Analysis

  • max time kernel
    138s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 15:56

General

  • Target

    DeathCrypter-0.7.0.exe

  • Size

    9.8MB

  • MD5

    e5b1ff36f9fca02f63e3de2fe4861b55

  • SHA1

    36e275dcf39a1a963ee0113af3e9f60e2a1a40f7

  • SHA256

    57ec4122db9efd9fb97b27b6844d2026fcb25333ef18f4f2a44d63ad301c7a80

  • SHA512

    bf43a7e5c839de792e756dc3ec75a9be8e779f57f7ab84f7e157aa796f7569045166e1fc889d014b0411501a4f3a4656a037fba78cf44d39b4b03b965bd8e09f

  • SSDEEP

    196608:t41mNygKiOPY+ZozEhjRS5jlFUMEEk1n9V4rdkACYnksmj4bsDgbC8VN0:t4Oy+OjkEhjQlFFha9WrmAmwbzCN

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DeathCrypter-0.7.0.exe
    "C:\Users\Admin\AppData\Local\Temp\DeathCrypter-0.7.0.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://hackforums.net/member.php?action=profile&uid=5420967
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2608

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    03b8eab78e9c39f2803090623a2b4d5c

    SHA1

    d9135edd31a4475acf84391feaa5c16b136d7351

    SHA256

    402c98fe0d7be174327bf509b13b7083f5f94082ea8bbed3d542211e38a31bc8

    SHA512

    898e85003827ed3c76dbae1a28970d4bd497c1c182ac299cb97adfa5b9e7590239567644016f26dde6f0f0f2cba119968f650825d1d7089cf378eeaab6221e14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d86c8b5dca21484d50b445894f8f0557

    SHA1

    111dd6fb73218d92950782f841e6d445ad48166a

    SHA256

    44e87c8001c5f6f60c75ba4c79ab0f411ac4bcdf13c73b2cecfdf65efb159abc

    SHA512

    6aeee8b4f2c4fad62e057acb1d502684e1edc9f487c5e072a6fbd6b91aeae1f9496831f34c7fe4e4a5c53afff503f49fafc271db8c21c0186c9bd640b4f307f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    922671bfea891ec91e3ce0814e6c65c4

    SHA1

    e46dac34b809b51fb305079a4facba98635399a6

    SHA256

    40f20cd522272f11e30b83abf08937a75a5b406a1ebaa2d754f42f8f82e6d762

    SHA512

    ab5a2dcf15cf10335f64d03b42c402e5e2fc969c311140880da5d01a2646b18ed42bf63514645d478dc1bbed6ef0aa5025c45902bb7fb85ddfab5ff9e2f50455

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    776a1f66cff220331df59cebdd9283d8

    SHA1

    acafd9178a3af7f8eea92d3dcc96fe72a24e82c2

    SHA256

    bdf8eb24103c193cd72fddb1adff23c9d3c5e322c6c6c5019d6ec83824f62138

    SHA512

    b039330becc41373e25361c74891f37a4f3b0fdeb4e6cb570c7d130bba9fd4c54cc9609ca1d4ceacd607c1590b13c5a5e951db4d004a96bec93cf3b47efa0ba8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b15dc68b6bb8527a027581f5390737c9

    SHA1

    13ee1eca18509e83773880895518fb7f26ffd242

    SHA256

    729e3bf650c2b3dd70c925786e7e53b04143d420d02749aefec1c05c66feebd2

    SHA512

    4ef0f87aa33eab8da8d0e9b965510a8a66b1c328aa6a6d54e35ab19d6246fb704985b46ce32064d4288e8aa00b564b45030d94c22c2bf5e15822bec9d5ada88e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7fffa8f9e6465452ddff850caba62d0b

    SHA1

    fe6aee370cbcacc87a102d9df02a8530d72ccef8

    SHA256

    a61ec2f1a4bc70398a0a6d438cf20a8328364b815ca757a76d2fe113e59439d6

    SHA512

    3b3e6a8a1dde3538f057d9719d2a5074c06b33bf096bd51852cf4131d785676a9d3134c40c1c532161b8bc1a8451e8f818c383a7c458a6d914c7a0f7ce3184a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fbac6e2ed3790d8b11a893a493d9190d

