Resubmissions

07/09/2024, 00:17

240907-ak5h6svdrp 3

07/09/2024, 00:16

240907-akk5javdqn 3

Analysis

  • max time kernel
    1200s
  • max time network
    1143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 00:16

General

  • Target

    1000-Free-Unblocker-List.html

  • Size

    10KB

  • MD5

    84e1191bf40ba40133db0de70e25f43c

  • SHA1

    4c64476240106508610b84abecb93ffb353024bd

  • SHA256

    ffaab30d9f09191e9228913d45ae58be2ec35c9baf80c5724bbf98fcbdddc7b2

  • SHA512

    c27383ae8e9523878c719ba0dd246176f85325202e9ad5560405c6fa3df2e0db5921fe4b56bcd0c278b671461b90b48fe186ee1dca947a5ff2449d690e0a8978

  • SSDEEP

    192:0R6mA34QQQdi3YL5GfGUhiDlLub7q/f5xLJu:UA3Ptdi3YLwJ2lu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1000-Free-Unblocker-List.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4612 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ba1bf8cf86ec57057637af172911cd13

    SHA1

    32daf654da1afadd3021d486164516318295debf

    SHA256

    77fb6880c4ae2e78d705501c19c9cd4a4d3d2f9e42d45e313561caa0b6c832e0

    SHA512

    46780dd891659bde9eb87f07c857a43de3de9eccc53077b437282d1dd0c1339321399b0faa4cc2a6534396cdd4d358209bfe1f9622bda1e5681acef2b9c4a255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    e1090da9632ac0c80edd6b811cbd75cc

    SHA1

    a5a929d930e179e08d713e4f2293182ee63faf76

    SHA256

    75ca087b938a56626e0f907e64504a53703e65250e0f420d4a4f25c7f6a93ace

    SHA512

    01bb61fa28e94e96b794a087397a32d4444f066de7c4c14e66abdc690aa53394da32fa975de7e657fc7431f4ba9f3e2392dc43fd01ccd492624cea92932f1ed3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\uoyvico\imagestore.dat

    Filesize

    15KB

    MD5

    198031a7ad5a12a6044756ec2bb05919

    SHA1

    e3c28c275a4c97cb4bc0e2ff2e74b4c5881574ba

    SHA256

    a1197b704231de12f9208272ae2e8a0d9e1e65ad58d9299ce7d2a5bd52b6edfc

    SHA512

    d38ba1ea2499c2ef7bbd41703a75d2214f5d6a48535c22545dac88ec54f1394ef578e81d5b2da93274d494674d4273633cc0c5b2f511bde34206a240162d8106

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\F1EZZCYM\favicon[1].ico

    Filesize

    15KB

    MD5

    06f7d82f12e49ba3c6afeacde5cb98e3

    SHA1

    b259170743f604d922b8b4129c520efe60935163

    SHA256

    a05789cd9683fb9e396e903f578abe9eabdb590e7968e2224fed9e51809f3993

    SHA512

    79f0f6678b99cd1d3f1bc4aaf8950275450cf1a31afdc2bf995d2dada1e7adb3771e4cc34c75f89f65427b4ccfa78a00e95066acacdc01679ed688c4c87e093f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T1CTRFUW\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee