Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 10:22

General

  • Target

    Themida.v.3.1.8.0/ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.html

  • Size

    1KB

  • MD5

    97ea28334d67d71e4a96b56d76fe0d15

  • SHA1

    caffb42a57d09d6b8246c583f0d76004fd003d86

  • SHA256

    9965e660e07492e5c45bc7c52b981d1d65f6341a415979742418f5f699c1e771

  • SHA512

    0f2c0e693dd4e83e3c0bd2b68f6015a878f77b87dd0c84da836416b74e4284e8787c19b5d361732ab0d45c2b9c924746d73dba1493d1722b93731db6229120a3

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Themida.v.3.1.8.0\ThemidaSDK\ExamplesSDK\Protectio Macros(Check Protection)\C\Visual C++\vc_example.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df25be76a04ef51e40ca8aefdf616bd0

    SHA1

    df2fb1cacbb740a006f313474921377a4d860cb0

    SHA256

    d3627ff5883d46a536eb99ad07f158f7d4f597f05095613221161e389f4475b3

    SHA512

    1e31cad3519be213f67eb67e98e849016dc265e01a02e456d31c3808518b3824a75f8f223d4d0cc6e32e5013237e123896b63b6051b42e2f721ecd5196f94577

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8ebfd128296a7ecf34d2fa83857456a

    SHA1

    8a593e9772a036516080f27f92f7e959d4fed8dd

    SHA256

    b691d81a08c7cf3ee0fa4cd19bddb5be25a84ed0f93f417dd70eb7a98d44a426

    SHA512

    93814e0eb57d241370dc2bce8ed9f22fe5759c89c13dc4c29b083185d07c6bc266e22e0ade86cd27ce6f258e60f58d9947ba4c540b35d934bf87bea9db715c6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ed37d3b2271169763787a0f1c1c153a

    SHA1

    96efda7e426e8c2638344887cd2678ada538fe8f

    SHA256

    28f87920c9adc5b47579f1ea406e06e910a935fcd4b0b8e51ad0e6d3dc4e055c

    SHA512

    ff3f6f9d5fffca826fd9df45262123231395250bbde22160097a73945597989f63b1b88da388b9b91878295cb15b55242f5d2a488007b31559a1c4d80ea6f4a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99f54153ec930b2258e6f9b36ba377ed

    SHA1

    044786f2ed034a09df7cc9b1e7f44ea7ad199021

    SHA256

    813189cbc6cbcb16e638e2d7ee2f4114b829daeabbe8f661eb4bf7e1c8633410

    SHA512

    dbe67795dd021c111439ca6065b3aaf92f773de57c5cf764bda8ab53cef84d6dfc3964026e3eba6b65ef2305e72432343dae5883717ed07954de167531169d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1e93164be53b4d4aeac805d1051e80e

    SHA1

    a5d7bb7b416e6786314da3482649dd9f36c48978

    SHA256

    d881c91fac4a3c2c009b9a8a2e9f77709b5389dce6fa18d53291407ab6f25c58

    SHA512

    af4bc0fe5e2c013366307bee372ef1b7a069007fcc2728dfa466539c5b6e9f1fa7d1dfafba1c8b1b2025be99d562a3e3b4bd3701ea778e84ff49d1235866b892

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    534046ac36f8b680dcb2ef1493977847

    SHA1

    2718b7b70283f27fb781884b795c342c086b22a4

    SHA256

    13b856c613a8996d73811889eb09b69fa9fec3289414e9585c1535db533a3181

    SHA512

    d6e9f316f31fb0da8f59ed89cec92ddd17c0658420fb23763bbe2af352e52eff01fd32549ce8e9dcfb06a8a6a4250e065b8292eee6eb7fd9e1c4311f704c4eb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95a2d7ae5e7a6cd50e3d0a7fd587cfbf

    SHA1

    9369a3eef65136e3ebe7edde2f9a15f12b0aca3f

    SHA256

    c614fdfcece0cd0208a50d5dae9d370930a8a37e0af99032efa855a9d3c4fd02

    SHA512

    5aaa7e530642f3fcf69b9d5822438088704ee8dbdee3d8c088fd9d2f3dc9d86a10aeb8e66553edfeb0e3f27746fd0f4a7297c5b7d7ab24bbdfd189f579ac88a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d8b48cd7f8a7f934dbb411246aea508

    SHA1

    e2a8db7ada50946354ce9014b0f2924c94b45e26

    SHA256

    c810572500c6087f803893ae7ea6d7eb674d8c88150fb37572958260a8c2c675

    SHA512

    5e84fbca52538ab8c100b6956d2b1128db2b4224f162ee2ee869945e7b9ad0d694badec7e5279171ad2dc19b66fd088b582dd1acc957ccf036e6c7aa84052a9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ef9213bcda16db2f45ff8e9cea8b1c9

    SHA1

    64f03c0213871d69901df675a5e10ccc55b7d1cc

    SHA256

    592808719dcacc84d56ee111008c38a59bab3da54d7eac65e3361031abf578e1

    SHA512

    88e60e571e6a6cb486e50f00b6fdbb86359f97bfa44835de51fabb4df754c2a550101d49904d913ca25fcdc2cd32690b53a1ba77f815e486e9c9957828d982c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5348bf4a76ffc0550c35e13818bd7f0f

    SHA1

    f3a017d7fddc0df89fec037b108d3acabd023439

    SHA256

    0f5c365fd80f6456ab4acd5b70f5faaee4b9a70b062fa29fa052e2481065b530

    SHA512

    d90933837f69e66ab0a0dc3cfcd999f3de68059319e746643fe209c28ce72e9526b7acae4dbbc5af57d2c12a939c1b7935101157af14cc3553fe1916e50cb636

  • C:\Users\Admin\AppData\Local\Temp\Cab173B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar176D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b