Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 23:20

General

  • Target

    $LOCALAPPDATA/t7x/data/launcher/main.html

  • Size

    3KB

  • MD5

    e7e0ab080d5ad004eb055f2c845aadf9

  • SHA1

    d259e512834c43d743394456f1f891b42fbca0a9

  • SHA256

    4539b58a87ca86398ddb24bacc9be1195c5166cbfeecb3aeefeef360165ba6c7

  • SHA512

    2625af7c3828e5cf0f36dbaa7dcee3badf03debf63c07f0a7076d713a2de2bad46dadb8a2e3df43636065a5acced3726c9cb77bc5f0fa9da3e9d1bb52b54c3d5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\t7x\data\launcher\main.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ee99eda098e9ec4a982846744bcd680

    SHA1

    17a1e884f2457ba6bedec9beb4b2a7c9b19887e5

    SHA256

    ee73d00aecbfb8a01ab0f7fbfa87b87f1bc89f752e97987a4bfdea82cef23608

    SHA512

    009fa3ca3e8bcb7797750a7f94b5f8ad784d351754eab7842cff9e853d86c11cb546ce61362212089a9ba9b99dc149a76c3b22091b1df31751a1a7f4a7afaf62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d76206db471b6b25a215cddfbed73f34

    SHA1

    f4ea94c673d011dec3e0d18590f291bc2a23291f

    SHA256

    cf64d47dc85e524abd27b3fa96b679a00bb0d21c94d91c8cf2987157d4304545

    SHA512

    e8bb35371c4304c8381791120d3ce944c814fea64f886c6038cae0490dffe23b4885893e8cb49cdd0ab7ccc65c89f3554c05a514e19e79b43d8387798d72a0db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6e2b7bc5de9ac743e64c27af2242449

    SHA1

    1d798d74531fdc707e6a5139124a6dfa76eed12a

    SHA256

    df4b518ee782f0143e98205dcd1ba4b655a0b7f5a0c6438be51c44cc4d2e5a72

    SHA512

    5dc82c9b4028bce2c442081e2f90bd1007ed7ea6568d68628080fbae51139d8718c0da7edca0a1ad790cecf9d50718f747ae700bd176c44f338bcf85892b3942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    434c11764505ad083510a907076a5d49

    SHA1

    d2c1ca9fd6b98084bee6dd19bc2484d1a88ba9fe

    SHA256

    1d5fdea0ce44fa88ad81a8d921c7b5a09a0324c352c9f594c1c9a2c3be994e08

    SHA512

    941b1c0d751a0891266df9d9ad41eeed6cd4c48865b3f998aec04a64ebb6d33350e4ae0db31e77621b8943b42e5cd78a66ac5f51d109498e90788d150b0de028

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    626ecdfc02b628e95467f03e7bf729d2

    SHA1

    b9637f1e9d2f8295f40895c97ff369fb81eda345

    SHA256

    d3ca320605017cffff3e99aa1c39bd4d34c17b1e2098609b83b1959789786f42

    SHA512

    692ec2cc562feaee561d121c1aa851a588bd6942e75cdfd87c603255621915d9cb06772a090ec6ec8dd5f9d751eee3a7d496463179a465f231ea56c026066dce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b510e464b333914773b468d02be91f8d

    SHA1

    1445c9423b0d2c96be2880fed58d77e043cad76d

    SHA256

    66c216a2525922734d67cb2e429d136435c994a8525173e7a1d43c5ad9e8fa04

    SHA512

    2005ba99a90394d0d815ff5689e4d1c6dd765a1ee7e7f169753c9db879d4bb41a895a9818e0478beaff1bafe579cf425a21d4df6bc208a6e7b92ae777c469dfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fef306c3309a357ba645b3f5fc8187c

    SHA1

    e577c31e11b55e527017f8595704f8af2700477c

    SHA256

    8d0bb3837cfd2ad1e4a76803ead760f22a66517881a9257f5e6b97f1278b9a19

    SHA512

    adf9b03281be8ff68468168bb988749274f581e27ca0bef654849c461a13e081eda3754075ad84bb999086e95a1e1cdd7ae6d69d4b1aa85237f5a223e963e3dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2d442ecd5ed742076f9dcbdafb8d8cd

    SHA1

    c8ae032ad1188124b88653052aed5e7f6daa1fbe

    SHA256

    e538e1a7894037774e4ce70ed24922dbebcab8e6d625a4809df96fca8640948a

    SHA512

    af206c5364e8850e9757b8d61e0b02303925ce1a4c09a9a5e3fd2e1e9660bb06d7e6bdfc14d76219671473e20af89a295911c39f7c2487814c2adba22466f170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eea89bddc839c158be7fcd8a2de0c079

    SHA1

    2dbf862d5ec99daa704af69dd5083310cb34a58d

    SHA256

    eebe2bc2240970ca974a5a30a556ab3585d3a9289be2dc909b2f8ab13c7476d7

    SHA512

    8d914a9136d16c54ef43c219201b35bfc90f45ba83ae1f6ae2022373f4cb8fb0a71fe1c9526817b5c2bddf5cfbd092977fc4368cca3c622f75f33497e10c8f56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73ec6da0c0a59b2384681df36c59b3c7

    SHA1

    06d7b59f1377472d9f71c32496322402b33dbbf4

    SHA256

    ba5cf17572890b9affee3aa3dbc96864b9b2cbb13e94ac135485e90f3d74f2bc

    SHA512

    607c22cf6e66d52f494adf401154bad47efc69ebd0fd26e487396364a2c394327ac6777958e87bc09f46f279540d49f8e025490f1cf18a19acdc04089291a036

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a86154233d87b0d8d741c23380bac12

    SHA1

    07d56eb15f4dfa30b5ad432a2ee7c5f5d1ce9161

    SHA256

    c33e8e836267080d60b8069ea3fc30529fad0e8e0b0f41eed9d5fd58dae11f9b

    SHA512

    d99c42f52c8d22c65d6013cabacd69e3be8d6a5540c9ce8b4699199374d60310680fe72430461b9d0ba655834e496a3ced6ceda14160b98fe776345a81a08c6b

  • C:\Users\Admin\AppData\Local\Temp\Cab8FD4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9054.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b