Resubmissions

05/08/2024, 20:22

240805-y5s8ms1djf 3

05/08/2024, 20:10

240805-yxt5za1bjc 3

05/08/2024, 20:09

240805-yw4b9a1aqh 5

05/08/2024, 20:06

240805-yvjapaxajm 5

05/08/2024, 20:04

240805-ytpq3s1alf 3

05/08/2024, 20:04

240805-ytcfra1akf 3

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 20:04

General

  • Target

    sample.html

  • Size

    500KB

  • MD5

    335ff821908dc962406f501c43d6403d

  • SHA1

    213a3923ef50323f2d5f350e4ad97c886b3d1221

  • SHA256

    047e62c2d5a8082722a48bfcfbe5ed53d71a20c11da36113c614800a8a925bfe

  • SHA512

    63c4ba8da79a1cdc913c813d193f0cda64455e29fd5a4a9617d6898d95eefa383045917e8af6c940b7e7e6e76c28c9f6d14c72ebbdb25ba431188b59606bf933

  • SSDEEP

    6144:nRURedReXReWReZRegReEReuRedReVReubo:nuRiRyRnRCRBRpR9ReR0Rnbo

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          854B

          MD5

          e935bc5762068caf3e24a2683b1b8a88

          SHA1

          82b70eb774c0756837fe8d7acbfeec05ecbf5463

          SHA256

          a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

          SHA512

          bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          e47977e1cc57ad83ffaa5f4683fff96b

          SHA1

          826a8fedd8c304005f9d223d389916b93e000a19

          SHA256

          46e6bdfd52c0c2d007ca420c2f6440c63c81f2c18cb7f8e4ca0b500e4adcbe36

          SHA512

          b6fc9318e2034a217d26384a673c290bba5d436978a022e3d3e49d58832790705a2588b90b901961498f0486ad9ed99ddfc95e3b66154aad63996083617b3164

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552

          Filesize

          471B

          MD5

          9e6cf26ba88811007de9168e6d127827

          SHA1

          7eec05df6a32cf1f1e31c0ddf5a87464f1b06c62

          SHA256

          d47265f953f3b6c92ef5af5db368c07fc19d48f38eab8b62dc8f893e62dbfcf4

          SHA512

          9279c7bf12fba7e8f6695413f3d73d16839a5dfdaa9ffd992adfa89cc01641bf49c917a6a0ba87359d4413b5997ad9cde50f97a4b9650ac110ecfc5330ee4043

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          170B

          MD5

          d6d91ebc1d1bccfe0b9641052a8c2c18

          SHA1

          82d1f17d81bd71cc39152e028cbc5216a70270e7

          SHA256

          e6dde528ece0bf210f5b32bc0ca76545450017593f4004f83095b20206cdb440

          SHA512

          abf334914d8699356e980692e944eb3a40250ee6d72e4c55364d544a7c9c48cc5faef741cc28d5c39b511797cfa2d8b7cde343e7e04acbd42620d3af9a816e07

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          8b37c879c434e701a46d3d1eddab3ae0

          SHA1

          b92aa393fd82ef40f97338767506839fa86c6fa6

          SHA256

          e6a15cb0279a2fc3d58bade6248e2239665f8209d279fc83d98e9ca5d9e1df72

          SHA512

          85c961fae57671b36ac3968ef38bd12fc2c53e80ce29daa37b29f45cdfb4e28d009eddeea9fb378fba55018219aef7442a9159f73944973eec26b7f301585c83

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552

          Filesize

          406B

          MD5

          41d578539e2c0781bc583209b61a63ad

          SHA1

          ff192e26a7a6abc3a9bf3346dbc917ff5d448523

          SHA256

          44d377f23ccb643df0e85429e06ee6d30e6c00ba38db8d4ae36a0c51b509188a

          SHA512

          a28b73e8df582b9c05d49630f28347f1780fdfb79a4a22e629bfba55a8be3e50393a6f7f20ba0548c216765125477dabfac5b78189bf4d27cce257595baf925f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552

          Filesize

          406B

          MD5

          702b6979b02f3c4e63d80dcaebef2bb9

          SHA1

          0292c78e8eed55a520d413de73a8efebc77152ee

          SHA256

          de5664dd0a86da82751473dad32623bb0ad48454bb907563a935bdc951d541dc

          SHA512

          532f652cef8c5cba08e2ab19ea8fcf4b7a5bbfdb9c08fa8c9149b56a64f2cdc03cfcf33b926a33ffd15fbbcf4213f6d1ba09b3b5d0bdc3009c280ed96e730691