Resubmissions

31/05/2024, 19:12

240531-xww3haah36 10

31/05/2024, 19:08

240531-xtpkmsag46 7

Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 19:08

General

  • Target

    HellPr0ject.4.36ver/About/shily/tuner/rephaelGoxesBrasses/zingyAnniv.xml

  • Size

    85KB

  • MD5

    524b30964d93734957a736811ae9503a

  • SHA1

    2069dd3ccdc45b31aae00034c3e32b06171917a3

  • SHA256

    131f0dd3844e19fce7ec20d8a7fef9e6c08a1a38a433f5f6f8740c90a4fc46d8

  • SHA512

    c4ae671cee7a42062393d7d8871cfb3a99183917d9712afac76ee36d616fe1901290c820bc9739960f91fda3f9ca49e76d5b6373858875c7a0f22877a0c3378b

  • SSDEEP

    1536:ICAM8JKklCb92oiQ3sX01ZkZ2HsqYkgt/y1vcdN5jYmPb+d6Bx:AM8JKklCb9223sX01ZkZ2HsqYkgIGdz9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\HellPr0ject.4.36ver\About\shily\tuner\rephaelGoxesBrasses\zingyAnniv.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c6aa69d143f603c3b9a47dcafd93dab

    SHA1

    9915769134c59f1dc139830bc9e61bd751813243

    SHA256

    a60f6b55c16ee62cbf7fb4139cbfd8181e77a4a81ff788b9dfd8095923ebfa3e

    SHA512

    525e93eabad5594d02778665f7baec97ad1226ba9a3bc0ebfa5fcb893ffcbcb5d39623dee9701ae65ee987c5044bcc7fc8f5df844d688dac7857db97622dabc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bec1d65177b4586227d628682b971633

    SHA1

    834b572f4faabca968843388c5373bf520753082

    SHA256

    d84ce5e31c8211a04cbc928f8aa31084cbe617edd9a03e4574034cb44c3ede18

    SHA512

    4e596e15762d39c21bd32dcef48c53c5bc17f498d8790f99a049dccdae5099ac077e26cf78103a0f9d92551ce550d62c89552be63dccc0ba677217f72f813382

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e797204dcd4f11d0940bdd14194fefd8

    SHA1

    ebad433a984d051859f9d739c91e9753d093e0c3

    SHA256

    a447ffc2b79e2b46b632b236b83a575ce34c1e7275c2cae8ad2b9ae3b1826a23

    SHA512

    0233427b67fe041b2255526d5b5b7c34938942c0ec21e6d6a786c66b0da176087da6c8bc2dd12e09f65089e9b046aa500020124951308d8391487fc073bacea7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee4e9a6c9705cc09334c82786b512d6c

    SHA1

    b3a8823935634d19b0b3c73c469ee983ca6aadaa

    SHA256

    2864cd060fd53530c50846617e88e0ab14c3e11dddb6891f5c92d09843fc4a17

    SHA512

    826752d56cd075b67b375a64d588d5d333482c21da6b399890b5889a442cf1da83ecd15a003e464a986233ee155a00110e8141ea2ca631012c13496804491965

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc9321cc475be3c6d0596f8f45c48f8a

    SHA1

    5c3e5b3c70de446e8a88b898a1a08b3bbd3b9f7b

    SHA256

    a839bf15f681548a25e8eabdec912b643899866ebfbeebff10fb16a56dda67d5

    SHA512

    aa0d65e5ed36518b80bc20d753fc874b8a83fc43af138361907a284508b4834ab1d7bf80eee49c6feb8696123135e956789c6c4b10d4970f6ff85782e3f21e18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7536bc12c7f374d9f990be043661fb2

    SHA1

    d7281d9f9cba9085e497843b3e856bc4b4c05d2d

    SHA256

    ef783e92527349adff18e585376b3b225827fbd4f4fd0667931fa1320b49b18f

    SHA512

    1fbf59fe4fefb7e5c34198fcecdf08b0e06a674648f884ffa274f02fd1dcbc88184e5dacd1c7bacd90acdcb625b86d914af18acae8bf06e4f07a9909366219bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46184de14e0f860af40423fae5db094f

    SHA1

    732dfb589a9182635f26b192668ffce8b9855d01

    SHA256

    b6bfb2367b8bc6b3aec289020272ad64c52ac152b6338d65d8dc8a57e900fe84

    SHA512

    e62fffc773a37923b0cfcf2ddd8456dbc7a5e8df0f4768cbdb9e46b5c639d157b4b22407ae13efa5f3445ed164f49ca358e351c9b625fc51003d4944fc2b91f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a42878737e756c11e1971d792811bb2

