Resubmissions

25-09-2023 22:51

230925-2ssm5adg99 10

25-09-2023 22:50

230925-2skyaacf3s 7

25-09-2023 22:49

230925-2rsxhacf2v 7

25-09-2023 19:47

230925-yhh46ace26 10

Analysis

  • max time kernel
    134s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • submitted
    25-09-2023 19:47

General

  • Target

    edit_labels_local.html

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\edit_labels_local.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74c119a055fe282c87ddf74298d324c3

    SHA1

    651ddc9608a2e90b3706c80ed07629809c425744

    SHA256

    afe990a3c84e591793bfde7bd302f433a8f71cc44ca7c01d073711ebf847559b

    SHA512

    a40c80d9776d3feffdb7da5ce00b792dc7332e4be8af01645b70b1dfa2623fe336c5eea42ccc4d709ea182e2506a752207e64ca6ed9613727ee4b2ba57a942e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3f3b4e56b7df011471a341d68279452

    SHA1

    fde182a28e54202410945246631bea637caeb4b3

    SHA256

    810535e86b0ee5d840c8c64987869d671568c4208615ab07e903f64114e02ee1

    SHA512

    ecc13200d5d17a2c61b9262da7aa91468e60b51baf991a288802fdcd5680c019bc495924eadcb2eb34c1548c798715cd81fdc84fcbb0c1bfd259c9b4bceb0000

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c87ecab6e0e0b9378dc84f96c7f019f3

    SHA1

    09bf5d9cb03daea8df192ad9188fe0b84318161c

    SHA256

    cf520a93147b929955f1507abd1485fad14085537a825ffa54fc37be6af3f434

    SHA512

    4239f1dfae1a20b152e019cadb57480da596135d633b764d0793afad06405b146a40408c8470493e708e475e78acc522acaeffd5134272b6877aab8cc2f4c2ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fa74d2af9edafe4f1623c01b521f3be

    SHA1

    df9926aee08af329c8e1b8a5207bbc76dd4b7d8c

    SHA256

    765d8d8385c992d8fb48f27c93fa75b562ebedfe226eafb6639463b284590ad2

    SHA512

    1f96628db35c7504ae14f22751eb4247a5878499463b06fa63ff1b1ebd3c44e1e57e522b4415857c54b17ceb32c1cf39f4b9c87cd8228ef19aa42a7966e0d720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92cb4b94d5cc3953757a7ffe3b2e4af0

    SHA1

    06968f5372c983c502fa1c6f303cd8862bdc70d3

    SHA256

    99c6760e53d4ffcadea324ade8b7a6e9f4ee7b70a4a802e5da0078ec6d55e969

    SHA512

    0d193afe6f63a75af8623c86810a62eef27da8e9fb625741ca1d4b6db7a86710d721352ebd23a88d58b1376eb723cfeb7a2b30a8ba40ad282a0745cfd0abeb49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce5dc0613597ce65488a7c41881715ed

    SHA1

    40fd97bf15969fd40460e8d8055b8740be104baf

    SHA256

    b481fb448c98c1a66c59b5d411f0bcb4187d4f1494f0092883441bc12f6d6ad8

    SHA512

    8e2aa6756e8a91ec109a331d8677148ea45976df4466951637fd632fb4838f90bea43312e435eb468c5e561eb2d9aead3e61481b2f0c5602d2ed7a245dc39f48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1edcd19b7d62e5d98e0468f69c686222

    SHA1

    dd7541a23f03e42ed7883af30f021d21ddd3d840

    SHA256

    a577a5a8abdbee1b199b271db237b8b37fcd723dd1401cbbe3200ffbe077ed1a

    SHA512

    9f8c3ca2dafed78428449154e0e8827c31ea05c17bc43cd7d8377d7b208866e5258eaad2328e5fa8870b780ffcf9ef9ce2a0f2bc764bf7e396a70d55fedac6ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1da8aba35fad3f6953478dcc8982c1e

    SHA1

    837fbc917c4d3ce31e85d44a978d6c1880ca024f

    SHA256

    f562720b9e558c83d93db44e187d71bf5fa2d9cbd6060139c96da7475d56b032

    SHA512

    42df98c62261f90d99f981815dad1c54ac818da5534c60074581ae2cf2ed63868afe41442f492458c82a4b6f2ad69fa67cea48a3951879d7788202d7e7886f0e

  • C:\Users\Admin\AppData\Local\Temp\CabDA1A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarDB19.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf