Analysis

  • max time kernel
    141s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 08:57

General

  • Target

    sample.html

  • Size

    40KB

  • MD5

    4fef584d91068b937badf1984fdebfdf

  • SHA1

    07f3439a85b6de2a75389b4e841dc57efed66661

  • SHA256

    e0f5f0b5ee75d4b88201381e361513a224cb3c46b1028c81cc763693e5293445

  • SHA512

    bba9dc16e585ff647730956c4d433df700fd075999d1aa67e63a4a211d2ffa1f3ca6a1d0e840594ca8feca3d8ac5aed5b0acdff641a4beb30c74efa13e1e6f2c

  • SSDEEP

    768:Sdmh0OG0m+eiE5wzMCyKBc3Z8vfPg+DvaxnjJ+siqBUTy+tlq2wsj+b1r53pv+Jd:SdmSy1E5wYC5Bc3Z8vfPg+DvaxnjJ+si

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    090be0ea8300ec819c91e9869ec8f37f

    SHA1

    d121bfbe6cbf5780593db08f48f393a65095094c

    SHA256

    2e28d2716ca877b5a595309e6ae532af0410da3359ba0cb8fa44ea2350e547fb

    SHA512

    c383b90c64c097ea2acc2a9d28e89fb874d5a319c4ae483e7acb4ba8f49ac4096f985105fce5cd85a8a48d5e22eec8c055d716d411fd771c8a97d818122625f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc7213b555810d13d420c8e97e460eb5

    SHA1

    84f9627723e47d401c9bda75a1b716049d2a5f46

    SHA256

    f8ec815d2a2f1eb18dc06355528078479db29702a1ecbfc1705a21da97cb4515

    SHA512

    d332a7eea6bb29ec84ecaeb034c598135a0af84da6a0ac60045e70ebd03cc250e5668995c1b20c57a4c23a9bf55ad8fc16b27ace347660460dd9d206006300a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9fda86ce10aba07a9af559a7dd1a9f9

    SHA1

    fa66dfc069b22b38617657f3b92d9a3ca3bb41f6

    SHA256

    2fcb8ea94eaef498014a6d96bf6d633bd2b37a69402ec8abe07bbfb9dfbab329

    SHA512

    0b379991ecabf889affe2bfb1ea62c491956e1032aa197f4ac32c4b90a7f389a269e4c8a12e141d9f78be2642ed930b65b141317199649316b5e446e8f9e198d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    253aed691bcd461eb232013f17647d1b

    SHA1

    4ccd3b40e5e37dcd1671dfd00730792697eddacc

    SHA256

    6464b5be2445550b57b1784a978ad831694966b31e9d2c9364d11fd40c4acef5

    SHA512

    8e03afa59e3a5fd9f84e264e83365019e132f18502c76bf4fc6a217fe1abc8865bb733f5c41eac4bfcc061da89d3b83aecc9e2cc3331ea29071d42ccddb954b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10423e3ed808b308dbd14d5b0cfff166

    SHA1

    5602e28cc7a7e3c329a363489a72d58d01b01b34

    SHA256

    6c6084af188a9facbbbe64df10a305934ba476eee251c3d22399c38e542a994d

    SHA512

    15062c1a7b8ae5b9edde07d4d49f6d33d8dd53179185a7dd6faf89236beeab093b75664b960364774eb982c6fb7ecb81aeaf20853510e1c47592c4c35b9f7785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4ae05bdf70754458a10ed6a4568b3ed

    SHA1

    b748b0bc719c15567edf383f073c16cab610f0eb

    SHA256

    b6044286dd30b4a5304ca058672e03d8fa9e0d8c9514c257bd6a83911cb69fcb

    SHA512

    1764ae8639b86306b9929689b1b8c0cc6f6b2de51f05e5488b567edd529ba6fddd22e237fb005e9c0023c009cb2405b888da77807de1508f5b827c1e26355761

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc78ca5eb122a1b60b079731317f27a6

    SHA1

    7bfd9880260fdd18d9bfd3991f6a9b2bbb31b8c3

    SHA256

    bb2afbef217a7e324f60227c0dc554eb87b12fa0811a37669a126fff32fc703e

    SHA512

    875f305fc6477339487fc7c8ce95ab37395a3dff21338ed77a158be114e2a0be2fa199afb2a35882928b8c63c7448e5105e5309da3edc19f77ae43b200121a0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4cb4b5470b94b01234baed1821629bb8

    SHA1

    69e45eec62b48befa037e1a8a4ef9991d18909d3

    SHA256

    44b6608dcb9f6421c6b16c5d1debf85432d9df06616a9d7591c693618ddcf2d6

    SHA512

    a7703c8798d2944fd047bb62660867ef60496573f767265340d147aaad10af92efddb44a46919d3b738102607aecbc01c1b495e25d7a81570b69b030a76bdd82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa64a2f6ca2146804004991347a7e3ee

    SHA1

    8e22ce77ce2b52b98cc1c5c3c4cc204f7a4a7e94

    SHA256

    a3a2d42b4cdf64ffadc72a7006ab31463247db1499107851917cd089b745afb0

    SHA512

    c7d53ace85b2ef80dc297e5241483720f4dcdbdbe26e1ea17b617535e0ff4862689bc1f642d86f2bfca00499f7b79dd85942aa3adb85e57bbfa50cb30fcd5f31

  • C:\Users\Admin\AppData\Local\Temp\CabA8CF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA8F1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b