Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 10:19

General

  • Target

    d4ad926162305dfd11eb0df2ac7d13f435c68a60edb4b4c30a43f2c8e6b91f32.exe

  • Size

    5.4MB

  • MD5

    f899a504a5cbc01d4eaeabd90b251741

  • SHA1

    1b5b25dd30a9d6fb17ff1091b0252106753ac647

  • SHA256

    d4ad926162305dfd11eb0df2ac7d13f435c68a60edb4b4c30a43f2c8e6b91f32

  • SHA512

    e610fb50accbd8c9362dbc34375197fa978b075c6348c864f1ca61bca1099951ef1fc03dcb3d65466e520a16a3bad1c641bb3a39aee5b7074e819a942c76cee0

  • SSDEEP

    98304:ZLDnX1/CBwI0ICu7Uo71ynWBeMtqfOfTlWXLVKCBgogChETTg77eNX:ZN2T0oAoxBe5fmTIXLs64KEkiNX

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4ad926162305dfd11eb0df2ac7d13f435c68a60edb4b4c30a43f2c8e6b91f32.exe
    "C:\Users\Admin\AppData\Local\Temp\d4ad926162305dfd11eb0df2ac7d13f435c68a60edb4b4c30a43f2c8e6b91f32.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pc.weixin.qq.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C1B8D87CA29E93F2FEEB2834BE22FBB2

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a2226801c75a351fae37b7b3e26a6ab

    SHA1

    44e4ca940a07bb2dd82e0502b18b7a0a4bed1460

    SHA256

    9327cb02eee6a5a957e5b851e565b1d0b878ea73b41de027331e3dc6548e2f7f

    SHA512

    42bba7c7d3fd1e674e340f163be0eb24a5250e6637276c7bf3adc83af6f9e4674271abe1d9eeaebba672dbec9c678f83918065d39d073cb873d2b755d7343936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abff89ee45c2152eef6762bc69b14100

    SHA1

    9f17e6f409cfd27e5ee837ad3840500fcc64d76d

    SHA256

    442e4471a0ff3ee0a1bed41a434407633ec79def6cf7c5ca39f16fe6544371ab

    SHA512

    e014178f55c08f22f822a7318fcbaec84f88d4c23e1936219dcdc195229b54d09f2fa4a4dcc9a1742ebd868364665fb0ac9d8832caa61846c1aaac956b4940c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57baaa7d6c42e83db23df54cec3b0904

    SHA1

    e0d82ce55b546f2d9957558061a64fa12c5c5df1

    SHA256

    53c99d64c352c673ba1e88d858127abcca988100addf623606543f9a597250d6

    SHA512

    da7597aadb55eaab81890e080ec49d73308157c247d516e78ae30e7484ab8f77985c80242fa1ea35f7380ba454ac9916809054d224a5eee941dfa93771665149

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eff4f2c57e8773f17dfd275fe8c9462

    SHA1

    e3138af736ba14470940372c53b72aae42529d49

    SHA256

    60376758e43991bd9a22e508fed4fc0689be641a7c99d016baa150b8e5cc3b02

    SHA512

    0e848fc6ab1b4b9b199689511b905f225d48d2d412e1754df24d29d1cf4f19f7e41803d17552f036317993971987b1163ea7340999bae23bc4eacd87c0411037

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03c1a2ff0768187420a1a5e70191d5de

    SHA1

    0b3bb9a6f8f32240bde42fcbc6884094450b1959

    SHA256

    b67c570d309ddf4b6dbe1ffcf49b16afc4da4ca2e2d28e9bc4d508720c781fea

    SHA512

    10ec6494f3ff833a3bd2e83d9c31b87619d5c682b1add41d12e93fd8de83fdd04dd13fce924e9b2c912afd22d0521d99d74a2de5d8bc05e0acfe2ea6092249d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e18253d46e6d0321b4779c81a4434fda

