Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 04:19

General

  • Target

    WWW.meNOKIA.com.url

  • Size

    148B

  • MD5

    403b8ed9703c0b2b8a87cbdafe9619ea

  • SHA1

    19a3faf0670d67c10ea08318b77baeb527b15f22

  • SHA256

    567e3e76678147bdfa4f7bfa36c28d3591cb5158a4e7007afa9400b15db320e0

  • SHA512

    4cef1eced54e98a06303b1399280943eb1e2af89c5252f580fe608302b5ce50eb10cb2e3f5c307d66fd1c1d2532fb7b3a2edaf46287d681c4123f22bb1544009

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\WWW.meNOKIA.com.url
    1⤵
    • Checks whether UAC is enabled
    PID:2552
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17fda474e19bff3e5a42ac05b65e9887

    SHA1

    883baae0048a11fc92557858a56a7c695ed479ae

    SHA256

    8b99ad8665005bb19f680c1dae91e58c52a8fb13211b067e159c644fb1f4cefd

    SHA512

    bf3599e6a38d30e595d2177056790cf46f4bb4754d07cfcb1f6aa37b3fa5fbb9b36149c7f7e7f50135b28acfd0e26a098b270cfb8c16d9b07ba21a6f6b0e3899

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0621f3a683678452e48eec66b78ea009

    SHA1

    4796f611d31958ed2006a0ad1f8fb07dc3e61885

    SHA256

    42e835a1da566de5750fe9c4926eb5bb6a8696fec9365157ee9fe25d33ec4a18

    SHA512

    c03e1f1eab3f2d623fe974d09a0cbc2f30432019848abf31e98816736de2bf975c63c8539a73f4c43b11fdfb39421ec24689a1792e153d18181fb99160319ea9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a9cd513eb6b7c93176b045bbf51898e

    SHA1

    0bc2449c0c082f3ccf1fe692cb5f7ed0c6b4a8d5

    SHA256

    a5880e2159301e6a2a57138eb2d61d46a1712d38ea7b969c6b2a8344abf155b4

    SHA512

    9511646be15b8754c2aea93549c7c953efcf52e2df00ac4f8212e5c00cd3570a0f3add6c4126580774eb3a0b4883fd7ac920eda2023083a11a82bdbafcbb0b2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0815b7670f9a1dce5108fc71f0f761ad

    SHA1

    d2092447c516fa9dfed285d3febb624beba11576

    SHA256

    6cb452f32adbd0e0473e1964093157273ef45b353072232d967d9b0818e522f0

    SHA512

    1f1a83d507bc1c7c5d6e94c95d023a587c4debb6f7977fba003a23607bccfb646b9240eec18dcf981465ae0adc567d21bb2c6a04387f6c6178675bcbaa22ee39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    835d74186e0f93200e3531b5700eaaf8

    SHA1

    7eca61b51f2e4455fc80d98d02a2c1b0db49ffde

    SHA256

    9a4fb27dd7e477a047eb51c3e1d72338ce0abf37b92a25fd981eb0708cd3aa16

    SHA512

    6cdfb795b1051d7bd22091dc22595fb5ff35c164c53670eb47a872ac64a671987411cb9bf4758d8b85273926f2135d4a57e2bde129880e9e329c870ae007bf6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3162a728b4b3af1059f74c7b6e5c97a7

    SHA1

    edcf5b2aea6f0ec40d1a8b4ff54cc3835a18d042

    SHA256

    3409978c9b43ffb4ed6f0d413597433e424810af994b77b641b231110d4b8111

    SHA512

    a91847eb36029b77d4ffb709bf796365daab0971d53b5bd78677192c6a07563349281f6aa6e92f4edab23d742ba502cf08ad590de85ac760a98408617faaf54b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f28de70155e096c79f809c2ec5a82b2f

    SHA1

    3911d051517083ef29166b459cec249d21085d9a

    SHA256

    2103fd561ac4b9f78656cc11a41e90ca72fa4b3ba393fbc98206ead9f7695af7

    SHA512

    0c71036fb3022bcada899f85c5dd140c530ed0710966a3b001be075bacabbc1be99d1415f20ec8fd7e85b8c693fd883c3e339435a663655004cda7ebea9c3995

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd43a4d57988098adb5eab7c51649073

    SHA1

    bef0d3300f690385ef6cbbd10c104882b931c58f

    SHA256

    3305dce5569d442eca22d638ac5faeb9011cbdb70ffb09cc894f964209627cad

    SHA512

    be9034f44e61ed386e4495d0da297e19f35c2f0238efcf29a932ba740c6b6436a3f20990a544784347e432d11b8837bf08da0ef551151316a5dd96c2b3cf5b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    247492a4887ea8c667df9ffecc21ff66

    SHA1

    20d0244a0701cdf6de1d2bfa86b8b0371d8588a0

    SHA256

    391a7edcccc93e3a8eeb3a9a94dc763e8487ea76d855809d679a81699a2c516f

    SHA512

    229c823f24ea7a97ff121b0c163085bc0937d0feb96afeef3dff8b43aa4cd29274c1b9e453caf120b23a6af0b4211ad8dd3b064766702ef0ac66be05c182d6c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6864836f4cbe1f94931534d40058946

    SHA1

    d8cabb5ea38bf99a906afee18398fa761f9c9c8b

    SHA256

    12556b4cba401758ff97ff2261df5fe6f2c84b389a7cbb9653c692dc71b52cc2

    SHA512

    be86d2438d4dbbb5bde656a806ce0900a51f8d2cd302b5b1a00a56a8428dcafa04dd561a5fe1632bc805d26de98457de8156f52d19f86f4126ef91f9eaaf398b

  • C:\Users\Admin\AppData\Local\Temp\Cab99B2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9A62.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2552-0-0x00000000002E0000-0x00000000002F0000-memory.dmp

    Filesize

    64KB