Resubmissions

13-10-2024 22:09

241013-12yp3a1epg 8

23-09-2024 20:35

240923-zc965azepm 3

23-09-2024 20:33

240923-zb633szenn 3

23-09-2024 20:28

240923-y81f5atdmc 10

23-09-2024 20:27

240923-y8sraatdlg 3

23-09-2024 20:27

240923-y8jtdatdlb 3

23-09-2024 20:26

240923-y8b4jazekn 3

23-09-2024 20:22

240923-y51mqazdpr 8

23-09-2024 20:22

240923-y5sbcatcph 4

Analysis

  • max time kernel
    363s
  • max time network
    364s
  • platform
    windows7_x64
  • resource
    win7-20240903-de
  • resource tags

    arch:x64arch:x86image:win7-20240903-delocale:de-deos:windows7-x64systemwindows
  • submitted
    23-09-2024 20:22

General

  • Target

    sample.html

  • Size

    12KB

  • MD5

    0b12663e5ae87a93a8726d938ef5bbf8

  • SHA1

    b53628d0d6db63fc3628146e901fa2ddca94b46d

  • SHA256

    6643f151aed8a65e60aafdd8ed1df99f4142b3cf4ac8f4f2ef41eb88070b13d8

  • SHA512

    9c3d34c587154bad94db1e4084f90f4d6415b7d8869293b74ab1cafb70021a12463fd1f1909ac06ed7407b062fcad33212769f018710081c9729417c59bb7f70

  • SSDEEP

    192:/NX6Gj50qTgymlrU4yD8Idlueh0ng61u+NmRmE5lw23WXX:/mzlrUhD8Idlu2SgT5u2w

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1588 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b92a41b15ab2b73c78782c468f5155d

    SHA1

    157e0097644e0656a4026c2bdf6f733b8e1c931c

    SHA256

    67c0e6f971aacfebd8cf461f2f6078153066d9ef37a4c8a8e5bc5e301ff4d8fb

    SHA512

    1a82e28046b5909f6ade3597481933071a7fa61352e4e5a74cfdccc5835d5b46c55b600242a0933954f3780fbb1ddf869ed0350d3f04c093dc903961d0d933a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    941174a8d8050c470ef90dfc6b0c9733

    SHA1

    f2678423ae1e129da78f684f9d9f79c47f86f4c5

    SHA256

    264b07233719cbf007a5b05d1f9ebe6cfd07727c69d59618c1e5a36d99e37bd5

    SHA512

    0962546256e102d3842c7eac79df4f1261ebc3fe585f5a5efabfb856ffd9d7cc895f5fa4f9647840693356205df20d2999416d4b28ab6a4abd487b166e35c182

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03d399c9dc7dd89c0847e58a5490d7ea

    SHA1

    06a1022bd6ee9149a956b88b53d3a5ae2e5dd55c

    SHA256

    7191303c8151fb557cda2d533ac49d186c2f449f83e6c914a030bb3c1f3abf8e

    SHA512

    2175e39ef7107311a8e2951423f856baea29f5a8c11db8bdd2f554fe41bef5ae7c63390c02d5c04c09062b816daace1aa741339000ed3d6b20833269a00a8c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    446162aea809af98d9e10a9da9be3b14

    SHA1

    c89fcd4d1c105f9681f0a2acdc8d4ccbed92e6ea

    SHA256

    68bb357f3030e8f46a54d6c00e19615036e6290b0d9b8206dbf06dbc335858a3

    SHA512

    4846244b63df952828bd82f974ad236add11eb7b149f86114c30232bbc234a8b85e505d9ebba8e7485b719770926c020af570df3a777d52b88cbf67b65e1f05c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77416686a29479fc3f19f16fe0d470d3

    SHA1

    3b44762cee3da8244cb80940d27f17f8928f32e2

    SHA256

    62905ec70b51a2c5e7ff37239a781c6691fefc55350abe9ed354d15f0d1770b5

    SHA512

    4e123baf005785b6b2197e0b8e2058edc596ab132c42c7bed43ec7d0fa1b2e34118b5554bc4f2171b1b417b4effd42b3fb39995f30816f1ce6c9ce76f926bdbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf5be7bf4cc4e577102260aaa0e1c7cb

    SHA1

    26c8737446a3c31e1f23af712175686fc92bbf6a

    SHA256

    55c1b3e825f356d371197a10d3358e4fedcc9768c363ce12645948d8cb5f4f13

    SHA512

    32fabc6ec6a432e79e0a3f2372fee32e193f770eda5caa34ad30258d5654d0d6bb98ef01103ee441c44c2e00b7fe4cf0ee2af44ee5e3001dfd8c23109033b653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    514b6b537e46a0d5dad01c433a4a2fc1

    SHA1

    b2594f1aa5260562702e2845a7c8b3e61d8c989d

    SHA256

    e8a0f517c0e6f1c93fc02b77bf1b8bdeaab21f00306cc3f8f2f77377966f8ac1

    SHA512

    accc0836b7b48c4d35af243abdd3574d74ab3d6c43e019ba53b8210421b706c0bacc0658a4bcf5a4ff60a9a83418985935762cc8121ad7e8fc99dd6424506ee3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1fbc3a8c4a0e9b84be510bbc19fad8e

    SHA1

    5b399d209c235393aa768f94def95e834bfba5e4

    SHA256

    6bc1f668f8f4273fd46f407dd303e19363e3c68f4494350e647ea9be0c8d1dee

    SHA512

    158ed4b1d66c212f2c47951371a051c71797938fc042e7ba4be9d191a0f8b019e981fb6d8805e5080e59be7657037968859007441665f930f9aa2f0228f4b579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ddb7bb00519c2f989fee88dd7467125

