Resubmissions

31-05-2024 19:12

240531-xww3haah36 10

31-05-2024 19:08

240531-xtpkmsag46 7

Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 19:08

General

  • Target

    HellPr0ject.4.36ver/About/shily/tuner/rephaelGoxesBrasses/splite.xml

  • Size

    47KB

  • MD5

    4474513ad9c945bebe299195b1eaca2a

  • SHA1

    a65971878cfb899fd370b94281ab4ecef0abfebb

  • SHA256

    66078d9481e0f063cbac51508b240c40d9078680c6cc21b76a177c96a589a7ca

  • SHA512

    83934b2d5f49efbf0f0ff952803413da78505ce933dd2af9d21b7aad5603e5d2280512941c8eb6b67439e6673271a8c07e9473870c3dad065ae890b188ed5281

  • SSDEEP

    768:pkLcZt8Kb90oMR4BB+QTMjIjkXR03IQsm7Abzf//xP:pLZt/Fw4Bzjky3IQsmsnhP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\HellPr0ject.4.36ver\About\shily\tuner\rephaelGoxesBrasses\splite.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    e6dab6390041a2d0309e748501e88780

    SHA1

    1fae8a9d0a96ad650a3b69ed9025e711aded0853

    SHA256

    db1f5d7f02ab1413fd50b9cf27aa74d81a93b686cda6fa97714e01c29fd68a66

    SHA512

    f0a8ea0376c1ad99be5ab81d5bfe9507ea250d3deea2f7855b25dc61e1ff4dd60da0f5d7ee112671a0a480d6448cac5ec29855c0b1e8d2785328cd9efb34172f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    777390451ab083773718e7a01eae49d4

    SHA1

    e7777516f49c4115b6ffc5cf3ecfd76cbb910a11

    SHA256

    41694810656facae75edd50eb206fa52a62d48b62586810e17b2b15b4aa7d1da

    SHA512

    071a7de745b4aa6b672e8ca6bfc367442f3ba7eafc0f2aabe9f2d85a01fd3437d431072778b86580cd931cc76beb7a6a1a06238780aed7392bfafcb94c94f5df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fd0ac56574b56069233a269fc435ba58

    SHA1

    fb87be185fd77b2fe9e80ef0a0929eb959923351

    SHA256

    6ed6fe5ba240ec172fcd2166932cdcdda5665e6064f37e976c78219ef1ec5904

    SHA512

    bff5d61b505e8d15ad48caa2995a0ecf9fcd8f66566dfc2c3857d4113edf25ad43d6082654b3ecc826feec8ecd3ee8ec099d7861a934f0b84d2ecd00ae65907d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c65e65825ce30047ce892de199bae502

    SHA1

    6edfba8506f583ea3f76a56e5415ae2d231ec140

    SHA256

    afd1d5bf091ce5bd8c125fadae380d4e785f3376befe360d83a38c6e0166632e

    SHA512

    e1c50e87a357d3a14c93f42893ada7a0279440d6bab62ac8235a1481244517438c0794032c48d1a5da93f33f8e97ff2cd924a0c51e635d548c77b394aabb6a96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ec5fecdb342793194cf3423d9e7bf19d

    SHA1

    f6d985a9d5ee1ee4885587af172249cbe16199e0

    SHA256

    1b5241b72ad48cf19eb029e2a3e6aff328ced66708bc155c606c37d24cd8d0f7

    SHA512

    b17ad2bc8631127a579525c4f7b4d79f31c618466c52edf3be265066b3538d79ccde47c60fdebdee9260adce807fb7224aea5159697a3b78e8689bf7143928d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    28bd7ac5baf1502475456e85cebd72cf

    SHA1

    d217df59809793b8316b38267870c76ef5c17e52

    SHA256

    f7e4e77e8a092c3dbb2c266d9ba75ece77443baad4ce1ad9c52ac09f7c5a51a8

    SHA512

    ba67e3fe96368a4fa7d167dd5d90123e72ad160803869b7165cdbcc166749bc083b39e09a994a9f01308e706f8b6ab2bf4bb7f5782742d3da19630591d2a343d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    12bddb1208ba8c37eb9ff9d34275e98b

    SHA1

    e91f147a93dd6a19b396722e9257b2b0f4c4858b

    SHA256

    49b7b67e5bba152e9a344ae8b38f0967d2da85c24a925b3896d8325f917a04b7

    SHA512

    a082ee5b670b5a506a7e5a1ebaf5e46261450536db33ba8976a465ffbaeb2a1fd1f21bf0c038cbafdaa969c45adc3189bec6a9ec58d21bd5aa92c2dd060a3eaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2411ef8d82e58430bd6160e23d782aed

    SHA1

    aa8b44095cdf4dd07781dcf0cd391c4fbcf759b3

    SHA256

    8160c8e899e829e3f0e1b57906848cf2056e439ab1235aed682aa1fc3c6c4bbf

    SHA512

    d663d6d0965e72ea57cac2bb727b8b6968a0efe7debb2783b28494da01b1958c8035097711d0cdea8e450e08ba3ee8fa84edaf83709d1739bbd88bc3408fcd06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5fbda6ea0d2e854193e25b1916c7a7e5

