Resubmissions

31-05-2024 19:12

240531-xww3haah36 10

31-05-2024 19:08

240531-xtpkmsag46 7

Analysis

  • max time kernel
    139s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 19:08

General

  • Target

    HellPr0ject.4.36ver/About/shily/tuner/rephaelGoxesBrasses/phulwa.xml

  • Size

    75KB

  • MD5

    413cdc141d52e3fdf7c065bab063ddea

  • SHA1

    4891aa7d504dc9ef7bcae9ead308c9c45a63b3df

  • SHA256

    b10e04e98ed9c70492812cd57fb65f02695f58ee4188aaeb60feae6cb5d91482

  • SHA512

    616784c0aabafa88a881b1217da6ae55a4b65aaff4d175298119ad3d48a7f078be98abbffe8eaf6f629709e2e77f57a55e08288bbdbd1eef3764a6911c3f43d7

  • SSDEEP

    1536:vJAUmn8r3jws/+e1Xx2yiCFH0B0qLPX5bizYFgxOJ9+Lmf6G1b:En8r3cs/+e1XxySUB0qLPXEYFgxOJ9+s

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\HellPr0ject.4.36ver\About\shily\tuner\rephaelGoxesBrasses\phulwa.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba3f651c5fc5ed111ab9145990986178

    SHA1

    7f21f74bd8131dd1577279881760f903d8a238e6

    SHA256

    151f0ae707a274ecd5a4edf6e729bbb6c73694374636b3f7aadc95535337b703

    SHA512

    6e80bad2969e403aca3f1b544e3d2f396bc72d695e9cacebe400830a49dd8f302b4149e398c034288346d7e5fad626d5db99698e75973b9ff8dcef5dddb4485f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    962d81e3485ff3e170c33b456fea8d94

    SHA1

    2fa156bf9c764514d7c67db09654fbea3db41ab3

    SHA256

    ad61ecad585c1243c531623afa1f9383bba6e4ff79fb343e287e77b3a16dc595

    SHA512

    33588fcbd3029d0f71272fbfc9e21a1b537d2576ae90fa2c46728940ab9caf5c4fa1aab6b341b409f3b763f4eb31f12891472e9aa0607833ef69bf10b78da2d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d83ea267b3f566875ece1ed2f09311f2

    SHA1

    0f6d301a8833ca4b19d790ee0ab822823dee69e5

    SHA256

    defd12f7c7c634aa15fb7038c7e7e00302a64c98384aff8b796bbf6c06ddfe21

    SHA512

    b97649f630817029c0fb0c51e12da58565469bda402a32b35a87ab23416eafee19799950e30d9139d1663f76e7e4ac57a7ca080d4af424533a6b4c8f2dd9d44a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5238c650b62437054e4c90e2804c81b8

    SHA1

    cfb9cbdb8d6cbab7a810dbe24ec44c9bbf7ada30

    SHA256

    041e8f8ac557aa5a6ccd05184a0a606a1e17e8406030fe7cc014000b4fdcf17b

    SHA512

    9da7bc5852d080758a8e4b2023bc494f57c14379b91d6d67257f2e700ebe414ac7586b3cf44677ede4ebf66f3d136fb605d514827c6a03f5df65ea4051b3a854

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96f41c68bae22e4894471973ec4a5c48

    SHA1

    92126708881a695f89da5c3f92d7fea659fb1d63

    SHA256

    8ed3253dc62512520faefcd13174ba154d9575a420df4a1fd3c13b3c87592431

    SHA512

    7b38de2b8a3729e7006768073fc4e4751fff9f498edf530668a39068513ba0782147aa91a8f97a4f6ca972d305cee60cb35b07652214e3c321f2a96197ab25be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b314da34af415e5f7e58393d11914357

    SHA1

    ff8410679c60685db3c0f3e7dc7cccfd02bbd627

    SHA256

    2db6614518a920c6559f6810080752a81e166bfee615d333a2da80ea2d8208ca

    SHA512

    c01613e25414f58f0594514ba2cee3a64da1bff6fa7d8c6764913864717ae9f7b9fc7b9e19fd1da824535a4b51c19b83cde473c083313e529313cbc90a630277

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cc023606d4b1eb75599f381b92c85d9

    SHA1

    4c443e53517a01a6e91bb53b69fc211226a43eb5

    SHA256

    e33b2c476e9a1a01b4754d1292876840b8598c1c2aae8c7f9c41b77142af7686

    SHA512

    c5919e7689e2699d7d318715c05878bfad796b774e7ec94309f6a5c225d447261fbd2de635aae176d2c7d121da53d4b1e85be60a0aeadeb5b4df2f704712be91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc85f5ea810e9d0497a367ac16f0bb58

