Resubmissions

04-12-2024 19:24

241204-x4fqgsspcn 10

04-12-2024 19:06

241204-xr4a1swncx 6

04-12-2024 19:03

241204-xqb55s1req 3

04-12-2024 19:00

241204-xnnq6awlhx 6

04-12-2024 18:20

241204-wy7fksvkdt 7

04-12-2024 17:37

241204-v67kwasrgs 3

Analysis

  • max time kernel
    1559s
  • max time network
    1561s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 18:20

General

  • Target

    sample.html

  • Size

    19KB

  • MD5

    dcb9d87a83da8972f5cee58389fd1805

  • SHA1

    04288b3a9f36616088c0111bea2473c8a32a9756

  • SHA256

    2ea93fd81425d720cdfcbcccfcc878f16f5e870139e14b851d149679ec82375a

  • SHA512

    2e5cc2973b00f2d9688c4cd051c3b40073828b5e65fbb4cf24f0123a2c262c5bc09e8383d4a27fafd4acc96c380d9b7c646176d4d92c77f337065dd69acbeab3

  • SSDEEP

    384:X6CdeU1ocy4K4lbGaIBvhpNC9CKVlObz6r0sZZfk1xCejiw:XVdZ1ocy4xEaAJpNCCVbz6r0sZBexPiw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1668754b49abf2753cfdc1affeb01066

    SHA1

    f76ff58b93e3d0edc7b11c4b509ae655411a9c9f

    SHA256

    452fcaff5ff842260576e8762ad7a9d33c3d82d69adb9e39061b72ac2a92ce0b

    SHA512

    2f0df9aa9c6fd256a2897ef7976033741b76fc2ec16d44859f583b9bcd194b4bd767d0665091f09b2e3ae98fd49e70bad7706862d759ba71fe3e4af4fb93996e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b72dd4346c38e94a63b52393ce80b4fa

    SHA1

    1751f6d6d39f79e37fd554561874d787dc4f5bdf

    SHA256

    33d729f095f955c85e411ab6fa5d7e7b90136b69e18a06040517409a95ce98da

    SHA512

    420a0857910d7b151ecf5a05873fbedc350fa71fcc90092cfd0b8ba6ca2933abcc51f07b8b3a07b44b269940e7202025605771d5c967a6f9d3c16621493504f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69fe4eb927ddf8fb564aa3d3c712378f

    SHA1

    443f800a197d79a1e58bd509a6a2bec7ee288853

    SHA256

    7a36f2bdd4565019fe8d4d19063d91ded4c84695ed7d33570abfe19941857d4e

    SHA512

    245adb8d438d8b728667aea9e1d18200a16257652401809642a5b694d04f9dcb747215a5aa96125c30288ef4fec60b6a114fece190b50c37e3e1dbec159301be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e97afe1c56c2a7fea181d409895176d

    SHA1

    b44c4237fae34dab2e45fe3fe99d5b3be4306802

    SHA256

    1945d1da6344a87a2bfbf64868021896080555210b1281732568495ccc4a5a44

    SHA512

    4c792747f5b9aa5a03406133d2f3f7de32ab7743f7f9a0616cf6b5ebdda381d6f851b90d38aeffe009d5546baf1801326d923ecdc1e8830d4f55e4b53cfa045f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd07ec40db6b98824e0f596caa11cf3a

    SHA1

    6a3832454b6cde45e22549af1a2e5de61c3b0d33

    SHA256

    72610b1cea8561304acd8e06d28dbe5371381d7b21c22eec8a6e065ae0f42d22

    SHA512

    48399bf344ba09bef9d4eb77a71a76da3340bde88c6990b7ec465e3e1ab2bb66d087d3a9c11a5bb883a3bf88e8adf78d84c9d4b0384a5d77775c0583f0eac4a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9430a6d876b6a3be991f146ca53d45d

    SHA1

    8120db79973b0c381efd8576a7c28e0a4dcd939f

    SHA256

    e50e310385071f3b52f2ca06a7c3946cdf6d15cf75912cf31fcc4ead4731bcf1

    SHA512

    d284a54cbd3eb450ffa719d5064423453998e4ab55d9eeb11c661a1bf2f2ef3e5096424c7eae80d3c4eb1fcc9897e2ca8e714922f47983eb544d08ac6137dbf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e42fb8488bc11cac1874151760bf5ac2

    SHA1

    a7972032d29c4f36e0bc20a38f817e7d4fbf33fd

    SHA256

    b1a575c621fa937309dde55024d34a3713c5e13affd584c3a358a8f012f8c4df

    SHA512

    da92af76f0b2807d1dbebd003eb3b29add64bf0fd6fa3859386cbd88abc2f72f77ed02117f62e2ba380be3ae27b0f0deaf33be811aa54fa9a9b64ce0daa6fc81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    398307a599c44c8978b18cd582d1d79a

