Analysis

  • max time kernel
    118s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 20:42

General

  • Target

    K-MeleonCCFME0.089/chrome/ietab.html

  • Size

    593B

  • MD5

    f8ecf547827acb95cbca5429d773c247

  • SHA1

    445837bc778bcb084f00e5edc0fa3a20dd221125

  • SHA256

    7e8daba2a5d58b0de92f580e1add4e80156279b37f3c4d2718989e6aaa9ba542

  • SHA512

    3249d9bb4c31054eb5e8fe7bb85f0e628a208991717fe429abc88b7be8e5f4fb8912be9c50b38bcedf08efed8f2afa6b7bc39071d5ffa6788b16e1537cc99abc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\K-MeleonCCFME0.089\chrome\ietab.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2780

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b797ed78a04556815109d822d6b3f7d5

    SHA1

    aa7aad6aa54461fa613ea99409f62afa8ea8082c

    SHA256

    b36d97370e6bdc3e1f1d87f4e10694c33b79932a13b3153d9acc6693edc2e34c

    SHA512

    ab2f36571305c39382811180ff600519b781c26ac4a49b18641010ea3db2df8c28b1338e64fc0487f78792309589fc8b81815da29918984f7b5e7eb7706ccb39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e44ac2361633ff24de38883c07049eba

    SHA1

    0b1a8a9c9a4e7df51f55bf5bede3a9e1833a08d6

    SHA256

    23c8a0e0eccb40cb587899ecf0c1f0c13955eb5bdc1296d63e0386fd06d5a80b

    SHA512

    4c4b91dff6c1b431a9e9e7cf1ec4a428ac9895e84f8c7b7631530d3ff679da9cb85b4f47f7fd3cd29a54845670740e428fcb1eec84f781b0f435694c366b51d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    15ae361846d4916f2c9d68def967961b

    SHA1

    0a840b3978887824a4e76260b16301ac292a3ea5

    SHA256

    0b35d80c4b84fb2acd3e78460945ad2ed9caad095528d680fc395ec1f1e91a7f

    SHA512

    e3a855311373c2c4398d57da37877b570dc88ee68fcb867a57718829e34681a3a5bac6f5c70fc4e88354a4728ea6406e7277f8af96c6cbbf37d40aeeeaaaaea8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    443f2cc61e793f6ddb28f6237baef31b

    SHA1

    7f9eddb4629cf42161ca40494846ed645c5c526b

    SHA256

    88d9bfcea656ec8a7f4c69e2f9a660eabf6cecdaab32c7bccef8342e48d7570a

    SHA512

    495727b1a596540a8a75e737fcbfc96c6b23c13a588abf18c9382cbedf691342ef9254fd3b7c320b94ccd122749d46268dc19957dc961af98fe6cf0f49eb6525

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    74664e5000c9ab6493400d12249ee09d

    SHA1

    e54d235fe0fec987896695159edc0cef7f7e4351

    SHA256

    269443dac6e5ef757076a1b32972e0bc5b5d55f479f37c5ad470bd261664c820

    SHA512

    178064a001d47b8af85ebea562022b21430e7ffb711502b715873426fa207badef7e8ae1a05fa24a627c81d94905a2927f9eb1df705759969fcdf94eb6cd755e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e7de91cb984c103217b2cdc071c2c5cd

    SHA1

    48b6414f0bb5cadc531c4989f490a888adc29ca0

    SHA256

    5e86ac078e9341a3674e06cad86fad74b0158018ab46b9e3b51d627f5e90ccf0

    SHA512

    ce9abd8f8400d9ab3c330e6c3181e01c594e16bfb351d984f4434367baa1ccdcb95365e4f7f2f3b6b614db5d94ebc16cb552b5a3838166d3730649b21cad1f2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    26bad6238ce457a5d3ac78b28df8dc85

    SHA1

    f9241c125e452ffe969e40ab7c67e529dfb2e9e7

    SHA256

    a68c13fdb704d76fca47d8ae127e8987a84c49067b1d5016d57de232eb1aebd6

    SHA512

    8f6d02efcf9da10b804afdf03cf464a9a3a140c20cb8f3ba8567184e36af3736f49001746b58713e985847a95c924523d45ffebddb4ebaebaea853ed5c6e9f32

  • C:\Users\Admin\AppData\Local\Temp\Tar3D08.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a