Resubmissions

04-10-2024 13:28

241004-qqpb5s1akh 7

03-10-2024 22:49

241003-2rvfbsvbpb 7

01-10-2024 17:12

241001-vqtdbavcpg 7

10-09-2024 12:08

240910-pa23maveje 7

10-09-2024 12:07

240910-pajlaatbrl 7

05-09-2024 12:10

240905-pcfx6s1eja 7

04-09-2024 23:57

240904-3zwtssyepr 7

Analysis

  • max time kernel
    1441s
  • max time network
    1452s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:10

General

  • Target

    LICENSES.chromium.html

  • Size

    9.0MB

  • MD5

    aaea51a605688fcb2f178fd60e4ca64c

  • SHA1

    69d4791bf3cfedb68bc4d8f766878103578171cb

  • SHA256

    96837a4a521a61bd3d34f2f660e29902d228aaec501eeb2a84403f1926c3df9d

  • SHA512

    d328bf2f9ff7372a716a09e5882b9e3c0051b0135412b3258453085db1de2c7699c8aae24edfaca7798f468802db975977c9976e19fca84fffe884bf8594c33e

  • SSDEEP

    24576:h+QQf6Ox6x5n1nZwReXe1GmfL6k6T6W6r656+eGj/dBIp+:oAZeGLp

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b871a82578a9b1ce280082189beae06

    SHA1

    6da4cb2760bbddb8f80c86a715a9c12680d99fc1

    SHA256

    4233872488e41be7c178ca975e7123a59c98e9c0b36ceb67c5270b9f8019a216

    SHA512

    024594b08ef3b86d4714cb6bc5d0bc47f9d2b1cc8a983f396decde08ad4b09cc84bb6f9c115a0b33381adb749b39d0cfc2e63054d54b22c995b64305d18c6659

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dfbaf28c9a4d427976ce4015408bbfb

    SHA1

    66a5d536dea79c0b28a3ab799c19896a55e0d734

    SHA256

    a87d11068c917ff4df7380edf37be2e890021c9b5fd27bdc0181d638c0df532c

    SHA512

    2dcaedaf18ba8cac4f4c1f115e57e4effcf437c77e001ef1fc0f15150c22aa6ec7548390c4fa21fa0a5fe357a55c5c439e68866f840dfe8c7418344d92d1d909

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a8e425eab1cf0971aa4761a4b9c90b0

    SHA1

    d3fb0cc9eed3ae8688c7d79b8bc3d79d4668541b

    SHA256

    38ec3eff7116fe0dead922d529f2341de5f69dd4d049a0c51ef203f231618ebf

    SHA512

    baa27677f219693821f5e0775450e87a9ecf30b8d442f3313e3fd9fc38276d78f588d07bab8fc4f2b0b7845e04717efa4edc16f2e4b1c77475581b637dd94d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43c019d014f64b8fa84d8f45b79a872b

    SHA1

    f4830373d5b020992ab0e20837577c42c4be5ec9

    SHA256

    1f683c2e0a93a7a92660c45c54a95ef089445209e39af6ce020f6da1b43891d1

    SHA512

    dd3272ed8ec8296d787fa67c668f4b8e9699a4b0cb94ecd1935f175de8707e3722b5655a44457e343512ec495532a7fc2885a82ee3c8eda33c49ffda0e6d144f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ece7b369516c8fd8a8178e8a64c0a720

    SHA1

    a8401340e459178da58c98bd8bee904d1e69bced

    SHA256

    be33a28b980794369b828a5471413a8ffc747b56e477a67af2ed84e7f3efdfa6

    SHA512

    c463f34c4de025aae16d63f262ec938166dc21a8fb7bd16922d55c3e25e737b77ca125070cd3bc820f1a4ffd07cb221e71c117a8a0d073ffb21c39bb623a5fc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    705784266f7779cf32fc58bb6905a629

    SHA1

    bf881468400cb21825b2a25ae9fbcfc17aaad826

    SHA256

    f38bd28a80ab2a14d0e6fb5461eb566adacd2141af2540ff891cca2458e29457

    SHA512

    039b175d51ae180252b6071914eb6933d4b9c310d15df8d3aee6a0ac7195344dd274c24d34a930763b2a437feb6944806880ed63541f581a4dbfa794466b26bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b3ef4ab872959f4022498ea9abc3b6c

    SHA1

    70be770f889a59a860099b43d73c676e9d84d0c7

    SHA256

    711eb7fec5b9aab24596b638e268b0d0c114756d87663ef36d191fb74eb7db10

    SHA512

    b7f30225983db32a6d9ed39395af6c9f521b4c83f9f299cfab88895d0f7f51aed507154a10e6808c7ebe11af37170695a6055db947f06ad9feb96fbdeef3f11e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    387bdf70e830b2b64f0ae9fbd51dc655

