Analysis

  • max time kernel
    95s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 17:02

General

  • Target

    v4free/Ads/a_2.html

  • Size

    34B

  • MD5

    86fb2488e6d05941bf2d94a24433a327

  • SHA1

    ca5e866c393764a5cb897b731a0840879e28966d

  • SHA256

    887fdce8580b9ed15bf00df9b88ab3d877660605393c05cd423a400dec7d7063

  • SHA512

    89e1921926071ade7b44260351beaabe7640758fe86cb046822ea4a65053dd20fabb932d0dffb8cbc66d9823d6636669d2eaa8fbba1f1a4f845ebc1d6a2ff5e2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\v4free\Ads\a_2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b90c6bf4765a1c65c6f88429831b5a0

    SHA1

    5e994becb52fcb42db064e4a3d786b544bdea531

    SHA256

    f08956223b1b4bffb9007e2887af7b59c1acb453e1b040d21721e6734a68b783

    SHA512

    54683535013930c41ee94da29b195159caa5b60d4e442cc6e0bfcb6b2ae17ca1a0b53cc46af03e64543eccb3733ca25ba814bd72fe9e3e571eb97b53977c4b3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3adae6cf215d5166dca9b02becd80a00

    SHA1

    d6f554b6028ae91d6e3fd27f2812175257b2d303

    SHA256

    4afb250215e3d2d5ba0a9615e737f14194d4317b46e60ffe18f2ad3a3f306dbc

    SHA512

    a091a9562d19e670bb71ebbf2a9b7d1e219c4539594b026f620042a45f379a43fbcc84a17b0f1ff0d032cd0df840b8a64ab2ec08d99fcf25ce254a51b777b0d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a7ede50d685620c821a8a4cdccd86b4

    SHA1

    b02a4becd946c5d0b81e62c1d2744152f58154fc

    SHA256

    1263d6313736234fe4d2b419e20b4957d035c83bdf92c8e2062d22008ab7e52f

    SHA512

    0a64e54a807702a8ac15ee1f9fb8100763c3b3f92142865638d18d2ea975c221bb8af1559c8ab97de25faac71fe5969ec6c016c6cabf97b29f63a39421dff2cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8bee437412b32c98a765779218271b9

    SHA1

    158ebb1dd0a405a7e33805a6f47638123bd75037

    SHA256

    daae09dc0292a416e9d892a6b75e5538364e4ba8deca1f250715039c8e2f4c17

    SHA512

    7be4dc73bd642a6c40ae20648899ee4c6d4c75b2c83783746d747c17d921328ef5f9d1b80dc028161629aeba1ce6d39d9dc614eab22ad62c48c7b28cab97f5cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    256d76c21da837a04a0271769e3e93dc

    SHA1

    285f1cef73c588d8f7cb7c8583dbb4d81caee857

    SHA256

    3622afc328c11dd201837189594e8a582eb6d9e3dc531059a7f106bd61490af3

    SHA512

    c4ed1097f80b4d7880f76f2d1f8914350906d66890cc7cab8b36c46810c1f464a13c98e909ba8016fdfb71c868d094c94a2b92d0ff6ed43500c7caff9b7d38ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2b33aae7f30342c8ee3f9e916a8dd60

    SHA1

    d95de7226b5c7054742a86da93d88f3e5680cec9

    SHA256

    dda725ca7319b779f99fee8196e10113d4cfed225602f629ebddef7e7a1091d6

    SHA512

    5dd0943285cd3a54d0f9f72d20687ba1a4729d9e97ed5b3a3e89bad900029f4e8008ce76cc5a5133d0d3a2a17c20d9de01bc6f6d4ab4a223db0171d4d5dd5663

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18b46c75669eca24b25aea8e458a61d8

    SHA1

    23e0ef65e0038b025a5f3f48e7fd18ae6f360ea1

    SHA256

    2d8da674a9cb3e82aa6611001ba2c0ed244808c122f2c8eedb5ae811be5743b5

    SHA512

    e369dd7478f2feafdb9639199f5d7df6dc0d70639e2fc459f918a9c4c9780b5dfd30e14895b543ffe53c6a0562858d0e40c9a4618b417acce4b3c1bcba46c960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f77ad1b724d279f63fb72b31f483e05d

    SHA1

    cd3a32baa8ee006d495e4b34d9e4f48c0d07b0ac

    SHA256

    416e1564f575d86ab823733ad6d92f738e55c08b0ec3efd6e08f23e1d7e132ab

    SHA512

    5e55d06b569ab027ae1350bbe67123d6c9343f23ad8f78ef8d508ba264391c6bd4ff3360e91c7f5dc61622840b39960bb1b863b98216ef87bccf879261cb0b2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    476972a1eaa582399a9d165803504bb6

    SHA1

    5ad1b4135f293b2a4b5bc2400d98fca3a5f465d2

    SHA256

    f1d44f2f6fc9108cfb5651880782fcb13d798607175930b615fca23140a5e5f3

    SHA512

    796b6c0a109dbc10a40345d269bea401d5988edfc94300a47096ea3d6fba2366073be8a9c87cdecc877395b71277ae25e6bd57d41460d09bcd9ec685ea69f013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5520b7d0cb1dba6a303660bf3cbbb67

    SHA1

    bf271fceefa089568c7d707d9c3c50d69486b34a

    SHA256

    74c7120c611a9add658136a72eae2e81d0e1c90b329c70b11b79aa2890663526

    SHA512

    e28de1d117e293198b408a12c6a51e29e3be4c560c9942074bd98e7c7a8cf1ac216a88023980f80e31406b13dc1a8c3c7916a787b5a8e4b7b3b357ae4d53ab7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f828518dfd49a41a56eeddc5d027b26

    SHA1

    4a13073233387a24712f5e67d6b04fddb52db8cc

    SHA256

    da60e42c67e4fc1834d1085e2c76cb93c7238427bb725134a7054d4cbd7de26b

    SHA512

    6d8c0ef9768f98cb5a235bfe6c0faf1a1af9db06b9962bdba3001f809cbcbb407be745b910ba413a73dedee01f206d6b67fa0dec99c5747ca8807210a700c77d

  • C:\Users\Admin\AppData\Local\Temp\Cab7438.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7547.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b