cb735bd6815d7a64cf

    SHA256

    c064be69a134db2d9b56b60c45ab31bbbb04010457737cd8384683a51c65d473

    SHA512

    56c64f556aab4ca904b5e5423537f69d93ade550288e3e32a2e6cdcc5a4448d058ed9321ed61979d0708f3bdb6cf100df0bdf123a3d39fb4d5c171e3e9873c47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9369570a361349de335a4caa10e6812

    SHA1

    c9753fee72d939f1a0eee72afdaa24fcb6929b8b

    SHA256

    e758ba406e8c6f82b40fc4872ba41569eea63dcb6248df73ef5746455fa30949

    SHA512

    eb2409f2a90406a8cfe817e1f41cd9ba0a05c8e527eb2da7b09c85203d5a7bd78e591490240ca7908b7d070faf3ccbf5d3c442aed52606935da725ea48a43bac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C1B8D87CA29E93F2FEEB2834BE22FBB2

    Filesize

    250B

    MD5

    30ab96cb3bf02b1de0f0f70da78ab3a5

    SHA1

    d21e6142ba0e67d0b1e2171a673de8cba8caabe3

    SHA256

    bd4fc3472bb0726d1d966a6651faaaaf9e5bd24d0d8a3654bf8ba27dfbb2b152

    SHA512

    59bba41de6e174d76c184e3b09a941cab26a3d1c6d7af152ac46c71083120c0fa4bd85610a29d38b092e882f9c9672272e9bf3395c80df713c5e7608fe628b17

  • C:\Users\Admin\AppData\Local\Temp\TarBFEC.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/2912-0-0x000000013FB50000-0x0000000140AAE000-memory.dmp

    Filesize

    15.4MB

  • memory/2912-11-0x000000013FB50000-0x0000000140AAE000-memory.dmp

    Filesize

    15.4MB

  • memory/2912-1-0x0000000077390000-0x0000000077392000-memory.dmp

    Filesize

    8KB