Resubmissions

31/05/2024, 19:12

240531-xww3haah36 10

31/05/2024, 19:08

240531-xtpkmsag46 7

Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 19:08

General

  • Target

    HellPr0ject.4.36ver/About/shily/tuner/rephaelGoxesBrasses/pandoraKoppite.xml

  • Size

    4KB

  • MD5

    eac4fba24ab6d66f4273b0c7e9ceaca7

  • SHA1

    1060a92a4cac0956326e8cd4c9adb3c92808acb2

  • SHA256

    1c46e9d6dba0ebc0f6ae186dc16077b7a99f0dd491e64d38e9ddcd5093a5c748

  • SHA512

    6b493391d02a2c992fa95dd377ae0c84d5c6a06f7c236f86389e09a106570be2db506fa386603cc5d352d8c773c430df40e2d66c5dffa3da57be57e1abcd08e7

  • SSDEEP

    96:IQ5dMjrr5ecisgriCtGtlj02q4wUAcOIHG4y7:IfjDgriCsLX9waOpT7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\HellPr0ject.4.36ver\About\shily\tuner\rephaelGoxesBrasses\pandoraKoppite.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6449cbb6ba8a2e20f66571f5c1db964c

    SHA1

    f0ae463d6a1e6b66b3735be0b434532169481704

    SHA256

    122258d7bb737c5fe292f93e9dd859b812065006fa567bef1434481e8a61e51c

    SHA512

    9d1e7c2b441249db0872e98b8461eb4b41c299d67d73ef1a487088c3e77ac6ff2eb225538a7388c2a06a822132804e7fdcd6c45b2aa10c4406afbd2bb5e38e95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a62c31e8339495c359c7e7c95f6b6dc2

    SHA1

    6ff2115a14404dc97904279139262006673f983d

    SHA256

    880e53474584b4f0ec66e761100b965d0f8c54976fa95612d8fec975e83b1f83

    SHA512

    4d102fb9a39b3074626a7b37a848d4ba974626ad36915815e371324209da410d30a8cee9a035c52df1feb158f1c0595f0d1f183756d75e0cad9732c017d180d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e02d687e7c31d4e0a1c4fbf94178ad8

    SHA1

    0e40edd5bd3e6717bb3b735396c3f8adcbaa5b1b

    SHA256

    d44c9dbaaf9a8395053dd6ba372066358220871546dd08541915e81761d7a212

    SHA512

    50db6fdfa186c2136b89c2249cc96969b685fefa41d94a77ab26d5b67ca9fbbc21364a060fd59f6df33b748bc43fc328abfe7b9282c2d6c5c5818720c9d305a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce24495b48bfe15e914d6f3f1b9d6f30

    SHA1

    3135609b0e9c08601346d60ac96f0526e08d428e

    SHA256

    7a7de49d2840a5811a0334fd89383a0709f0e8f955b545ad47849cb3fe79ba07

    SHA512

    77df267ded93ee3a106e49014b49b331864b1f9b8efb85a0f9c583f2ed9445e081877b0eac35ed103bfb4e6dc473e538061d62ad9c4c0434b4f1dd74538eeec9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00a2bb305d4d20febaa6cdb06ab70847

    SHA1

    26fe785613df32284411f141458dac2e02873186

    SHA256

    6987d3a4289328a73eec83e4cf378b6d0711ac1dadba7585844f16cf57023bdb

    SHA512

    51f82989efad5ebfe09778fe3b16b1e9c06140d8c654535afb4f9c486e220577f78eeff7b497ac2f1386bf59b7981919e3bc38d4bfdb5852c4a7b474fa3127eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e910b150e91f421ced2ef1b8cb12f07

    SHA1

    4b6d6c0eaa4212a7099186f5a00034e0561c7d17

    SHA256

    29e427f65f98de8437baac32776a57e28c2c899391c1b0d080334346a05eda55

    SHA512

    1ea8172564af831e7236e669362fe3671790cbcbff9bf835a34498d502b7a47695d0ac1cce0aeb3d686145da4cbcbb0f97c3cb43769db7b4bbc496300ef4164a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a88265f8d4bc148640ad221efc181958

    SHA1

    ced97fd98ca29b387ab2d5a30bf45e6e35013b1a

    SHA256

    b84789f5574914085dc5706cd22c193a8b2bda270c2a8400aae5255ef9cfcc41

    SHA512

    8681aa8c918dccbc279ab0143fafa424cfe8f9fc23e89d6877ade2c79f9b3333a9afded271c50741daaa79444153a46e00f9284e3d098a1d52f23a817608e923

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec0ef830d89d0de6500ae6c35e1c110d

