Analysis

  • max time kernel
    239s
  • max time network
    241s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 22:30

General

  • Target

    06134f55d8dfd5860281ef05391393e5264d62666639d53a87eaa213fdc9c606.html

  • Size

    4KB

  • MD5

    b89fa624408b2644781591a3819d0be1

  • SHA1

    73559e532fd735cb5dd83cff26871464ba8a7172

  • SHA256

    06134f55d8dfd5860281ef05391393e5264d62666639d53a87eaa213fdc9c606

  • SHA512

    bb7b517d7d4cd41530d9d9c007bbe41c8a8c41c980aeab1db7ac375025716381459ea10f41015be267e8c1fa9a32e2f5126beb7613d02e4ef2c67f89cb5fc120

  • SSDEEP

    96:1j9jwIjYjUDK/D5DMF+k1LxvJADh/pRs+rRb9PaQxJbGD:1j9jhjYjIK/Vo+kFRADh/pm+r19ieJGD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06134f55d8dfd5860281ef05391393e5264d62666639d53a87eaa213fdc9c606.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d664ede2d002e993d8cf472e8fb4b076

    SHA1

    e7811bc70289d88ec1010dbbc1cf9d92f755514e

    SHA256

    39f49b29f03e3f5549c273536feb4f4db1c6ca8e3bf0d8869446b6a8f489f9c7

    SHA512

    c828f7343a80fe6c83ab43cb0c2e9b07b75557ca0c3359788f6bd012a64e554d9a94e5076fd51395c2e85e5a01a59c1965b37574bfe250e28230e07724be3012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6697790c6d1afc49197ad90d40bee419

    SHA1

    d416965f381431095b5a6f14a46afd16ef05bb9c

    SHA256

    216649ed86eac020f15a2b49b9f661b3ade5ef056d358055b05ee3c78bc5b61c

    SHA512

    729bce8e09a217d07156893751d10eebea1fe9afd1e08c161e50e7abb067f7e57317f90059b0e1efdcc53089347812fa6aebd6a353d86319ee63fc572ed8fd04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    696dfdb07ab55d5b31018965bbfa64b2

    SHA1

    91c9852ee018ce0149e660162923fcdc472d9bf5

    SHA256

    d40ed8f57a58b908e6879535b6c821abeaaa5be53fa4cede38c97dec95f8e5d0

    SHA512

    17c920bf4408b08f26128a00997a63707b3834aaf401e3ca0dea73bc2217ee72bb8ede4869ec8702834e966c756fac51971ae54f81b4a4008b2a2a9060274829

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebac25e50dc86b8eb496e8a263927c1d

    SHA1

    7186e287a2b4af95703b0c206dc47892aae4685f

    SHA256

    c89505639e27b32680556a1270a247f9f39aace422fd4ed1d308620f172c2a25

    SHA512

    12141ddb623232ea775cab3deda196c59a4d1547a88dc00a6335a317e1cdb04ab4520210b445a36e650ded59d54dfa902543eb3c34e3607e839d27a2506f11c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4126f185a1044e3a242001b1add0fb9

    SHA1

    bb6512b3018aed503e78bd6e665476a737ab23a5

    SHA256

    956c6aa6444ada8498cd793f7cb4b332c50b579ad377032312fab871e45218f6

    SHA512

    eec1271f00b83acb89ac909f01a206d2d95a486065e6ca242bf638d7ec0d56bd20a6b22db6c820e8442a6da3a262a1697a83e249ce321c52cecb7e6bde892d15

  • C:\Users\Admin\AppData\Local\Temp\CabBF5C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBF7E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b