    SHA1

    e08b39e9bc742e38d59b24465491a75fb5cd5a7e

    SHA256

    8baf6d1e48fd8aeb4b69be9e2612961faccac8f501dc37f74c1a5b6b36735b54

    SHA512

    a5eb15fd914c369891b3d8331ec1a58161ca8b16f6625cfee8525207afffcf98b9131cc2218227c5cae56630cdb40fc2c1a62a8cd644caf736cc46010ff52e9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a847b0253ef7dc5aa0450fae2aa6448

    SHA1

    1661671bd4da9429a0b95c03d9f4d98455b4f0e4

    SHA256

    41d8c96498ef40524ca56341d31d28b99c69d20a74f44a74c8acfa4889405613

    SHA512

    5e7b0319b74ab642e96192b293fcf5b2d804936fa4e45ef2c442d99e1ba8687a2ebf34ddaf99108648ff3e37941211b6679d0eab99fc5d3c2cbb5683c73e158c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7bf7d953580835f9ad4c9c789af08cc

    SHA1

    4579703f3a7eec4f782f67ba91ffb17d4d3d3157

    SHA256

    60e00e2ef725c619f1a643eb343943b0c51595eb908a03a69b952a0925924060

    SHA512

    c57e854160fcb3b42da54ca17e138334b7dac1c5739ba20e3cf74481baa7f27b70c6521cad0e881ed1d61dfe21acc81f3d8b06c120d260df311b69133e3a2fb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80068ee15863a36134a7671d876b8b8e

    SHA1

    5db53335af889e60e03775369c53bf281d238a5f

    SHA256

    b8b3160043fc1c44b4019f1d9c6b773c07f3e6f95567a33144371399f9568dda

    SHA512

    7fc5bc5aad4572ce9413a8dc38cc4fc6e94f7faeeb24a9a26b9f1d0139226260673588e6a668d8ee6f4b8d8273ebe1cb91df5d495ab3b2916f718ea6b4f193c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d9be992502f3be623c9246c292c19ec

    SHA1

    25147b23a7cd1e0e8a895bf14ac63759a84452d8

    SHA256

    17f84247f003ce2081800226c8caeb469b95c711dbd84934da97b43b3bdd2622

    SHA512

    dceb569189ce828cd60b05d268bc7c2ce27f8ea46e3330cd4acef16eb0596c4d510f5ce5ce0d87ed823d8dd6b5657a829aab1481c3c35ac75fa732751411aa42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    293e722d06327ee2fe6021cb316589c2

    SHA1

    85cc2bde26e7bdff635ed34ebca2ce6ad6aee7be

    SHA256

    2144d946189ab7c54ebda28f6d7c1ff9807fbb5dc2fcf318dbda6a7feb3f4440

    SHA512

    22b15980dd9819d1d17ebba10ff1055eec7cdddb0104021cc5587ce51b89b1e82923f93950666126866d287b1cc0a94537854ae155d679a937d451f61b613e49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1359350b63407cee3ff9d4dff7228e47

    SHA1

    9a79804910a57d93d3ca8a21589e2093d647d333

    SHA256

    5393c87034cbb149e2bf66a3bd917e60cf605c98cf26c942f5c3d83f8dfebc5f

    SHA512

    87664aa770645d78a13e571d5e6e31b800e4ede7b064fd10aa1f489df359443a70c1719711d6a29ea84b1380761be59a13ee5dda51b4ad872e4da4683d33e6d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87623709ca57c0e64e8f4a4fe72da924

    SHA1

    f96043f1214ce050cbb01ce00a8e857cfd76e454

    SHA256

    377abadec910a685bf0fe0daa0f893c66bde9b7a399e5501669fb3bf92494c92

    SHA512

    8514235e05ad648df4beb7229102829113763cec99b844061ae1e9ece790a743448f335f85f00412571d484a55d3632345d0b4ec878e7faa7d2af09927ada60c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99f4b28224dd4cd2c75e32c4fcd5b632

    SHA1

    c62b9eadd9507dc5ed73b3a7ed10840e321659e5

    SHA256

    4847424281a72a6aab5152ea5a405c922c71d263f4bcda969afe2b3df52187d1

    SHA512

    80246dbf0db8b26e62beffc75033107b6e588cebd114d26b8233e733cc0d9af793e653dc40f79edf48ba35fbba851669dc4cd2912eabc92dc51221f1779b63bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    508dc5d43bcc925c8a9c301e2f97d677

    SHA1

    016d2d5bb90d8b1bd2308d2ff38aa15d92e48d93

    SHA256

    d8e8b30c8060f940bf5a0ccc402833273ece4b06215b00c7b1aa3e6c1176e3b6

    SHA512

    fd3d8e1822d7ff0d0921988cdc59ca511f947a647d95c10c73a8fe96baf2fe849e60da16bc39aeff1dc6352aa8fb54a4d5dd7af67eff64f017d43566be07584e

  • C:\Users\Admin\AppData\Local\Temp\Cab20CD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar21BE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b