    SHA1

    a52eeb3c9fbe75473227263e96c8da7a35efbe55

    SHA256

    d20ea2d96b306e53d8e73a8f0c583ead9923ad6db7e56fb53c937d5888894192

    SHA512

    aa1f993f06bb54a694fdf11bb792ce1b7a62fdc28b8710739b84ab1fad3554b814d5d0745a5d029190a0e29ada6515c7db1d388153349f7f98e7cca9c816d0da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26e431b08ce55e4b437c60af05af3186

    SHA1

    1812693de45d2512675ce6caef56b97416e0b500

    SHA256

    9ea209dc73e1fe370add9798a196219188d8b7bf08d80f864945178dd252c003

    SHA512

    da63db484d47f0b53f2a04131351470d5d59504804f8d1129bf535ab7639346930f8f55adf5531ca5d3742ff1f6b669aac7f058850c6b57c54825fea991ff1c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aab3d73a4a8cb24e5171b4eb036094b8

    SHA1

    47fef0e6f4f40b85d7ed7bb1e6f61b94486e20d8

    SHA256

    6c39a7dba7177faab8b1fa205ddac25735c1a375052ff5e8bd135652e1eeefa6

    SHA512

    e3e7fe63fa3063991d3e1eadcc906250b24165dee15683ab2364cd3267aabe2bba337f85cc3ff98075838dd8c0e392f861f66400dc14b2d6503252b484db1536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb9218aac795b3a2d45ec1b30633b93f

    SHA1

    dbce86ddf55f292b680c4c36b93d960e8c5ee9c9

    SHA256

    9c239aef5fac7b1969508b73b233eeb690101541b86f9a6e07cf69f602c49bb9

    SHA512

    db7555e7ba2b554c39986b9551fb1ac2a0c94a9f53495100a4f4a4c0d5532570383edce2093d5a9fb8dc7b9b882295f6d40a58a18882a5c895b7cf2223edcee1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    526df9695514851ed45deef139805a5a

    SHA1

    bbf4123086f3c4c899cb2dc268dd14e4dc18933e

    SHA256

    18bb55f3e98da113161cf4d7ba2021b52707ac4c7eadc0ba5ece499826551d93

    SHA512

    ef23b0ce9e1c3aae87dac2610d3276fe820edada2f9cc55a869a81962f95c944fd9145d0a78cbe92c70bfb9a704b1fe5f29366b64b270ab138a2fe1fa564fed9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67c2f1aa9e01f08a78c67b3a203cdafe

    SHA1

    943bf3e00e6f321867264517b28307628410dc22

    SHA256

    3bb13b8229adc3f76be4374045798dd6ba1b1e16e609b7642f2a0b498a342907

    SHA512

    8504ad244ceca7adc2a41124c731e1b3dd8c78ef5b41989f9cc87b7aa8ccd481c99fda7a4b158f28c9a7fc7536300b9c695700d86f66e863c04daf8c4b0a5cd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33d4c6479259a700e0c5cabed7531c10

    SHA1

    0d1847abf7226f770ddec866a45c98caace95361

    SHA256

    2fbef087845093fcbc156ee9af7c7c94bdc597a0126da72eaa9cb42d3f4879cc

    SHA512

    7c92edea0d5f2dc5b7c78df24fa51b0b1a548acae39732d1e9a343f5cb6fd358a1ceac9c932dffeb78a3ad2570c5f20ecbcba8b5846e3ccd784473ae29acc5ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62c4e07eda14c0b15a7edfa520b4cf1a

    SHA1

    edaeaad94a8c03c71fbf2a3b01467d0c3efa6974

    SHA256

    2cb82b38614eb3d2babc16afc97ec56264e50e7bd8ccf965d53b062775dda930

    SHA512

    0328092edf1ff7a6820c37974d1295bf4b47b2880349f311ce040325aed50e8784c248a5681f3b015a08fbdf8916f7b949efa620d4f2b9c1746da9f5fb0cc16c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17eb3f9259c0ca89b9fcf97570bf5e6c

    SHA1

    07fc0e9e7c795d0cb4bdc896157269fcc8d2c794

    SHA256

    3c857c6fead63cee9b0645a91fb438ecd09b54b1fe470280caac236b266d2396

    SHA512

    cff6c75c026c738358c9b66488147bc5ba83d359755ee74be5e6db000a63fc01c4823ac1bc6dd78d9236d77aa6961320d9b2e865dbba17258b3c15be6b95728e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7ec44176ad7c281074f820800172a15

    SHA1

    edf6f3b5cfde45c52ab50915cb0bb8762ca7912a

    SHA256

    c3f4d5cefcdbd3de8d78533899ae9a6d3d05c1e11bc5c33b550d4576026ce4da

    SHA512

    f9895225edba9fd245850eda9f0d34e55c6fc41e950a97f8356d4ee8746af641832f6adf64be78d738dca89a22532884fdd48a3ca7c710d9b1da674ec42b4c57

  • C:\Users\Admin\AppData\Local\Temp\Cab31DB.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3260.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b