Resubmissions

06-07-2023 18:35

230706-w8fqlsdg43 7

06-07-2023 18:32

230706-w6mfdadg35 7

06-07-2023 18:27

230706-w34kgsdg32 7

05-07-2023 09:21

230705-lbqjfabd66 7

05-07-2023 08:59

230705-kxxdfach7v 7

05-07-2023 08:41

230705-klwmrscg9y 7

05-07-2023 07:15

230705-h3aqhscf6z 7

05-07-2023 07:13

230705-h2e9lsba95 7

05-07-2023 06:50

230705-hl6fvscf2t 7

Analysis

  • max time kernel
    134s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 18:27

General

  • Target

    credits.html

  • Size

    3KB

  • MD5

    64ecc35282113e2de83eb80221a9c379

  • SHA1

    236417851a07204647043cbec1570bd2c86d1b3f

  • SHA256

    98573f2746aafd2c7dd8313b12021da2fc47d7b0111a1a0b79eab18c4730fae9

  • SHA512

    39cbeae68f7ce7d22510c22c6542168969ed789c6ab66d9d41c3d443fe0815c84571b833eff7e4f5139a61b7776114ec7194c1d1d87b2c7058ad5b51381212d1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\credits.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    621cb92a58efc1fe7b4999e05d8a49d9

    SHA1

    2a5efef282422f44f500eac8e1dd5e72689843b6

    SHA256

    6001a069c14513c1c11c8e8d4310d0a027f93f0e8bb436e66892c512a3eaecf6

    SHA512

    abd712d1195bcd3484e5a835724fc4051eb34fbbb1a6089e3315341a7113839c3b2e2c6f5c911bbf7f9acee4d4078fc3d0cec7c57bd05b641ffd9b8324bab746

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    373788bd1228934bf0a6c7a5733bfe0f

    SHA1

    65648d7761e979b973981a4486a4ddc4feadeaaa

    SHA256

    e7575d186eb040aba60f25d8aacd2eeb1b7f004373ddb4a79d5aa0c5bc009904

    SHA512

    ccc5c0e98911459e47d70c6b1997376837beb7958cb2b5d833f197cb61f22832da7ec9a76e50203940b24e06feea25aaeedb382b7690dce1d072fc6ff4cb74c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bcfe86eb1c656d9478e50b3162bead9

    SHA1

    a0c4c090d4a0e0ae409631e2b6a7ef2cf4b38930

    SHA256

    7d8cb80ad0e747fcdcb9a2287c0d6995a66c1a31463d201a9c14f809ad7ba10a

    SHA512

    f47fb5601ba75b45968aa70b5cb8bfe5d4d9583182502629f278f3218b709ab52da5e69adcc16c5d593a161d209e7df6f7d012128c989754475e702d88e00463

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    860a6cf5a36bd32474fee91541548658

    SHA1

    7c03b71ebc4d870d018a14930e4472f721bc4eea

    SHA256

    32f72c09a8c8f849cdb41dc8b7372c376bd9b404759b66b8b0d8c9dde31033a7

    SHA512

    10d73e3771ecc202e0bbabc5fb5782d5dee2da00528829c92a4dd2ee62f8b5b2556fccd6af50e1917a6151835468100233e575fc1fc506f750ee00b7e9ead31d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b879a5446deba070bd8c5ec7f7fb2e5

    SHA1

    6371784dd627f1f2cca7d6f68064a7e86829fa77

    SHA256

    3d742f5f78a9bdc20d5a33fd5b6a637f94ce058f2db7ce6e25c63ffa4530057f

    SHA512

    4efd866bd23bbf5a549f73568e9f6f9c340bd42c504a130943fe2702a9b36e66d0d66c8783e931790a0cc7143eadb465bca1c2670bd2246b8a78e2bb98d5ff36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fd503b768e3b45bb76db04381482e17

    SHA1

    1399263bbf9ce721bcf9d3738175d1e27f55394c

    SHA256

    b21c9433d46fc1ae64f8f6de1b5d677099ead016657e4f9241390c374d7039f2

    SHA512

    73a1f8633a9d7f02e14964124698410ac7e1ebeb1d5b628cdb8d82503d3ee7bb4f386980f6e755f535e53dd64d57bc139c81a3d9d02aa877e0f02b94b9450477

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58d3472598b0cb2e8372d0939bb64104

    SHA1

    607025d4aa56b993d75250f5cd03fa5918223b20

    SHA256

    83f4effca8ffcea809376c6c0a97658187ad8f9c4787f74174ea89e60f41e1f6

    SHA512

    6a4493370b91730542e20ffde5138c4bc8443b50f9938165bad322ebd9a5a94966292a2414a1aad0ad0441cb1a8002edf1f49673cd94c5f62f1c8c431ac5be36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f24dbc479e1d9ce930d72ed05810337

    SHA1

    ad1f5715ec8baa2cde627852ab45b131a4942d90

    SHA256

    23935ae34e0257b55f890d6304851120940f6fd0bb8c4f919517d23195950f92

    SHA512

    2db35e09573c85ae11ee4be27dfe538063d82eeb995f9827e3f46807050241f3fc44961423b8c7f7ed0b72875881edcaef7f191f1e57b35629ecea6efe760012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    479de380b01c24f10b0f275f8fca91cd

    SHA1

    206985db3d6ce4e02b1f2d1568cc5ede25fa10bf

    SHA256

    99b5becbc0d6b7e88bf3fbee43582508e6f157ca1b0ffd56a2f996736f5188a6

    SHA512

    779b04e3ac99a4ac6b8698d20a0afdfc19f96a90268ea9665f6070c09101591b4393d4f51fac03f04605e22fc77af03ddcbd15407b62f1e19749c53c187046bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de50b07bdb8a639b485cffd348894602

    SHA1

    e2607c90d1ee074674709a7d477473fdf0481061

    SHA256

    7265dcf3adaba51497788ab55cea65a03fb40d46444ca4cdf678af15a747129b

    SHA512

    8a879e9042cb60bc50e73f2473009607d9a032195077c1c3de2c7b853bb1b0bcf5222c20d31a42dd292db5c11ef1dc84dc29ed7313410c0184cfef127e7b002f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b47c7b5f2dbc327f2dbecc7566da7df5

    SHA1

    a66010a870b3fd9304be6e5027273b9fad5bd582

    SHA256

    c9d588fba5d0669ece91b7b07b641cf37a565b0edec15a5701f3e732145e4486

    SHA512

    c6f63094d682fa49b82e2184d6400e75a8f66861f7f6601246802cc6d65324e5185e23363c4224b5e4d2b5b20da8b67d6dc23a4df0447c1efa7ea6a2134a31a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S593MPCP\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab5B2D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar5C2B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\670XZDVC.txt

    Filesize

    608B

    MD5

    1c3adffc3909416a282f7a3e7f2887ab

    SHA1

    d40cba7cb5a82c91aafc83fd7d64a1de2c93d708

    SHA256

    2829fb9a77a7eba993348c487d07bddf8bcadf8ec6ab16e63b8da8c09884c5b7

    SHA512

    a0cef1b69b7d6641b38108d3d4b21965ab9060eb6f56a4c796d4c16f2eaeb7dda64850338c735b51bcdb8093a1064c5f12e06a36e35af351486352d1da1fb56e