    SHA1

    2e85f4cc868910873ee2508fb75c22b4b263f9a6

    SHA256

    8a78c8b92a6c93b70b3d3b6c52ad6bf9241a3aef5735983584fd61d89e2d4f31

    SHA512

    0219b660e5c964e6e93dd0536058c3c1f5cf96bcfbffab3555b3c042a660b4ec0cf9ebd7794e6266a2b0680ca0a5c01e483984f2b3fca2e1fce04e7e698fb4b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef837284bc7ae3ea6e8561e1d158c1d9

    SHA1

    824890ca94652755554a495cedf530e9b826e80e

    SHA256

    3416aca449145261028cfb50c62ade2e72c6e137ad63946f36ad17863813f6e9

    SHA512

    8c07475264638b7d03730666bc4b22fd417bcfb624d830346780319cb5ef7cc076247f8d4dcf137869c708b58571609d94cc2cebc1f046b37a8a063279e009d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c57d49d027eb4a472d331c6a13edfdfd

    SHA1

    8682bc784d30c89781a8e16553ea47409964d79a

    SHA256

    92ac915a937d3a5b8df9c12d65cbef9545d716b50653f586d61165c2d3206c64

    SHA512

    f47e0463d3992ee573051aa92946f068ec9bd202aea148892cdeb864af01830906552d6fe428e5bbf4784cdb31da5e0985aa92fab74e64ba7f5feaff43e5ecf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbf7d356eece8c9a4f879711c5e6ad21

    SHA1

    b8fafbe7adaf770baa7511e275b826f3ffd101b4

    SHA256

    04ec3c28fae6d80eba46fd34c68999c559504dbd44f1b83e8c16914c3502c53d

    SHA512

    b72ec123f946b9d4a89a97a269c3401aee47f3a4c85b7321088d06e9c87f801973c7b44e6016baa735cc3d743db332c420cc2419b99fbf79f229e936e905cc92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    874a6a92e3c037ca70291e6a00f2320d

    SHA1

    5cbe37bc7a569e230be83a722e5e8f5c456446bb

    SHA256

    49113f8ee5516d7be2e1d0933be6ea5a128d96443d27952f4f87dd26be0898ee

    SHA512

    9bf5c19dd6a8d9eab6799b45d26bc5319b4236ae9ae9ca1a13fec1a8b7d171a958d8f90275076c48ecd7c1bc38fec5fae259d011b9ed324273730b77c77c4fa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95c553f982abf08c127edf6260a3fda1

    SHA1

    b409b47f6cdda8bd4979c4914ab8ee0cf5776752

    SHA256

    9eb292cc3f9156e6108046df5d3efebd2f43b41243b5b1c032b2766f6f7ef97a

    SHA512

    d42fdf04593ffca6564a0b10bb522af1aa696839b96afd1b2a9a742f143e33536a0aec235bb940c32f547e01e49cc744b463f0ee94bd0fa676b3b3345a89a435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcb65eacbf63c95cf1191a1698143537

    SHA1

    b8ad29572a88782d947f93b3c57ced036fc01251

    SHA256

    be256832f1551ad5015b556cac5574d39f9fde77c6eef410dd1b330a83cd03f1

    SHA512

    c4546cdfe608089244eda9acebc7fa8170147c9c70c6b56923e09e02c27ca199d8af6d3f17ef7dc712b1a409e83f91068e6287f969992cc27d1b91acc49f85d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    086cd93f35f827f9ae21b02db97c4e09

    SHA1

    afd5cae95a0e389acf625aed71bd95f603515650

    SHA256

    4d23e6a021a673c132583253b91621b253e115c0a4096167346aa4417651b727

    SHA512

    d28d813fd5e970e43806484829b848e4240ce26241c8d8318d6adfe2fce863319cf282e13acefc0e14e2eca853c7b2eb0db81e1ce1d9f849bea66adf7d4c7314

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2d0b4aaaca116714563f1ccdcd7d0a5

