Resubmissions

31/05/2024, 19:12

240531-xww3haah36 10

31/05/2024, 19:08

240531-xtpkmsag46 7

Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 19:08

General

  • Target

    HellPr0ject.4.36ver/About/shily/tuner/rephaelGoxesBrasses/zingsGeobiosHemp.xml

  • Size

    110KB

  • MD5

    aef0bd4e837167b4ae479823b8889082

  • SHA1

    8de63f4bf3b0544aa2cf005f322c5aa7ee54071a

  • SHA256

    6f0d301e56821ed3bf42a2610ec329a6f66272c6a15820150903600e52680b55

  • SHA512

    1148e6cb3a32a8ecd18b86aa2fbed543a56e2ed1865c2fff0356663b0e394090dfb5eb3aad77099483078cff3ae1e41a71aeef77761d09f9bdd438254217e660

  • SSDEEP

    1536:dHY2yU4AxNXOxjGMsc2UR9nr8nKToSEwh5hAkJskVTaDMLxiLGkGKXXfYSJ9Scwl:vy6sJb2+nr8nKUSJGxkVTaD8xBkDJ9Ul

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\HellPr0ject.4.36ver\About\shily\tuner\rephaelGoxesBrasses\zingsGeobiosHemp.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8b4592601927a5e9e415cf090b1a727

    SHA1

    c9c1115a677c916b75a26b95678b2d8218abe5e0

    SHA256

    65f8f97e8ba3cdf06d0936a7e3d93bf151dc7267cea7d25c48f032f8d1ef1e97

    SHA512

    ba4d153573b1ae124c641d2cc4ae24ace82a2d37ee05f5d02678d432ee48a9f0739f84fb34dd86384fd3d2824eded7ab3f2f1823f4310a91f8a3293622b464bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9defef05ca46592f5fe753055645e3a6

    SHA1

    4d64f28a5068a978e1c5bf66085e306e92d752d2

    SHA256

    a33b879d4cbfe554f73ecfbb60e4225e77e944f6961e8337a38f330b1dd59312

    SHA512

    87d1a93a6da1aa4ec9eb655bc64c8322cb8bfe0a4e80f8c826e127b98db26c82086aaaf28eace20537dea7a80cf496f8e2c79fb31d25ec801766cb7c698daad3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c85d487403febfab3530f2d854c2d3cc

    SHA1

    c23a7ce466a043bdc21d2c8adaa6f50efdff79fb

    SHA256

    562177f50a146bac60441c3ebda52e4362a046731c095f947216ef2f473e6e9a

    SHA512

    77bb0b31b83012f0795ecb1ef2acac1f8b5d4effbcf43cf3080f310d01731d833db2c0a98dea23adc79c0215c757eac698e8891ea2a618052ff881bd583f29b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57e05712dcbe38a62a4660c14dd2cbaa

    SHA1

    7d7fd95b087c1329bc2823fc2d1ce663c7e6005e

    SHA256

    78f72fb9c1de34d82561d79c08db6d0aae06be9855712a04aff35d3e41469624

    SHA512

    f9ff4a0bf4c30413ea4620e4cec3edb9f87f0f2baf6887a39b109a11b9fa5b93dd51aeeb7a1dd72a9c4f660ba17baed75a74f33e5acba0a7211a9b08d5008808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5a99b827d1ae975909cb956e09843a0

    SHA1

    fcb8775ddd3deaafb8c531c4c53ee0a7039abb5d

    SHA256

    f92f70f6f821ff427cfee5ecdd7623f2ae140d512af3c3e215bd8e59e7e33061

    SHA512

    c25d0257cfd45e3728a226aeb9f1edd8790d9304b238952aab61faa00aea03745e0e04b4cc68f4db4d418075523cc477db13448dedd3f73ddc5a7f784946d576

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c68f55f0216cc18527a3d0119450f176

    SHA1

    238d5fbd71d4317718bc1debd6fd3b98ae6d7f98

    SHA256

    bf90e16de7b5dfdbe244f17fa771c308102774267b57db36aedba4cc668d06c3

    SHA512

    6188cf462415e9f954bd95bf387813f4086295b4bb2ccfbedcf9617cc020ddd7914515745913cc9c47f72aea6d6820f860c6674f29334eb2946cfe657b440d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32450ad6e410dfaec18e55d1b35901fa

    SHA1

    9c1f4689ea8b43c7ccc660093ff6d00f8adf16ce

    SHA256

    6b2cc77b2da0f833a75da8a31390338bf73023d278c29ffd9052b67c91eef579

    SHA512

    ccfeb97a691d0b968bb64e51f96504c8edace213ac376f14be5b5d0a47a7601edd57088fa9bf797fe06734996c9a8b7c211f96a7a7943cff33cd2202926b3ddb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb5b9497e52db050956edc6429137a2c

    SHA1

    4b5264dafbff61479ee75e80908fc1b1e7940177

    SHA256

    676d0fd71bb577a64a9c8ce9a6e01b6574133c532705e9411f0fbdec6c079b3b

    SHA512

    621b75328aeaa2671d8f89cdf9f2ed6cf0cb4cb3b5b194aa7c4937997d363d4f2b9db910cb59760b2f78f1e90eec6256e54407c450ad90901329d0399a3be8a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1cb35d98c7c348d277531263e5af1a2

