Analysis

  • max time kernel
    139s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 20:42

General

  • Target

    K-MeleonCCFME0.089/chrome/plugins.html

  • Size

    5KB

  • MD5

    3a1dd546acf9b302b3b0492a2b630c2a

  • SHA1

    378e117a3aea6a68d782cbe41d5e0587e8f31827

  • SHA256

    6d6c31dc91580bf5886f554d276fa3946a74a60f5cbd62d9fdcaef56a07d5d53

  • SHA512

    0dccbfccf4b128bfbea1e46b8eea8b5f1c34338ccae02f9a022be5aa15bd8966922bd204fc88c4de45172bd8e1ee0a44d088f3fc038a9f2db7b9e22220636932

  • SSDEEP

    48:cVmIAqyc6QXJZn3xpP+DUu8SKbp3XI/Fy6K6g5rUKQAAnog+ZS+SkT+dMYXob9Ip:IA0XJ13xp+8SQneFyVzEAAogWSyToXV

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\K-MeleonCCFME0.089\chrome\plugins.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2192

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    fec86331fceae4af3abe25c1af2d3a96

    SHA1

    e38467cd735a27c0707e4beda0d5505e93bdda70

    SHA256

    1eedc4de73b0bc3617a659fa96814d0708e9a80ba06993a7b41a4aa4f7a938ab

    SHA512

    0894f28cbf5773c774fc2c40ea2938543e56782d276d3f8535dec804be89d152027e41e2946c5a0ae25875219b194474253db05e7cfe96e02c8490e4b938ba9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    35816876698b4001a0731058369ac5e8

    SHA1

    cbc921152cffb7628422ab57d7e04ab456d6bec9

    SHA256

    ff91c290fa5090b6233cb091868e6a6c5e72e1835c3e0800fff076418e1ea2e5

    SHA512

    c860d3f6a14a0592404d49ddf4b8085be4c20a55c81b59d98873a3fea3e732eb4921a294660334a7be7d2735fc718ee705e3fe54e628119508ec987f7dc25331

  • C:\Users\Admin\AppData\Local\Temp\Tar9008.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a