Resubmissions

06/07/2023, 18:35

230706-w8fqlsdg43 7

06/07/2023, 18:32

230706-w6mfdadg35 7

06/07/2023, 18:27

230706-w34kgsdg32 7

05/07/2023, 09:21

230705-lbqjfabd66 7

05/07/2023, 08:59

230705-kxxdfach7v 7

05/07/2023, 08:41

230705-klwmrscg9y 7

05/07/2023, 07:15

230705-h3aqhscf6z 7

05/07/2023, 07:13

230705-h2e9lsba95 7

05/07/2023, 06:50

230705-hl6fvscf2t 7

Analysis

  • max time kernel
    102s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2023, 18:35

General

  • Target

    credits.html

  • Size

    3KB

  • MD5

    64ecc35282113e2de83eb80221a9c379

  • SHA1

    236417851a07204647043cbec1570bd2c86d1b3f

  • SHA256

    98573f2746aafd2c7dd8313b12021da2fc47d7b0111a1a0b79eab18c4730fae9

  • SHA512

    39cbeae68f7ce7d22510c22c6542168969ed789c6ab66d9d41c3d443fe0815c84571b833eff7e4f5139a61b7776114ec7194c1d1d87b2c7058ad5b51381212d1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\credits.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3179de744b5285689ff6d7c770e974f

    SHA1

    ee85468eb11261c9525ead3bcf205ddb5ffbb831

    SHA256

    9a868fbd8cc05e669f1f94059613824c2f408a02a73304b7ea5fdaffd5d6cc66

    SHA512

    9997e608197420f32e9af39198f991d1cb93a5613108922aa4760704ce15c4310de624028e38fd37f3067184be49e213d8c995c15f08fd7322318ee709b1931d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7de677aaaf1c2c92cc4e515fd49f5f4d

    SHA1

    c24391fcd1515a4c24ea7541a51eeeca0d2217e7

    SHA256

    dc1d7104f1ce0a9fc933888a8fd0a3f55aa5c795b9f476a864adc1e7408f9591

    SHA512

    ee2f3719c954ce4cf05d5b9df344cf110a2ee1d5e21bb8e81c426c88f6c5fa972c68da689eab3eb8b61d600d691cbbd8b27168eb5827fb87102e5e4b5c513f4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    506b26cf38d1940f26e412f98068daba

    SHA1

    5f34fa2a41653e8b333c57f23c473a7b9090d9ba

    SHA256

    48fc68efa73d36f2f4557daf11e5cb66290d29526d77c90dbee8a853f0932b15

    SHA512

    3b703004c48d2fcce33c5b9fdac5a344d2775bad004ad57a0b7d25f8e883a4bffcfa34d5e31d85b1bb47302df4012294dcc21d8695f7378a437fad4c583a0e36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed9187bd2e16ede24b7e38a13ffa6624

    SHA1

    9deccfffa92b9e06e2750c43cfa2c9801a59bd12

    SHA256

    14fc65ab8a1d6f92bcb20a54ca190fd10a577e8ccb199478e2a7fa9b7c4762b1

    SHA512

    ee96eec9a7a8d8918baf5cd47fd1cb4f39b1f2fdbc5a26ab75b7f532b86ffec0b2725c42e562f4a6979da7c492345b091370c19bb881c0260adac8ed8a022a95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    838879cdc5c7c7b27efcbe8cffabaf62

    SHA1

    466a7788c60de8976e19d8f53344a88d0b512d80

    SHA256

    6b544ffd6d54fc3dcacdfed122a878334806b47916c3005e16205c4e48cb7e7b

    SHA512

    e25e5830b4bc64f846c9ce96d87b104c2b0697115efb58e74a595cad6be5ecebfa1bd7d140c02a303cf210164870d84cbcd4cdd3c94c6c3450b00e601509946c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a9dba00db95680e13c8e7c11bb09350

    SHA1

    38c5ba086b8ceebc3f2e076c8433e873adcc9563

    SHA256

    9029ce4d45a2388291c1bc8c8624605aa1b644c1d1d6d2b22428cf8cb1d7f86e

    SHA512

    f9ce7d8ae33d8aeb9b04e40329c2f7161ae284eca20bc54c2b59b4ed30869f031d17193d148bc859abc0525a7d7126150bb89f42dd3372ba4275fd6d5ad370da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b33392c4ca1ff50cf195f3942dcd1b27

    SHA1

    f701d73954d8817d4fcdd6fba036589afe902684

    SHA256

    590b4984fd4627380eaf4ac16eae03b678d88a40f6ba223d0650ccaf94e4b0ed

    SHA512

    3d5eb7433741e59cbedb7722326fee40e7553df0c3b7393946279ce06ecf63ed8a2a010e28630549d308dd9d97dad4e315278517db43829a2f52c0d37d2b9c10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    958e46c45c5636c2fe41edf14b00bb56

    SHA1

    3df3fba0ff9f6659892c4547089788e23ace41d2

    SHA256

    096757aeb3f76eb0642fbe9c1229300fd9fad2b7af3a191100b5853d35f37596

    SHA512

    195d78e50822eae2ef8bf585ee2606b1d31922433fd2b35df40ef2ee8feaf094e4f354528a6593b4a91e248e3ac8d6d868b445eca3fd097675162cab7253c8d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ODRCOPYD\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab654B.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar65BC.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2SFMV7K2.txt

    Filesize

    606B

    MD5

    b5ce705f34ecbe1a2be3cff93af3643d

    SHA1

    7d42576b6e6cb9546c51e59271b602c4c2675a72

    SHA256

    01f5c988a2f91caab6bb5e2085fa5f1c82cd1e48843218df14a60490e9a468f6

    SHA512

    010a78583b9334d654f0a6118d224e0379b3244aa486bfb4e3d7b0971a337ba4b040a66770430d36977518761b680d5ba8b6feb9a7fb02aa692f4a8bd98e9068