Analysis

  • max time kernel
    8s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 15:04

General

  • Target

    YbPTStactBlcDZC6Qr2fTlbhiuIo6eHFHnR2pTlF.html

  • Size

    146B

  • MD5

    9fe3cb2b7313dc79bb477bc8fde184a7

  • SHA1

    4d7b3cb41e90618358d0ee066c45c76227a13747

  • SHA256

    32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864

  • SHA512

    c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\YbPTStactBlcDZC6Qr2fTlbhiuIo6eHFHnR2pTlF.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e96373b8597ae1b109002da760ec7ca4

    SHA1

    31c51412333ea87090f7e12b9edb04819db7f325

    SHA256

    f3580e1cba6e61174f447c9f5829cadfc2aeeffc6a5e6ed147e9fdb3621e3861

    SHA512

    806ed6a2bdf5bf4eb0afcacc931256b74d8812b346357c6f444922116621812af18949d3e3f26cc8e0994a77abd24f93bb3fe1301232898709209e7bcaf1d624

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    63ba7a6320611e380d70bb2762ef5295

    SHA1

    a0cbd290d90ae8f9db0a11dfdb9526424e424fa8

    SHA256

    6c99671c8ec4a2be5a10c8c84e4978b9df4fdb5102b553f70459086a985882d5

    SHA512

    268683ca7458ae96aa2278db6e90e4b66390a30f964dbf5ed72a1b9a1e28c7012cea2f950c592e7dd8b6889a71eb85f41692265ce77fded38aa02984c996679a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c4ed23370edcc4ca2898d0a7f12bbee7

    SHA1

    0ff511f084c04b2b8c479c14d074286ab80a6ba1

    SHA256

    13261d2b59b4a65eab67f63b4ee2ea0f45121011f649d4106c7d6d59d0dec5b4

    SHA512

    c3e4763edcd604336c19c50106dad2dd73a90e371b29d33df562d415698bb011b83afe7df363f38e3667cb77c7887e3486dcf084a2effdcac4ccb5e3f9f36ea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    25629e5f902c0f3c980e7e8d67fa65ee

    SHA1

    d63d00086957a18083c975826d0c8d23fce5ed62

    SHA256

    4c1d1641c645ac54c34128dab952132c4a7681bdae83fb145abd386c37f7a756

    SHA512

    73af9671f22e150abd476c7b221096159c8fe26e66c3dd43d407e159829daffd01ac94bddbf4f4990fa746f34003e0d97e031c12ce7b6b0d3ccd04de2aa5e039

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0bb0a7f8f500b256352f31a1027bc725

    SHA1

    e4e90519dd3d6c394ca60111fc225f15f21dcdf2

    SHA256

    0906473049025fe1fd5ab4dedbaead2c4cf9de72d36ec882442ca108ce62fe94

    SHA512

    948381cdf0a0700f03c40b1016cee38f9f363637982ab77777a31311894030198ccd5f56e951d9047780d00b452c8ab3781a5bee6b024c9de37ac5199bf82bd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a281f56f8080904a9545d747186e8be1

    SHA1

    91266809dc8f6f2d427e1c56c4b58e25342c5d5f

    SHA256

    e2fe73b50c844f1e199216c01ead9eaae4e3bfd20bd07a283fa5790b84d8275d

    SHA512

    656a7b6aeff4ef5b73cb15349b4c94ab3f0695782a9f4e6aef24f1c51f1172d5d0ff61d301637c44b67b2da7c4559d88d5349ec461afca05fb54849fa80f8ccb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bab0c3d259e97abed80ba6a84a4bd1e4

    SHA1

    1939b2c0223ebdf45122199c2d9ff33dc486a447

    SHA256

    984d27ef1173f142020071762e1d9c13898dbe4f2bb1478f8b94427f9328e324

    SHA512

    52efde1865b148520d09cc2c168bd5e58e52dc84feb9aaa8054a71b8859da77a8e134af8256695756de9f2dd1afb098367b93fbacce86254ff7c977a6e5f3c12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5f9414641526ad6af4e0f5b3e22f2f86

    SHA1

    5c1a017189f91cd6ac561604d3013d8d622b66c5

    SHA256

    bce75829e6f17df4e8d026e9714ce70e082ef94fa7986d4a79f3894a9dbd702b

    SHA512

    e80d4eecf7d2c139c7b00ba0a1ae491fea907b28e5636464e6fa1d2c8f4a89bd768b71504dcabf993500cfe1f1329dc6521ddbe4613f7e10708ac511ee1a1733

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    515b450db18d0b0c9a4cb658374cf8ca

    SHA1

    e8acbef907722038cff5b544cc7127710e29ecc9

    SHA256

    5e981263dcf7f7df09e06c76847f87ccde53f372fa9e3a2dcd853605e110a2dc

    SHA512

    97b78fd5f3ad8afcb3901695e3da7225af6c889e0745bbb66200931a9d7a8392531673c3698303ebe6a536121c51f533190b65fb621e527b48aa177cbd0ab791

  • C:\Users\Admin\AppData\Local\Temp\Cab3823.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3894.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b