    SHA1

    25aae1ab94f807db6fb6caf0b8b032cf672756cc

    SHA256

    e6288e284c6b9a4ca4848354cb2c9cbc7bede1a4565a3f770ee1aadc6d32edf9

    SHA512

    316a83b8ba85560c872d676c19692c7bac2c358dcd9b966bff2f67172f0ecb2b1145799b7061e8a19ec17605af453598ae74f06480dce56483f234377c0d93ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4550e6b1ebb5d4a7bcb856429c3b170

    SHA1

    f164763b966fa18b2be2c973e9d5d457e78cd501

    SHA256

    3b09025461088f0f3994ff14ac03c6000c8039a6a76a9bee0be924a1d3a178e4

    SHA512

    b34904e2f94bd902e18a44a1d8fb14edeeb0f71d2f953c3b31d9828bee3957b86a447e70c0d0cf730dce15cbc7db206dd9d16af2fb52f65a3745c9fbe2467457

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4663203c8688be1883d21022bed58b15

    SHA1

    ebb141637778dd0aa6e27e87d84ad098ab46ae9c

    SHA256

    a4ba5a415ab0e651ea00fc5a91e04d79fa2576d6fba3e98b56df5f4cd7df8945

    SHA512

    f3db0c70d3204a641cca9195b0bd8524ced6e68d5f5e88752774242690f2f50f05097de1b78a9683e7ab83a1ae1af9611483f66536edb97885f8eb4668deeb41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffdb68287d322aff94ce21113a3d6e94

    SHA1

    cd33207a571c402279041a05400940cdeede59e1

    SHA256

    a355fff4feaa7ab975f6da43c87f6f1430f25a656eafc7aa66b57ae6ba75d6e7

    SHA512

    7cb2948045617ff0ddbf734bdb6190bf8d65be3bae748e7489d69ab72b987b655744b3da6e0ea2506fa06da92f23969a2b1d8c5bf38c77ae614c4eba42308ae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    821cc8dd501e8b1db40484c6fa2ca593

    SHA1

    a5442cc2c89094b6e867626bacca2bb823562be7

    SHA256

    6bfc49fad52cad2ce0f464f53c474ae91a969096fbc6d58b32fd165421ae9bb5

    SHA512

    f1f2c4274b514c76ec4ef66d7b75304f74723044d8a617a3e5b06cce11ed9cac0106fc6d16ad122f902008e9c829f519f4b7adba54dcf8f5ac6ff7f520ba1bbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0c04802adec69abf9467abff1e7cdff

    SHA1

    f99951a6c1ea86d5eb01546698bb5f21aed3f241

    SHA256

    f8a98ca0632b687cf0b2f9d3816c8c040410398a18c6d481064d293a143a7c2c

    SHA512

    abb043fce022bdd8e2aa69d09caaf3c9820e7e64953577688afb46345942d203f23ca7ac3aa24a5e7a03aa24c0a82deafe517a1349d30f7590ddc8feb7536f0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C1B8D87CA29E93F2FEEB2834BE22FBB2

    Filesize

    250B

    MD5

    010dc6dec8219f849759c402812346b8

    SHA1

    5ef24b787d202bb999b6e3b6a8d6ba0c7a54a10d

    SHA256

    107b34e8bcd9d1e0dbc0b3d6da66d631ef22c94566ca0fa2e5b7f810a1e26bba

    SHA512

    074162c436d1a78b91a9ec99f2452cd0e9b671bf47f2c6bd46905e747c3ebec458e1c7a4159d8005d074fc5c1768b13287cd3747e33149ceae97549caeb87f0d

  • C:\Users\Admin\AppData\Local\Temp\TarC78A.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/1740-0-0x000000013F1B0000-0x000000013FF26000-memory.dmp

    Filesize

    13.5MB

  • memory/1740-10-0x000000013F1B0000-0x000000013FF26000-memory.dmp

    Filesize

    13.5MB

  • memory/1740-12-0x000000013F1B0000-0x000000013FF26000-memory.dmp

    Filesize

    13.5MB

  • memory/1740-1-0x00000000777E0000-0x00000000777E2000-memory.dmp

    Filesize

    8KB