Resubmissions

04-12-2024 19:24

241204-x4fqgsspcn 10

04-12-2024 19:06

241204-xr4a1swncx 6

04-12-2024 19:03

241204-xqb55s1req 3

04-12-2024 19:00

241204-xnnq6awlhx 6

04-12-2024 18:20

241204-wy7fksvkdt 7

04-12-2024 17:37

241204-v67kwasrgs 3

Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 17:37

General

  • Target

    sample.html

  • Size

    19KB

  • MD5

    dcb9d87a83da8972f5cee58389fd1805

  • SHA1

    04288b3a9f36616088c0111bea2473c8a32a9756

  • SHA256

    2ea93fd81425d720cdfcbcccfcc878f16f5e870139e14b851d149679ec82375a

  • SHA512

    2e5cc2973b00f2d9688c4cd051c3b40073828b5e65fbb4cf24f0123a2c262c5bc09e8383d4a27fafd4acc96c380d9b7c646176d4d92c77f337065dd69acbeab3

  • SSDEEP

    384:X6CdeU1ocy4K4lbGaIBvhpNC9CKVlObz6r0sZZfk1xCejiw:XVdZ1ocy4xEaAJpNCCVbz6r0sZBexPiw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c824332425c4010928bd14249a67a8db

    SHA1

    d4acd4f91c9e3c0a31e83bf609401706d94452c8

    SHA256

    6992064cb804737713ab4e75eb6098735af2706db770480cbdb8a21300c298cf

    SHA512

    ef98fd0d1229fcc70403a7e674499bc58e3e861c1129b82d1fdcb5c1004ea7103db7547f7c02fcc5e6dd8424767a6450651b12563409eeaad1caf3cfdf3a3022

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61379551878c1160c3cadb979e748776

    SHA1

    a32d26f91c0ebd1b724c07db4c91f71b6e7e9858

    SHA256

    7aa847eddd07ecf16ea43b5fcac709e3caaaefaa07ad0848a72f448376b6a022

    SHA512

    0b458aeb99e4ac867325f9f0738a927d312f5db26915b78667c29365757f1251f1e2b303765cb9c93e6759bb14d7188f87812d52957863bbcb826bebb155b5c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a090d43468150e9437b27fcb378a423e

    SHA1

    4eab5e534e662943db9cc6e3e628da2eb5d75a7b

    SHA256

    130a1638cd9b027287e6e7c0ed73d1150ef9a1a8f3c7e4931ec4ffd13819a086

    SHA512

    a59fc51b5cfe817cefd03a755a8501f2ba0a74c1cb060b904c0768d00be82769cf994cd3ac7e59b1494f10f8f2af64bd1d6ce74d86c8c5da0a8d583f80389339

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f64a823ca2af508cb4f127ecee68426

    SHA1

    2b0da768b39b571509aa5d49fb68a397269208b9

    SHA256

    0c830efeed17e568c3035591367175c307236f207bd76214ed5de2bb89808ea7

    SHA512

    842cf059997bdf0e4a95b1c0712c3c7305353948b35894c15c3b04bf0dc5689811977cb8b450be3286b338df43988bf04a5ab80d46719b299b753af099c3e555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    457a48aa173d00bef0bf5606e8c1dc75

    SHA1

    e5ef77540116f78a55ada22cc17bc6f2afb0d416

    SHA256

    c2daf0ac77759518d4595a2be0379c9a264b90079bf0704a0ef0db672e578920

    SHA512

    5ad9a46e3d93f0b3fe849fcde286c1e06f53ee991036650bf5ee08aede4d9dc6e5d4af0b856347f0c17b4999f880c6feee3e25cbdf96209dcbe5a930b9a5c8f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e394ea292ab20ca425990a57a1c9b20f

    SHA1

    4daf8e73e09b55cd50a0fb91fdc43f4842cc0ea5

    SHA256

    09fbd5dd7fd87f1007ab181e25e65b21be0f86026f6ed997e6c95a7d09ebf1b0

    SHA512

    769e59f4ee926fac762512add492bed3b8ad018b509d142dfe009a005f67efab7417255665367529c6d493e4fe5efb2ac4c921d9f09c4248a4d50652d59d4f08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80914afdb18bcdd7970ca60661d939f1

    SHA1

    9f6bbc324e1218e822c19196bc28071b4ed71ac0

    SHA256

    84469af34d4e6029965641e5373ef0892ca75ac5bad326a722b6d94e1fb20926

    SHA512

    f01d08e2203967054a61c45fefc6c63aa1de26d07ae0a0d313d16f9726ed844e5184303693515708d4d9ae1768fcc9515041aafa02068493796b58079c8e3317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a88c831aeb06a4d2c9994c317362bf56

    SHA1

    feb5a6fabc3123d4b17217dedbb53e3b9890c091

    SHA256

    e1e7732382b31aaea5fb26d132ed761420a1d58651a92beafc7535ed06cdf360

    SHA512

    0588c79e08b1e8721a7babc16630b9aafd2e0b6f913158e7283a4ac0cc125984c9ebdafe2456d76dfc96bed01210aeac4e7ebfb4c31b6953f4b3866e164c6308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ea17f975d20c5ba0e397dcd0bdce7cc

    SHA1

    07e1ab8d6d73f24549ff6503dacbb5b52434dde0

    SHA256

    cdac71741a43b52ecdee057c54c9fc673fe624345862e6ec7bdddd61cb11de68

    SHA512

    fb34b97977051a6deb343b0173603b905d6661448c37a41d23b546c4bf7661038c9d0a57f0fb3b10f9e81ed2b88a1dadf205a9b391a57a165e7294fec5581e57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    941195ed7ef3df9892ee521d86399cb6

    SHA1

    3b38321ebfa6063495d4b41bbfb97bcabb08bb83

    SHA256

    572dd696a754cde9c41c65d41c6ad1716dcc2c4569cf8ce7d0c0dc4e4e896789

    SHA512

    1d3a0a81169d5d46415016aee0ccc3f09b9ba457e81c243f1284c5d5f7b3c162a74970c34948d9bc17182e46feaccfa52a390c15267dd45d3b9a729d52b41782

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9e1870ace54ea6f1b4ac1556b1d9502

    SHA1

    e3df3252c26632d88061964fc91a88ebcc58ec6c

    SHA256

    d999a254021758e94fe343ab7382ea3b9e5f7a6138b4dfd90588676aa5efb3d1

    SHA512

    e6ed96349e3d5d5974aa384be039dd645d85aff034f1c5c2e618011b8c08170b6aa270fd775cb50c863e9724328c5e2fed901263184fb4e063bbb2097ac7d6ea

  • C:\Users\Admin\AppData\Local\Temp\Cab70EF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7101.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b