Analysis

  • max time kernel
    196s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 04:59

General

  • Target

    OEBPS/Text/capitulo_4.html

  • Size

    26KB

  • MD5

    c84f001043de292fb3cde60107b1e699

  • SHA1

    62d68e8bedeff38bd13f7af255ad4bd138f2bf65

  • SHA256

    17980d0c4384e316778b42e82595693da9f94f5db2e841f15d0e3fe60aa66a9d

  • SHA512

    151c5800d378f01a2684002e4ba03f2e39b06026a0bfe15b2550a26766ea7046e27f382d090bf445e787cd68b9e57d6a075197f9ec6f4b86e5cc4804a7ce2698

  • SSDEEP

    384:PTe1u5c5JP7UdW5J78ajHJ6ppkgEBn7kTkWqCQlZdpgfKV2F9VzJ0MJ3D:PK1u5c59oW5hTQpLEtKkVC4WKaVtpD

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\Text\capitulo_4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2724
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x560
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02dda6146be15edbed78a020f45390f9

    SHA1

    192aa09dece7ee2d584412099288dd92ac657107

    SHA256

    0b98fd99dbe64e44a77f500689a8b6b12f52c83d5439c5f9272b92317ff1f72f

    SHA512

    d06e3558650f528c7a9aa1443c44289691a38b48b7277cef74e2b5e0107445d242ec2552888ed558b4d22e06a45495186d02d9dcb14894eef9585986551996f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43206a108d30e62d2835f641abc9b3e0

    SHA1

    d3c40926463cc2ebc11cf77a1040619f622c235a

    SHA256

    e72061322a4e58a8525084101ae023f67703d4f859e2331d3773e949f24fb9d4

    SHA512

    0a93cce03ab0d2f897b58c4abef614fea3edc05881bf89e0bb18ce0fb4e97dc67fbfe2188fafe751a969f5a6a3b403e1c74ae8af04c3304da26066066bccaf5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b9983e68d013ebc26bed6772b043fc6

    SHA1

    0e0e076c644530c5a3761b7c7635b77d5cc3f4b2

    SHA256

    3f1473e861a2c3dd796802f86a185ba4dfdb3c56187473863b8b5933e833ce89

    SHA512

    6a7752f87b1f6c597eba2b8a1f3fba4ccdb071ef968ab436a84dc4436209b38c6155f0a15b75a7996aa14d7656d7d2eddfd0dcb56483feba827d93d3774ed92d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0778588542fd963e1237b631cc72f48

    SHA1

    7a3febbfc082d7d934c53fa207140a2390d9d73b

    SHA256

    43d0fe62c09ff3f8c8da97e61820f272e4a97ebde5f485526346c59c674e75c2

    SHA512

    d5ff898c54ab2b424ed3d824bf5b3d5ea0cbfc7cd1ee16e04308e1d5d8ef258a13281b2543441a74e421cf0d6d7c76c6cafae84f1355804e901263df8b09bdce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8649e7d6e1006a1b6736806134744768

    SHA1

    63982554a06a1cb4b1651ca0b34b1e5e78dd71a1

    SHA256

    cde4f65614d1a84d0c8010ab931e5314d64a970e9205e6cac0a9322b342a4fa1

    SHA512

    4e6410aee91ddc50bead220d0feeb25171b26360c820cf9010025b50d2a8419e803470aa29f2699765bba10cff21979b8412bb86121e7c6cb962ee159cee2724

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a8e71127d7fe4ad7e1e9a8d5f60ba6b

    SHA1

    a724d7e50dc23dc030ab40c358c6546e9daa785d

    SHA256

    776d5b5b027fb52fee958b290422457f2a3763d3d7b6d26f64c89e9f2bbdde69

    SHA512

    467e55c777383a8326b6ecf2c144a444822cbfa8233dd84800d778df8f7c078622bfc70b6364fc633567259c67516706041895298ccdb57ad1228bb3abc15fdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b990ef9d2e30d93f4816bf64ddca92e

    SHA1

    ab931313bdf4a6cd2aa1eb8b944230557706cc56

    SHA256

    268a500c782702d0e6ea822e4b18e593d4de563f0606c3b43c1db3c82ad2764c

    SHA512

    732290f7bd8a2565e6616e8ddec12ca5578e3ba0ef0f11fbb3f76803d43cf907262390ae3d04eb91bacf51d7be5f0e8b188575b754c8e89606459fb7117323ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80d643c82d08cbd217ee55a372e16e8b

    SHA1

    bce0fda24d399b75bf9296add0f37a3e611d1327

    SHA256

    68c13005a0ca715e9dbe37acf379da4ba7dbbadc31e94e43f6f59bd94c810ff9

    SHA512

    3c2670d006e0e19c3e2c0eef76d08aaa028af99e5b92774762d2b9bdee999d61fd7adc6545c14ab12e13ba6a559b6aea8f62be37fb0cb922b5cdb4b4c6f0b656

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2ad5a1839b7a9e8d724eedaa4d1ce19

    SHA1

    53e8a0c5ed2011a2ebd3284977ba61e24cea4926

    SHA256

    d1d293d25470f851c9e17ec97b838671c7f59eeda4f9eab72236f751bd46d8f7

    SHA512

    9073c475425948a7985d15762c1f82dc439c63da0ef6ab6c3e63a9a754d5911e86e80d6f57ae6b4adec4e81e10c855f67cdfa5c15f0652c936b7b228788c42b0

  • C:\Users\Admin\AppData\Local\Temp\CabC860.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC93E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b