    SHA1

    04a1a197747d90bf48f1dca34ae3c95ccd00a613

    SHA256

    5baef1ff170e468989cb4f8e15270c9de68f2197af98f77b0e1ff3c4b94a5ad8

    SHA512

    24385808609e616cd36b8bdc1bcaa0293d04dccc48a7678ac1f05006cf7d95290e837c7547a3ef18594148db5c9d72e386ce58dfb1f38bbf84ccdc1e730ce8d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95f173e2265ff47d12f8be05b68b68bf

    SHA1

    b7b78fd1b13a295e1e809539fa56f6b1ae2e252c

    SHA256

    6d848da733a69aae2c198c4e36743b13f373d869cd092e6c6c8dd9de37c8ccc6

    SHA512

    8c7d40f81c410964633541e266052677fa263b0a2dd238d12bf3def6c35064e01e9435aeea9fd9956c18526d937b677a4eccd0595f7e12633d3ebeedc2732494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c756f3f833833e9c0ebccec1fee9dece

    SHA1

    07ebd3ba4a3deeaa12eac7168c664cc1a130a36d

    SHA256

    42a3af08044405f4129a7be75a2016f900729a4d794fea7043146b674ce39810

    SHA512

    76c54c57ae0532b066e9c70e6566e9d62847c3f384680a395f7c8b69873086e6201194e2ad35a1342e675f73388564f30931884504d0547d6945e25310151489

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a77edea62ab09bc4bf6a87cf220937ea

    SHA1

    9a0dfcebf0935dfaeb9063b96e1233cae159570a

    SHA256

    8ed11bddd9d2cb2b9da247b55bc5c0cd721adba65625d3324ddbfeea92318c96

    SHA512

    cb2973ff8a6fc992704bdc34031dc2bb39b4882bcf7404cf37130e12f25dfd6370a06fdfcee04cd9e6e1c5e820694171fd65821ac3dade9977eee366207fcbfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9be8896e10912a24c173df62462345a8

    SHA1

    746579daaa6a03b642b5b4c1df0dc78cf0f9bc0b

    SHA256

    37bdd5d778ca6d8aa2199b99661e5d906d583d6fd5d1d9d5bde2fd4d51d3eb3d

    SHA512

    b989f1070358a5367f0231840e7e032834b97094069bd144ad4c944f60ea12020f7c5d87b5c728b41485f8268250715bab05dec8b99bb8b5a268e7b4b87cd19c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca32ab86479e963a59dc84f1781c0a17

    SHA1

    48ca9bde4f81e6e63f149dcdafd50d0eaa417556

    SHA256

    dde9b934f333f6e6242302eeec3d9d5c70b3ddfe95f03abbcd1e53b35c82a6e4

    SHA512

    1c4f6e145b82a1737dfad3e9da892833833473e1e6bd9c4f3b042d2f2003f92b82815c450d58330a8243c22ff02b366d338f16f506cd16cb1268b9023c1e1bdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0967e6dc0d41c0b49a82fe198ba26c23

    SHA1

    28511a67f786b53e99b03391b7398250ee61fae5

    SHA256

    7d571fc6b22a0912c720d65f2c0333429511055cdc18f698872393fdd22a989b

    SHA512

    7b69bc5692b1c7eb4a74e90c870f4cc207eafaf4139a7ad132cb5d56753fadd4e41d3af519e33b0a6088d328be3ec4e1bd9807f9fcc9d62105cbdc05b3725789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    406cebb043946ca98451f02896fb1bd3

    SHA1

    9200d13f20b19f5250283f137e1791a5fad41345

    SHA256

    b79b0a01b446cf103987fd621cfce53d3edf06c9dac1478f61588cd90f23720e

    SHA512

    dc31f3819c3101732099634e5bcdc1aefd2d8996c7edc525005ebcc8285c9ea69c0d298bedcb7ba035806451c8ca7e9d0362f0d69cd77058fa8637c22117bcf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b4ebca785cf5a1e4603625bdda41674

    SHA1

    5c184efd7ee7a0d500df0219702cb6403c9e4859

    SHA256

    b0f78b20e1e9e507c3242decb69a7a67a403b63b4eb1cb508416a574fb3b36d3

    SHA512

    3405b53e62cfcf98a3171b2a8b279b3b2c92fdbba7098ca00b51b79385b35f0318cf6bba46eeeb9e6833ebf6394d8bf5fd0b0a71cc340af2b40d287287ef5829

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5c1fbad7e61fd3303c9a61d711c74e0

    SHA1

    5ce30f62d11c7920fd9bd4b900621239498ed019

    SHA256

    7d2cbdcd8784dfebfe5601b15a310cea72a7a0255a253c249226b3865647cdf6

    SHA512

    7a6cc51dfc592d1a9b6c0e0f97e9c356f36ae4e028b8bcdbfdc0a78be3a7f294aed91698847084c20a8eae6e6da111374fec71b3101cd0707eadc7421c08f423

  • C:\Users\Admin\AppData\Local\Temp\CabA6FC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA82B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b