    SHA1

    2ff30f0ea2365786ffd7215fa182433dbd74ce67

    SHA256

    b47a21478670a1198f28cd7fd4b996264b5e3ec0edb5c4faed1f5e0fd60868d6

    SHA512

    302af8cc0af30c564596346589b25977da80a361de1788df7e43c46c60c5e24e26cf0cf2b5e810a2c2afafb78e6e504531c8a834688ae1c4b41f84b21c28ba0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6266e093f0a5759b77f423d56f50d2bc

    SHA1

    c74ddb7c629cca68dc7325153b0fe4ac5b413805

    SHA256

    2e48871bb0a53bd1d8819be6c7069174f84430843459eebf5f871353fbdb2ad2

    SHA512

    05fea6e7c2c656afd9573a8cae474656bd8e11bd1cd7efa4a29077268edcdd42ae93ca38ada61eef0bb8def5d74f8c777bac48922e0bbe6ee29f03dbb82e2315

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15dfe0c27a2c39b060bf6c3efef3c67f

    SHA1

    45bd2b4577dbb69350b1fd82147d8615b6c8df6e

    SHA256

    aa79edac346bdf1e1ca4bbf4e4a67f7b589fbe3f5db602f371e2e2202c97c25e

    SHA512

    050d4243f3f708c980d7213b523db8439d01f901fe5454f100bfb2e922b01d4c7fc9e71f825fbdd6241eea6b57a0793e67150067288d1276ebaab23d1d82687b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c9f10654586758d01c2617f08bd8f2f

    SHA1

    64813ee37fd7028c6fa68b0adcfc44f1ca551699

    SHA256

    c7ff6bcdf312ec67d59e47f47bf93df2fd1abda2a72c751fc84efcd5a822f792

    SHA512

    1dbf663eafcdf0f8c835cc9db70e9ada34462e100a0dd8f1969021c8a0fa932bc7f675223f2a32278d1d2d0f2610770743e05f61a287044c8301a01c6e041753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6602467e58ce7d1b56e907aa1e2c27ec

    SHA1

    984259cf91a7ce23c41576d9c582ad4663279d84

    SHA256

    3aa8c08fa8086f98bc4cca4a11c86678a8138f2a2e69114247f56c4fab48a2d1

    SHA512

    febe990185d7dbf882d1286dee8d9018f752b238f740355cfc894992b64273cac92833a60705ebf7680e216995e8b081d34af71b473601b3c48641e338ac65ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0e2cd99cecb44f55255cd7bf4ca04ce

    SHA1

    d5c4f965b44bcd6e460e93ac81b0d10ee6118cce

    SHA256

    e184d0f724da12a6d876f7a073f75e3910c97f9ed9dfdc3cfadb7a40ce6eec5f

    SHA512

    11e2b124a3a1b43afe214954c41f45195e8a678b90c16ff793c6b3869801f5cf0eea4e1dbe3c03f07e0b06e30794bcbdadd70f437cf57382916ac4372c0dc986

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bdf796a444f8363e31d9c71f4ff60f4

    SHA1

    eadeebb2f387922374cd072a92cb5ab4aca49062

    SHA256

    d5b4712c7ee3e1f3a7452b6fe10588323ceb95b0907a4eba5b5e722342a3ee50

    SHA512

    73c947a89aba0ca73bb1e48e995385b33959e3fff5b205f49eba46f23952f004eedf9591f64906130e2aae8d1bd417370199162468ce71d493895b9caab04fce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f459bdc0d0ce442de93651ae95ab06f

    SHA1

    04c91f8f99ff3f32fb766d961e5be724ac62e00a

    SHA256

    cf5ddf83a4623bdd63d9ed88c0406e99b7021beff1d8e026cb7360232e715a45

    SHA512

    fec88acad9f0275dbe07f2140ee9c1dfe037089d7472a03ce57ce9527529c902741fc44958aea912aa2b5a4c50ea00f921bf3f97eafb700d26204cade6c33f3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b6789b9d48e20c56c42ef4536ebea14

    SHA1

    247d3971e87eaccb8c1b8e629a4e9d640532a426

    SHA256

    0314aa1d99e3698c337b50d0ececdf1ffe835e068f505e2b63e5c931093128e6

    SHA512

    1d9314e3f61b1bf405fd10b08580384e507297438c18c89d64dadb3c96ac54191f59668a15ebd568348d178aebda344c566e477ac6b67bead32fce5f092b5ca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    870531118e7619e43043492838ab78f5

    SHA1

    a71f73e90528c7e4a06d3be20d1005e22fdab346

    SHA256

    cfd6357b15830e4630f6055424e0591711bbf0a6138783dfc7fed756b1781025

    SHA512

    55c80ba141fa64759879994f3c8be52a492a549343a9907dc5c6c1fba511d34678c49d3d7f6ffb4a07334c35958502ade2391c321986e46f3503c8c20ad08cb3

  • C:\Users\Admin\AppData\Local\Temp\Cab258D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar267E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b