Analysis

  • max time kernel
    7s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 22:35

General

  • Target

    sample.html

  • Size

    282KB

  • MD5

    560fa26edbc3114c9006f83f1e16edf0

  • SHA1

    2ebe3ee0c8253e98c55ac12e184941305a608c37

  • SHA256

    8dff493cf8634fa49cb81dee8cd208debf00d983df5a92be8b4b884ca452dec5

  • SHA512

    806f07c36542ae3b0130b8ed6354a60cbd50e54c60eacb41333caf0f2e3ce546b1308a31a9f70cd854982108f8b5e3c78d66338ecbac347343851e586381c76b

  • SSDEEP

    3072:TDiUF1+s32iWD7jrY8jVYPWwB1k776csAq:TrF1+s+D7jrY8jVYeCUOcsAq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5b9e0943359b0c289b6a2317b938236c

          SHA1

          e9111b7a7b761c2f0cec8ac4e8c1c52798497cee

          SHA256

          c6ddc996057da587d79045d6bb9ffdd725c7b499fadfca208aab1a1c3b52af84

          SHA512

          99032519f96b68320646922f55805b4a9aee867639dc9921c1d1678566d8ec6669968c13c3f4e8036df61acb2169e9ee489298d7484a4c032e45e1ed81147bd5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2d882c171d3921868af7d4556d7d3eb3

          SHA1

          b90e7de73f130c336e46786f127d3484fc47b99d

          SHA256

          07d13284c3b4956fa67e2feb6b33c7521947525b5eba902dc3e4f953e3e4e070

          SHA512

          a2d6f9f16c97a522170b3af1993a7c2acef4b38990e13c8b4076b330ddf1d97627a7fa0d698205ecd622eadd4f5d833572358839b036e39d4c7f1be9a65f7e12

        • C:\Users\Admin\AppData\Local\Temp\Cab61F1.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar62AF.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b