Analysis

  • max time kernel
    122s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 17:02

General

  • Target

    v4free/Ads/b_2.html

  • Size

    31B

  • MD5

    c71108d64a400831ec79b21968e72d67

  • SHA1

    ceea64109835a5d8a86dd1b8eda2b902b2defb8b

  • SHA256

    4253053d7cf05ce8f54cf68f5e788d14f884c4fe5b5ea6557c8f55e7fa575ae5

  • SHA512

    09d8e5f9d10022a7a5943121fe133d4c905d4a207e1f8affd3a73858d5a4cdd3353638c2bd45eb411aa799697a3586a2692aaa13d26cc0b9ee359a5d3aa780fb

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\v4free\Ads\b_2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff811023158bca890c437ac2c6aa2b14

    SHA1

    43f1f63a208183cfb250e3a7202cdc6e5253de64

    SHA256

    7578b5439ba550a404906248d456cae6ec7ed9e211e0869a0bd7bbd025062aff

    SHA512

    7ed4d6fd5a881d258ec27a1e7a315dac56247bc27665df959becfa1cc6a6668d7e33170b08731935b9de14166723565d84e9aece795e2e0adbaecb36dc2a803f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d457334538b0cdc464fba14b430a0434

    SHA1

    9c2c5e23ceac3f03a3a1ede682185e3b127a3b10

    SHA256

    8bf4dd0aae3c678b23c2780c0e45c96061bafe20dfe873f77fa21967b3eb7056

    SHA512

    7fd950c0f6856b95b4a114573f00f873354bd8c1714d99214972407f93874045ccaf93c761574875d89ff1234d87525fee26f729c5f1eec133449b269209fb09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26918a5203454e025dd149fa0863f570

    SHA1

    ec74ae3f1e93f2ccadd6ae47705c27e1b1b82ab2

    SHA256

    017d04e56d92c5dd522ada673100c241ac8238cbfdb06e22b06515b25ef03208

    SHA512

    ddeae2c4efbfc81243fc5536143e0febc36319c3d7157e3942694499b13d2bd09e27530efea9e423433a7d1929ff6915f2701a9d8c2f2359d1a193be13c697c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d15a6ccb084bb6626e307a598213a1dc

    SHA1

    b0e7d19b739c51ca37882b10cf4f0d89502a40a9

    SHA256

    1a7afbabdd66d8e854885f7c3e5a7babcf6df715146274eab3d2aff5edf59959

    SHA512

    55328337ba56ea2330a45f9b090992c5fed73f4aca0dc7bd77b215fca49beeb934b467f998cb0394416c910a793dbea28eb66c7f462a9f38ac6cbea717a15574

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50a1f3909772293b27b40d7a635614f1

    SHA1

    1a039bc940d0f3e4c5525904a30f722142a82437

    SHA256

    e089a107600d0f0eba8d6a881d5974f3727937e974b48c7b83da144a162d4eb3

    SHA512

    c4c03c0946011b074b1e51f506fef8a974dfd5c7b9e4c89729ae4ba2ef79ec3f853dc1305c9138e2f49e8c6ecba4b6297b9b81965f6c4c6ee981c7b1e2fdcdb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4261d9ef44e6f35ca0e498183aca131

    SHA1

    1fedd21b70451b1b7b24349fced5cb1fcaa92641

    SHA256

    8329e7707250952102a286c368fe22debcaddbd8131e774460431c4a3d588fc5

    SHA512

    de976eff32fb22f2b7445b8091b6fdc3d3590b2b5e8ffadf908df82f8bbd4bd7f708b2bc39baa45878bd9f5066740e59959117cc2f59dcc5318bb59c521c22cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa59395a31dcc50ac95049f9e7618fc1

    SHA1

    315df28c4e76652fc87d5117df80c6fc17800748

    SHA256

    76c5fab0a56c322fe9401492544181f9d0406d078efa2b9b76d093e416ef9686

    SHA512

    ae40802cd7803d2b07b2d17795074b3af458f194493d893c615d409d4d0ee2a5969315565386a3124bdb61a66758f203a9046242a13a4a3a55cfabdae3f082ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b1108f7ee68e17f5cb263b85a1f90fd

    SHA1

    c1b11ee0d56384a5d56b2125434338930a1b439e

    SHA256

    26277a9ec6b9e395a6e15fff0a881d77d67b2ffd6283903f5ce7f6392b013e3e

    SHA512

    b04ffdf157335f8d2adaa5c20d564573bb5bf43f985cc94013ea95ca993d449d0b13b6eb4172845cbdf9a62bcc615ea8e865ca23b91b03cd1bd8d91e2bed9907

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62ed3b3c04135f47f1f740dd8d7c3d46

    SHA1

    d11c1b0981aa9a80eafc9c7e1ecc1f5ed89b656a

    SHA256

    64849a50f961165514b3da65df4758e4af6ea11cad5cc398d944216c4c4b7f12

    SHA512

    2d31a2eea5fabedc107a70436ff4096d555a56743bc731cd3d95be0f90d9c92cd5f56286c7175d0c77e5a7d1453cd59e503821fa43c606493579cf1ab68b638a

  • C:\Users\Admin\AppData\Local\Temp\CabD4ED.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD56E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b