    SHA1

    b1672b3b011965165bb476d59931c3ecb58913d6

    SHA256

    1721ecde102f894c9e031f0d22588e22fef135889bfd068a251c9c93a00c8576

    SHA512

    921086e16ce17150c9b23ce5878b888e9dad892d113709bbdbbf90897e77e5d17b91fd948035b747d44161064446d39591f277227373da801b86bc22318c8e82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a1324dfcdabda72f00d93e585225cd8

    SHA1

    aa28828cfc7225c18e816fa4b827f60e17864d77

    SHA256

    0ae171d2716b102a5d6645a8ff069851822ddd7b5b037da59bc4437ecd765bc7

    SHA512

    6563b24ac72bfd3ddb320dbf886550b4a626f6b96cad3226aecc94daca5241ba2fb3471f063f4edd081d4df5fcc32868845ae45b2979d79820e71bc14ac86e68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a9197c4feb1267d959910a530d99e8f

    SHA1

    81c9e87b042ee7040379f4bcfff52761d6d0ec55

    SHA256

    1ec5688f31714be0fa1e3348a9c5f8af0e744381f68462cf4c5c6ec851a82669

    SHA512

    910ce4eef8df62143ca96f65817770e7b028bfe3662614fc22ac8b130e2d9aa61dc5f13503b0a8b78e5cd21dd5fc89ae9d0c68ee89e83bc71455e75855e7d0d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71099400b57503e5f4e21ff5c6b3f572

    SHA1

    a30c49acee7f9fc4d73b9de982e9555c781de085

    SHA256

    5cb9c578bdac2271f00e57ba175f3978e115928a259721429b7a075d0bc8050b

    SHA512

    cf5599c5d837a56794e24fa1a11b6fc39950afa88a847207a76a91aacfacc1c868b002a7323cba6d9870938fba6642026e064e32e289652be2b6fa955c8a5062

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77baa5bcf59ab965592d2701d972ee45

    SHA1

    6a2ec958d7ec379fc5897da6941e802aef3a6b29

    SHA256

    a88e214fb81fc7395239e78fb478709718df6702bc5dd5ad8519be8de33718be

    SHA512

    157c237aa36d99ac2c14b154ff491b666807584e6fe6408c3c14af1fb8b15a01d7102b6833e7a8494f0177f4b12e905606c73eb63a1850803e5b45a5a0fb28fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fe3913ddc6b793694ac381fc4369cce

    SHA1

    26ad4b23f48a30ea8620e16d06fcf0719a5aeb6f

    SHA256

    56cdcc30862cf14fc6a5d377a9586b6b256bf854cfc32babb71065bff8feb94a

    SHA512

    e931c6ae08da5590719aaadd5cb51e1cc6e611636beae1b6cf8808c8076d14232ce13f438ee92542d105de5b07b746a0cb535e147b5eefe366d1edeb4c825de5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a25a9bc5e5e2f96b463401509732fcd

    SHA1

    dc4c316c6ba8a8f4e0c11963d987d29ba4ff66d7

    SHA256

    9d87b9c9b579c3f3ea539d3a3676ae098c6b8b6d54e1943f664d16ad14ad09ca

    SHA512

    b22383173b7421b11f514d54b6b477c3c78113341180b75a130cfe0a7d3660d56bae8cb6e6628d3e8d23bdff3f9d02c3b117eddf4cc706fb5d562e922d0a3d6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    494a01ccf50d2f3aa48481911c663b2f

    SHA1

    aa6878bce3121782f28d73f344f0570cae7cbcb1

    SHA256

    fd92c052cc36cafc98abb7bbeef0da09ddaf0e43c86befb3fdef82936a71df22

    SHA512

    ed3f405fcf8021a0ddd70393f2d38e3d49a24d995d8b3e575b20365b08471cc8b8ee9cefd095162500b6ba159bcaddddd96549f4aa82205606f464bc5eaff2b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc0f754b1706348af5bdff5267f1c766

    SHA1

    de47e5b122c58b1384651c4772ee6c9020e65b37

    SHA256

    62b5386bb0586b5bd32bf1c842795fe97551de2d5cb1b7d4b1905b86d69100e6

    SHA512

    b1c5cf7bdc5a760c7823d27754142c049ff2b59bd4ed1e9c01514d52ef116ad148340999f562ae3e4d57b9c2b56e99a12be56453309a3038cad25580efeaaecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    749380a7e40e6ffe1f9287a4352d10ca

    SHA1

    b8b7ea9173d660771dc834c7354134e6d187cd80

    SHA256

    f4036d4a89643e044d6cd19e0877cf077ef4a85e06ebf029aa4d6a215f41f079

    SHA512

    71d5dc6d8077f05fa0d039ff04895541cc56d7eec2a710b2ab0413055f2360afdb30ac1960d3bc63f63f2ae92539c01f8fa36b9e4c5aaad9685f83892124de93

  • C:\Users\Admin\AppData\Local\Temp\Cab1C68.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1CF9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b