Resubmissions

11/04/2024, 06:06

240411-gt1pxagh4y 7

11/04/2024, 05:53

240411-gllk1sdg28 7

11/04/2024, 05:51

240411-gj89asgf81 7

11/04/2024, 05:48

240411-ghl3dadf69 7

11/04/2024, 05:44

240411-gfgpwagf3y 7

11/04/2024, 05:39

240411-gcnn1sde52 7

Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 05:48

General

  • Target

    $PLUGINSDIR/app/index.html

  • Size

    20KB

  • MD5

    6d8c9edde0ce101ce0abd73be45c684a

  • SHA1

    ce6d94d2d1a7f4761438781affd3aa991018e4f5

  • SHA256

    f15c54f4ac4f55bcfa281b668220eb144e63b9de2292e970095a4dc566209682

  • SHA512

    06f35ece48e4e19174da18ecc5dcac3a7e4d7ffbb102c4859221c7c569027ca72e40c9ed945872bf4396bc02ced7ae46655c88e3ec40d0a2f2e3bd0fcec80203

  • SSDEEP

    192:DgNbdqnDNlPkZHmY74+/qmtRCtmK8W9I2gHHMlxh8B39LJ1Hab4OJgJnc5w/93gb:ENMO3aMOUnbCky05SN1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f7c9c5bd4ebddd5a777ed8d296c5dde6

          SHA1

          165d35d9a8207bc9a9851f24a972b2dd00764c03

          SHA256

          1075e514b6b1e5f222989c485ec9defb50e9bc004e52ac094d926403e839a2ea

          SHA512

          2acdcbe1265b1ec8d0f95424196d34bb36620038e4fa839b03963b808fe99f24c28313db8f7ca12c2468282b37900e7c999252b52cb8e9e7e96910cfabbb4964

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c45c90c4eafb35a85c65d8c01fbb6947

          SHA1

          0816e1cbd0e13a084b85096e706c72e431be2f37

          SHA256

          5bb5565dc78e5534bd4a74cf15a0288e4d09ca976ff01e7081218359a3a274ba

          SHA512

          c0ce23cd9456595b5e9952a25fa31a27ee3ca83b0ebcb74144bc99de04cc882ca31fd6d5bbfd2df12a820974edecc962d108c7e057da402809f0396e7b93885c

        • C:\Users\Admin\AppData\Local\Temp\Cab2F89.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Kno42CA.tmp

          Filesize

          3B

          MD5

          8a80554c91d9fca8acb82f023de02f11

          SHA1

          5f36b2ea290645ee34d943220a14b54ee5ea5be5

          SHA256

          ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

          SHA512

          ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a

        • C:\Users\Admin\AppData\Local\Temp\Tar2F90.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06