    SHA1

    f8e90ac7a0bdfad17ee308b8dfc416727ddd8ea4

    SHA256

    1c7f20f26185563d17f01c2da1956e132f9194622b8193b7403af62f3777144f

    SHA512

    56a24bd07424a54d48ddef2039c48d2fcbc3e95919d384d2ba491acc06c238a3e802b906249e9610260f6b336dcbab45a7e8306445c371165c4a0d544d536bcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b0d12d5977fb05f412466a70bc837ff2

    SHA1

    c564ba2bbe3f9ff6b85f5fd6209cb319386157e8

    SHA256

    ab6067fb9c2436ff1772b3cc23f2ee2457a99450afddc3d5016c205e5cfc10ec

    SHA512

    5ec602669ceee736761d1f283d7cb03ca804ab0e5636a89699addeb827d6ea575182ad3a6b2083518973034b7d360671350b17825b3881d3ef75495dc860f637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    645ac26e4da953f02a8616d815fabab5

    SHA1

    12f88d60ecaa06e30a1a85a551a6178f22fb5ac2

    SHA256

    be80abc21de41dd2fe1c547e246b0209c2b1521afb7888880028c360535c32fe

    SHA512

    19e4c231447a6c8bd66a5d0255e4628951bb90cba1a51b567681123513163d4b150cb6e84d011ef912799ba30034072571a469091e56e98db65550d6722b2678

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0621496bfc5ace45bc1a5348aba9b44b

    SHA1

    9ccae9c6a2a3da2c67820c2dbd9a6889968aedfc

    SHA256

    16e09305a7ba2aaf16e8bc5ab92b2170c508e13da9f6a8a0edc4b65ef5fe8e9f

    SHA512

    4ae6a7a7ab25945c2e952f8afe56a4fdd3cbce8dc2b8b6aa58d5603641d59bfe51a1129535812c6410ffb2e35cc2656d5a4bc64f2449096ba3844dbfe2106251

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    847d6761943c19657c028a8abcc289e0

    SHA1

    b8818265318105ea5ddeb3d4deb22bbc5509341a

    SHA256

    ce20176888de5fb691484663e38d023bb25e288e14c2d0d6d4c0f4375c7fb881

    SHA512

    0aef5127390d85c29e48e45d15bf7a1c0a1a35186853e3ff28c5359a40e9085f6bb0ca9f7a4fb330e4c7d1b95d45801a86e2882db93f05b9bfb860bb42b1ce73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8efc6a714470aae72c482fd1c00c8447

    SHA1

    3ac756a202c7c8e42c11d5469663a43b3c5623a2

    SHA256

    9d3511d385c73fe1d0110171e3f6a640ac8801b1ceefdf42e959c2ee8486763c

    SHA512

    63bbbf4df1c26b026d22824fccfa532adb46046257911269fb70c99ee026e67b34855edbf3df19e7a4e6c694b2f751dd364ecc300f6a6e826c492eafa6aa4c92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    de8cba61b89e43832b852bdf9598f29b

    SHA1

    509b5aebf6e857cea2000a5bc357cd075516da0d

    SHA256

    ecd06b6df6eaf6da8b7a0c95cceafff1ffecaf5fcb363d0907e6728700d211c2

    SHA512

    8fe6d7a91a1afb4fd73c961dc25668fd1ed5085564a797869522952e117d6694640055b40c6c808103b8e6a8d353f568a0b8833e8c0ceeab19d713ace00a92fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b74f5f162c38b8ab3f7a723a22bcb5ad

    SHA1

    33b42512f9188948dae9eddf2f8b800319df9786

    SHA256

    29dc6c7470db3f36e224810c8f8755a4814493d288722fb60a144e76c6eb9a85

    SHA512

    93eacffda00620cf10cabde638f1240fe367671d4ff28cb73d61b3c056e38ed2102283788219c5eb32969251318d64a46fe311ec91f7ec4ffd9df20ce3468ed9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6bafc81ec3f764e8bc434f1812a1135c

    SHA1

    fc43bae11ac473bd3506db05476e21d94e5892f4

    SHA256

    e484c0ebdaf0370274c5a0869ee17f07a84459fbff132340be23e67a6f5d94f5

    SHA512

    8634b8adbba97961a374e9de999afaeef3f41d6ae4deb37862c46700374f426a05530c60c44847d467f6b290589f4a3a08c2b3099dbec6a38f737b2c47b3608f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2bce3a264e638bf4d084324116d100ac

    SHA1

    6f20b57666690b75aa53e5513095babf5c8a972d

    SHA256

    b6485ef6ce5810304ceb4700b9941f2385b53948767f414eb123d1029288f64f

    SHA512

    9da26b03cae56bcb55a776dfcf5d313ac01ca2d06652b8ddef0c97011d9036b1363d520416c3dc0c3f2c5fafd80d26c47ba6d9d807f22d1afbe2ee8bb6d365f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5588210059f7e15d0808d161e62abe33

    SHA1

    2b46ce6359175dba2cecdbc7f2d7aa6b80d77d2a

    SHA256

    0f7c62babba81c40e414c21f367f7946c496fa52df16a9802e7570e71ea41acf

    SHA512

    201a392913ec07538045448a0eccc077a313896c8b7fb7306ef5f51c4a12a6f1e0086a33910e46ab8e791e4bcf921288501cf8aaf43c0cbd624cbecc2365bd3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar268A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b