Analysis

  • max time kernel
    31s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 00:01

General

  • Target

    LICENSES.chromium.html

  • Size

    8.7MB

  • MD5

    bd0ced1bc275f592b03bafac4b301a93

  • SHA1

    68776b7d9139588c71fbc51fe15243c9835acb67

  • SHA256

    ad35e72893910d6f6ed20f4916457417af05b94ab5204c435c35f66a058d156b

  • SHA512

    5052ae32dae0705cc29ea170bcc5210b48e4af91d4ecec380cb4a57ce1c56bc1d834fc2d96e2a0f5f640fcac8cafe4a4fdd0542f26ca430d76aa8b9212ba77aa

  • SSDEEP

    24576:KPQQ/6MP6P5d1n+wRcXe1Lmfpm6k626D6b6+eGnkywBIpv:Cy8OeG8k

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84fa48b160cd18dfc5100480ad1d11e7

    SHA1

    45bde462765432bca54f6213fdb35289b612eacf

    SHA256

    03792bf0d21b483b0cd258ad4c40a0f0c4124835068e1a4ed1dca0123118f42d

    SHA512

    bef33beb0e307030f2734b35d2e770ff3e004770055478e12c792685329aa89d5face55f4866b3b8032f538efb3623739d5603494af2c62aaff5abaa5d1c40cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23393563c40aa6697f6c64c20ddb6455

    SHA1

    b0b04c4dd63b955907477329deeb859d3571b1a3

    SHA256

    2fc5dcee84e16a94dd40ec7f34a36ef1305824de6922e4ea38aed55f0511d107

    SHA512

    dbaf6551235fab28d9d03d2684d8bfdd5c1e268f13b2000d173dfda25157322e639727f0b9364cbb0df5f89640c3126158e0f502cceb8d5b58f691aa1ebfe266

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0819af2a436a9bec7f16295fda5658c

    SHA1

    010ce524badd19400edd47572d80fe9aabf51972

    SHA256

    9119580c0f0a4000b35156d68bb40461357248d2799e0836bb7a60925f7f2eaa

    SHA512

    246a759ee0c0008f832d3856f133ad80b3033039a6e5e55f85228eaa326e320224cda9a370e8f475c03ea671e6ebe32e30835f0a64d1ee7836e6e0ba489d909e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad51a284d4e449be91dd4a1d495687d0

    SHA1

    90604c1cb0d71839c6647c40af3d8fd93df937c6

    SHA256

    6373aacf995def3a25a7676e887adff0c5fab4fcc7c268b29b0907e95ca85eb0

    SHA512

    642e857c22b2fa7f4432b7bcc5366dfd29f2cefca78ae6d2a00ce81b209fa138680106844a85974df2ac1a22acc614c419469151cbc5df00072b6f8ae19a898d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a76dd8678c314fd4b462c6ccb879e9b4

    SHA1

    1d2bf3d1647a8ae754d16f25e28732f2cb6c6cf4

    SHA256

    17063ab96b18a7b788aefa1ac8466658fdbc42020a094cc0c9e71366bd852ee4

    SHA512

    e6e0c6c7b21231f8da9004b30ce160a0e10a183113a73de618d4692c9c76819d3cdd7e38c9d57bf0195e45e9bdb62d7944fc433355fda14431b7f8fbadb5d4ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3eaeca2477900c52ebab2471670dc660

    SHA1

    b62871786e24e1f4a0c515f075a8bad838507568

    SHA256

    76daa219e54019d1a744419776b002857a8752d52a4ff72cd8544b8c99e1a47d

    SHA512

    0d21b4f13c68e4de2d034fa9554f82e411cd295ca8f5d5a73431189c1b969019e7a33ea4176e44d25fd428c0ba9473f90faf80e36bfebd11a7ef628b7922b407

  • C:\Users\Admin\AppData\Local\Temp\CabE2F3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE353.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b