Analysis

  • max time kernel
    118s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 20:40

General

  • Target

    Join-v2/FCKeditor/editor/dialog/fck_flash/fck_flash_preview.html

  • Size

    1KB

  • MD5

    b1e90c21f81c37b9f65a625b65262410

  • SHA1

    7275aff8522e460f99cb64e0c1247140c83a8170

  • SHA256

    84995145507c8a7489329c4dbb3169e8fdac0966becddf202ebb12b4e4107120

  • SHA512

    7260a05a1ccd43a13e5aeda108c157783fecbe60879c93cb8b4da56aa780fd53d2cd7c053ea6f8dff04acb8c6408e440ffddda29be84411c80cdd83b02a35095

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Join-v2\FCKeditor\editor\dialog\fck_flash\fck_flash_preview.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    246f4c2c143620e088cc32d7b1c5d729

    SHA1

    fc7128120a594cb08328993c43bf0fef94f579ea

    SHA256

    fd9253d8dadfbece428b6163d6f0b3d22ae788f9fe95986c54b9eed35b7bfb57

    SHA512

    d5b0c2c213ce5109d3ccee77885af8480f56f4664d55393e757d069b6b20b06f81c3b898f40a947f9373bc128436523a61ecc02b874c11857dbbe5f4a15c8dca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94b01ce0855dc228ef661567bedbe18c

    SHA1

    dd0312e74aea0ac25d3d8fb69369e5294ccb6d66

    SHA256

    690d31309e8b5c18b21bd9235a19937ab695bb792c44be489cbfec7ba6831860

    SHA512

    92244fa115a1737ae3aaaca7de1c9362e8416d607d7d833622ccef4270e1af9ff88d82ee9e704e43fc33460bdc65805b4deaff12c53aca2091f153adde1e40b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0dd4d79b97a1af24e136d1363eda062d

    SHA1

    7e692bdfb08cac2ee07db53c2eb386157e8b6cc3

    SHA256

    e7a264c5885a8868babd6fcc995fd22131452d878fc182fe489c4244e595bbd8

    SHA512

    d89258b2b829c677159e89015f3907f79bf058d7b63ded61b4b3f9139726fd9be6cccb9833a7d3c8662ef1828dc0b12818ff4bc36be57614556dc8e134331f1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ae03a9d2203c013cfcfb1e017be60fa

    SHA1

    fcc4fadf193697d64fa9e5781297feec5d9c11e6

    SHA256

    1e9b32d8073dc1fba2b574bbdeb356f0bcfda7dab57372697460028be084c118

    SHA512

    df2fc408bb12e5627887803089cea21ed323a8485d7f1be6c2dd8d8aedf98a4e91133cf6a954b409bc34cc02db2928585aa7bfa98bbb2ca44e9b750c1e914ccb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32d79b916ed9ce14c77d3448f382feb3

    SHA1

    7a701bf0a52fdc74a1cc0aea94cb768d7d58bc24

    SHA256

    28d4cb1c5b1b75aab69b7f2716c2a01f721fed0fa13e06daa3a0534cfe1e28fd

    SHA512

    0f578e58686d421acaa7b92b2d1cb81bc3a86b832203fe950779a67c4319aeec825edad21969bc64101085f885b044e807e163abecc92675b2aca025642be3dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76dcca844c3c02fdb62a544195cffaac

    SHA1

    4cea68cbc8fc4ce91babfa97d2d4cdaff40887a7

    SHA256

    9475d406619393dd16a75c2ea6623399a843b446f532218006c94c4b3bfcef0f

    SHA512

    e0bb72dc802e49b724bae99f1144002e12d21aad88904dbb3d40dc0a989309b92f88eecf1ea3fe3eabeb459e2b7b8176b3cc3b9b792e7266dceef7126ac90edb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db65084a74b71afa433c9cdb23b53058

    SHA1

    ad8988137429b46169484f6e7702a88af8fc8b43

    SHA256

    b7fcc8f3e8f315a8bca1f4f2c8690652a88318c27e176afa8d2baec7cbc56437

    SHA512

    e320565a5188998e7c9844e345448097e36d19b76b70de7ed97b03de3f0bb8d8fa2800dfa63b14a1c8453a595f461444d38d51bbd5db18f0469b11ac78b1c5d7

  • C:\Users\Admin\AppData\Local\Temp\Cab7FDD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8C5E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06