    SHA1

    e816ecda8eaf8cc81018e6e1bcd406b4c9432efd

    SHA256

    78719b6286774d80b74ed98dc035f52b23668a036532a8fe83790e7b7d615a9e

    SHA512

    68d483f4f5634c8656873e3b6de77500a9aa464536f2352cb55e6de5f32eaec7e779b6e926a1bfef018fcafc721132b5cdd4312dd75cb45eac4ab1c3320423b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    236acc82a80c4e86ba135e20d15b50ca

    SHA1

    bf2a2f86003c1d1e93d3d94c294763ff0a307b6a

    SHA256

    fb861e0d4273096d24a62a865f49d6839abf9395e20610de8f993e39883669af

    SHA512

    809be707a624c0736f19efdd2feb3887a252bc0a82df44bf464a3a4fb98c438f3584623978bf7e7df3d75e674fa9f0964bf10c2dc497abe50772b7f86064d1db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e43ebb90436efc8ae0aac7d0b1939d07

    SHA1

    890b41a6a755f491f962e87a85e9bc607e64cbb8

    SHA256

    83097822f7afb9bc7c95922a59c662955bc0d99e209a503adabc6bffc887d34a

    SHA512

    dae8bd7cdb59821bda04419e8087f9c3b321ba1aff8fa3afdb4498f2c99bc0502d16404bbc2e5f430c77e71a03d49cc883f5d2b2b2da0eacfd6296b11ead29d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5b9c95fd194440bf46e9583e9aa49c9b

    SHA1

    3d5d9f113380345ceef0c1957eef5de68b178cfe

    SHA256

    3f6c221fb8bdd0620380b98578772c51545b25b6b0e968420518b6cddd8bdab8

    SHA512

    7a7eb17a8704f370795676e776e05f17670d6c1287cdbaeb4c13b5c19c583ec8dac94e586ac5a941e6ab1cdb58d4ca63cd9f1003da1679c61e479b971b8aaa84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    05a5318b23b7049e168d653fa0fd04bd

    SHA1

    ea69f5cfd85e5e246c3c2af08d1b642176467451

    SHA256

    13df967b4d19e1b89f76236d1bb500a3104b9362b792d16e0653d1a0e9e97828

    SHA512

    4ebe7102a6fb925f7afa30378637ea0f5838cc213d2dcab508abd4c2263eb448c5b01ca79bcb936b159adf2e0c4911a32117efa116b6b890fba6f545664e27ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e4d6b63f80855be1828bd60ac1c58725

    SHA1

    ff0e4319ef0ecfe9211fdc785cfc35105a648097

    SHA256

    3fc960bace8e9c6e47f206a5d41deff4d87b6ea3af8d2bf07fd44b3983acc270

    SHA512

    f7b5034eb03b2fdabf33571ddf26c02076f8ff280c18b59f49e25e8699b23b018ed92ba9be73592107564552affaa7ab05cacfae6535338f14f990c9653943ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    174e2eb3d3e8ce42c263b772d6db2568

    SHA1

    8f26e8d43292a27af3beacf50dc5e365fba3dbc8

    SHA256

    afa4d52b51babe5f7df0b69052df96af928c8cc88b9457d3490756447307b561

    SHA512

    115d819d86de8b54903b8dd8dd98cda69ed0e926addae180e6168c8c9164f7716a393422cc6c8fe31e312e83bd12b2892ffa64c9717b1e6846c90544c32194f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    38057fe29bc904cbf0595a2c9f82f0c9

    SHA1

    8847336319b64fa54eda7feed22c86eb60da3b28

    SHA256

    0ce57438b7e15899c71506d0557e04e158f1b98535506b5e05b044ebbcaae76d

    SHA512

    0d530e896cedf11804827795a7ce0484a2a6dbcd6fd24db8e96b94bd47d672a6faaa7e6478237b33c720d2cf98286a29fddf4bb748b34a60691a49a01d4ac95b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a5ecab338273f30e36f81379f105f7c1

    SHA1

    fbebec49fd6c231cb836410987d27b29ff1cc64b

    SHA256

    92708ec563031f20aca5409325cf53ae50fcea77cb4729c3d081c080cdd280a6

    SHA512

    15ac61c43c82cc6218e6a7d872ebbd270a21383f41a634c1251fd7ea6ab24a0e03ee739cb8ce0d9e2d512a0a55af5dbb53a0a37d1826d9390f00cc5483223506

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c53b268cca456d5d0e24279cd95ec80c

    SHA1

    7e0a2f732703d36d1701235231fd9fa47de2bbc1

    SHA256

    8110be2708efa92815c009313b6a9e77d0425bbe9a7a981ddcbfaef46e1df001

    SHA512

    de939e836ba54e42d11ee7dd67c14ef3d97e9430563f670b5f0bd9178c7811f39ca8538510da7faf3e70f0312d92ac3850c52192ae8e75e8880b806000278af7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3a167122c1abbdcaf698f6817d4999e4

    SHA1

    5e7f286c93c4354e15dc2b58056861050617027b

    SHA256

    a4bb4e75c40d90507e3187492f88c388cd063418afe764dbcf0479d3becfe193

    SHA512

    90053e4b28e9007652194dc927b1234e69dd1df20642a38a3a019bcec88611dab42a8bee26e131b9d72a6c2b7275a8dbe5dc9c1a05878f84895376cd1cd87022

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c806a2b33172a0349be9781946e4950a

    SHA1

    62ec1545f573bbdd62083ca1c142716a2c4b068d

    SHA256

    c06c65e82ffd64a148a6aec47f1de8e1b570956e5d29fddca1638c1a05f9cacc

    SHA512

    722a407576eafe38e5ea9acea058931b8e695dd4722c4a31c86e586d7e2fba192b6207bf6529eb39e163dbe0d2a9258bb6b4f4c0e6aef03300271b3125c4495d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    cd7b33548da63c7e6d9b4aff86486f31

    SHA1

    e12aa96210db4cfd4515cbff5ce5f3697ca5ad09

    SHA256

    4780355f30e189249a654a4e0122b4729c6580ee41e0e2f62ce0cc28f57b232a

    SHA512

    bcd95aa78a80c0017b2b77d7601fc9a2b5aa9c93db8bdd71b6268559b8800cd1e502fed1661643ba4837f73b24cb02cbc759b6430ad0cf3246c624d800012cc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7e6d535cc692f0bd01c7ba24cdf6a17d

    SHA1

    b0b139cb9548c91edd8120e07748f6bce0201544

    SHA256

    5478ffc876f9cf68b2883627a37b67ca3fe933175672a47ce735a6d61a78e569

    SHA512

    8758b708282f805a3052ba38ec68c8c96e154d02d70637cbbc4258e935f7e6b879fb49031160a080b4045a3fb721793c5e989d6f8454a55be7b1995ad4d52a9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    296553e95abf93c53fef133d9f7b1dd1

    SHA1

    c233a5c474f0bc9525cc0fa98787d96185099cf5

    SHA256

    b38ced6d9b9dfe3699fb8370a84d4c21c74c66f26f26de44dbf6234af472f520

    SHA512

    35ca3bca5f0d7249afab8a7e929d5255f2e74684384dabc9e23dc7c99be2f4461952bba0de837b579eb26ec8b60dabdb7439cd3b7ae975f446ce32ad04c34b98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    976c953bbb9fb6d04ee708c3767b0f91

    SHA1

    e9c97f7b7bf7220ae246fa851bb39f725073512d

    SHA256

    5151c330057ef5c01d6e7053a68dae7044e9ab5c0b5126f832c80321fc9b1edc

    SHA512

    52a823ab2b4eb31880a57e405e9e36bd8e0ae5f1f24cdca69bf5fb57ccbfbf72861e7ec901ecdb94dde404ce9ab044025b273ad502d9788e0f2fb6948439be5a

  • C:\Users\Admin\AppData\Local\Temp\Cab237A.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2438.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2428-6-0x0000000000C00000-0x0000000000CB0000-memory.dmp
    Filesize

    704KB

  • memory/2428-1-0x0000000000E00000-0x0000000002302000-memory.dmp
    Filesize

    21.0MB

  • memory/2428-573-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-574-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-575-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-576-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-0-0x000007FEF5893000-0x000007FEF5894000-memory.dmp
    Filesize

    4KB

  • memory/2428-572-0x000007FEF5893000-0x000007FEF5894000-memory.dmp
    Filesize

    4KB

  • memory/2428-2-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/2428-3-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-4-0x000000001CBE0000-0x000000001CD52000-memory.dmp
    Filesize

    1.4MB

  • memory/2428-5-0x000000001CFF0000-0x000000001D202000-memory.dmp
    Filesize

    2.1MB

  • memory/2428-7-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-89-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-91-0x000000001EE60000-0x000000001F16C000-memory.dmp
    Filesize

    3.0MB

  • memory/2428-92-0x000007FEF5890000-0x000007FEF627C000-memory.dmp
    Filesize

    9.9MB