    SHA1

    eead3c55f88541606b44e8d87759729196c875a9

    SHA256

    b7214c809b90654f53befdf843c241a3d8eee54c64be25686d33e20d4627f785

    SHA512

    b62efdc2ce2262f96b97172f4096d2ce0ec53cbc23acc6fade6b8b80c5674126d2ce184160bb9b604e864d4825debd9e1e7bde41e86673d70d0b6422e06cd0b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69da609ca528a5fa45087132acd92545

    SHA1

    1c61dca9ccf0d4f82cf99cf8d58728bfd5c16d54

    SHA256

    fa9289194b0730c9ddfb79750a03cb5d93136131d754386672e46d8993adee8c

    SHA512

    1e5db9239c854657db1dfbf2c235f393a5870c7a699016584fdac5f177711b64ebcd8945962e9db58b054984dd00b266c64513f1adbd46cbf7e7e3d3a9771557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70f2b23133e7ed5b2fb262912d1913c3

    SHA1

    f39e7642c4808b13a7980074420f5e2cead5cd1b

    SHA256

    639948223226708daddec45020d4d65b9d7c6de802c9a02eeb593369769d547f

    SHA512

    637b0a5b35913899b58834c0ed67bc7eb3823a535d47e49b2e13797f322c804864bbc5dbd48123fa45b2c1b47ce1ca52ad902bb8868597ff50236da7ecc66bfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c9edf433f801843c5ab4a06771c33e4

    SHA1

    7429b6d2d30938f63e34351011fbbf34446c324e

    SHA256

    94753db99ce373f37307d0bf81265807948dc1574dc63633a5762231d46a0a77

    SHA512

    5eaa89869ad8d24078444dc61f30ca7beb3da6dd73ac61f076397ea397bb2d55fa89587f7d076a52c82dfc05c0013f6d274e4db221a8c5d89b98ab9541a5be50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36dc3b11b0b29eea4953e3a6ead1f43c

    SHA1

    4d3dff0e40d886c443afb39f4fe47c0dbcb1d9d5

    SHA256

    6f70ed44f9431c9bc91ab6f2dfeefb88c9068ca03f19e696ba6ed58d9648d324

    SHA512

    132d6fdd1b9d0140903aa13cfb8d29cd3f580ce57fe4cdc17178ad9a79e6065919a416f69e74b8757428fdeedb297b7e52e82b8ee0ca63972c31497ca9710c71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3883717c7688a939df36f540f6b4794f

    SHA1

    1e0fa48b8dfd2ce9f61de91e5783081db8f93efc

    SHA256

    817b2247c478eb64641b00c67183791d97b73f5e65040d8f433c0c4183e4785d

    SHA512

    800d6036410ab0fb082507fba7e886c7e0ab6701aa70cd0ed17fb58a96482407c4f4b24ef55a0752155a9e371d75c86a400df78882f954e5d2f0322bd194fe81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4df82cf6f0619fa0b872c4c47c801971

    SHA1

    2e12a5d7599d2afafe65f006aac9e217088263e8

    SHA256

    15ed913b967f3fbd613200e328cb40d29efc552c76a3889af48b619dc8a084a6

    SHA512

    40e6e5266a4cad3a1aeebedc460bea09b31a30af6f70a2c9d80477ea9bcd42c946d7802f7b21297db2175a2aaf13c96a4a88e56792629fda3af42f39e0763552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c0d7570ff0a8c482e717f408912a37a

    SHA1

    eceb4faed4ef8833cb3252ce138d378ca46146c6

    SHA256

    be0ff303ae81a4e41cc10a7b139bbdf005ef6ddab0d432ea28eea44f8c9ebca7

    SHA512

    1b3631db5acf106cf1ee92c3211f54dfbb7a606813647f2e9203fa07e4c26950a61f82a6ba451a5d0e158b4189a627c28f5e9a42cd25b764a8029f5986df05a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93cf2e158c4ba9770df96189638647db

    SHA1

    a3b5050d3740211eccb481ef6854f4167d309b59

    SHA256

    b3735cd3af84604f3bda48a6c3eb9456627a88009c80f943f9ce3942be7cb8ff

    SHA512

    e5c60142e166b44ae7ed1691e505f269934929405310ae37f50fedd73e18d9e253bb89bc9c2d524d7591f81a981001baaa5f61a558fc3a317c9f3bb84d53f31d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e12b118e1473cce32570776503dc2cf0

    SHA1

    b76c2bf81ce590624ecb662fc1bfc11a8d28b4ba

    SHA256

    e2c14e6ba9fa85af96af3f5ed4fd6aecb8ebb3c699a1882b1c7add48d0742823

    SHA512

    5d275c85f73100bfdeca190e30a281083047dde803bed0a9e613745d67a14db308b559becc23520839e73b34ea3e325b5cdf9a2f7cd0c3a2264054e22e0eae7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dba335780149fd56845d5d7bd0c5373a

    SHA1

    e35f9fd7ae82a4f11051d7a78b873e668b920517

    SHA256

    db8f1dccc4b92e013b22ed35d5d70ec6f9ffe6dd908f93fbdb8e931332b7badb

    SHA512

    088e9aab333b4ff2f045bae0cfb28692c9b0215290b55b6a5fa99bc4c2f3bbab777d04b545a7e460161ab586a93f8ef6d64f8b778ac75f10c43af1a121feedf5

  • C:\Users\Admin\AppData\Local\Temp\CabE448.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE44B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b