    SHA1

    f5b7d4b28a97f854cb6ac6f6edd6386c7c9eefc0

    SHA256

    797e97d898df09fff822361ee9c8e02b99175cc30e04c4914c881530cdcf9b2c

    SHA512

    5ea7ff45480faa6e95a20aa05e3bc2f878a51a8195bc1b3aec2a177004e44cf689ced9bb7f2a0ac9001cdf1a625a617168a15b75c4c9831691457654b0d29a01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecf66b9ee4f7dbab0d848ebd6578b7b3

    SHA1

    2dcf6921dcfbebd47efaf2322ed448f0345ef53b

    SHA256

    6bbb8d0655a4b7b931e309e9b203bbf3ae44a58dc5b43078302947eb7c63f27c

    SHA512

    e08d399a4a98618fa11f489559da2b7706a3e55aedb5cff95bdb54bd74e14424cc07bf5b76df5317559cac44051854a69c0622e724cbcbf369939463d9afdbd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d47aae322be5e2964e45dcc7ce8c5cf8

    SHA1

    5ab682eb1acf527757fef892af4dc25eb9021cad

    SHA256

    ed6e766205ae2a6c310ae2763f557155c5bb42c3ea91bd3957ea2930990a3f57

    SHA512

    1a4da74e07ab1081afdabfc3cb381e4333e42953f249c38106b82f319cd6555c7f255d45bf5b41cd52b8de264cc9214e476320a840dc49b16278ec5c88657c08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba9bb0521d08cf979128b44266398682

    SHA1

    1c64571288e79d4ea840d0f8bcdaa4c15d746bcf

    SHA256

    5f7ef347eab6ec2ce209910fc0df4bb82cf5c30a342a1252ba7283d76bd88f78

    SHA512

    c635771970eee9e63eaea6313c34ded991523299bb6807532c3334cb1253a0aa75ffcdb300507b0bae4fb22d188180a36fbbe4e45fe0fe1a42743beaccf85c97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24229fbc47c3688ed0dd54f95999aed2

    SHA1

    74953d9946ead1cfd3dfbfacdfbc39649bea4209

    SHA256

    caf15926a94c3d3e7a90ef5a9c2e09a0426f71c4805e10cc25cdc861e1979413

    SHA512

    d8097b5b84c49ae1d37c987c11a50867a65f65ceda876644f5c1ed4a06f1f0c899f46d623b7ae6178e3234d667c59d66c0d21a56160857adba56020b99bc2434

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84de67fbb1d62c7d488ac4773f0b10c3

    SHA1

    64175388be55878345df77a9d773a546a211476d

    SHA256

    6fbef57ae0d950e8bb31d39483cd0d201ecbeb93daace73674dd6ab1f78fbbc3

    SHA512

    29d81661a20eeb37ce0e351a10d386978a38e387c8ad959bf9536d93a44502b849e2f0eedc17b709fb8b1d4774b4ff0e4203a8145486518c8bfc1c9e5f44889f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8001d59c81a8c74e6d3d4ae40838827d

    SHA1

    38e8dd062ff0dd70e8f984f8e217693552ef6b97

    SHA256

    04265f6ab1ebf9d5d52f5cdde2ed4d15b1e24f15166b72a15acbdb86b100f9d9

    SHA512

    e75219c6c8096ba7e51517008c45dce19e4ddf958b3a92b36dc25fc88718b379e9839081a4662bcaf7ac3aa11c19b39a02dfe2f5c8aad0983d767a3b01bfe224

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac2af5a30a13ba9e32c0218bfe9bc808

    SHA1

    78aa94a6a3e32da0d49bab73dafe70961cc63d3a

    SHA256

    40f9fd1919601467fe94bedacb006276db95ddec85c4b3c0ec094a17a31a316e

    SHA512

    f2a12ff84361542dba1014602d3334b58830ddd15ae5b89a842bb9451c2d149f15284302a55899653c98fde8d4d43baa7567a6b2e59f49a842a3d547afb426c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9352ce6cc2a522416532210e85939d32

    SHA1

    0b21b4741707a236f0436d0a046706d660adbd74

    SHA256

    612c771f6b23d0de6a9858c62886ac5884d3563472de421401120a6341a8e136

    SHA512

    ffde6236c93d35b1d6f72c7b2d7502276307f4982bca55496867a9fde915dcfb63381c877ef508fa52543a6cc2b9097aa699929a9187ac133e534fa0b24394cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    001003b20898cccc29d54139fb9d788e

    SHA1

    0de2188738875563be9545370a597a0d29117fb5

    SHA256

    d1264f0e5db177523bd861a194a7aa8b12bd8b0a933e82caf5b0a2c83585314d

    SHA512

    36c54ff0f1223e642a1d7adde1f6202e10bce2269f7624b4e624ca0af99af5cd7adfa35b5a425c48695ba16bfbb26660fb14c18139225cae0c8b0147d6434235

  • C:\Users\Admin\AppData\Local\Temp\CabD655.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD733.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b