Resubmissions

04-12-2024 19:24

241204-x4fqgsspcn 10

04-12-2024 19:06

241204-xr4a1swncx 6

04-12-2024 19:03

241204-xqb55s1req 3

04-12-2024 19:00

241204-xnnq6awlhx 6

04-12-2024 18:20

241204-wy7fksvkdt 7

04-12-2024 17:37

241204-v67kwasrgs 3

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 19:00

General

  • Target

    sample.html

  • Size

    19KB

  • MD5

    dcb9d87a83da8972f5cee58389fd1805

  • SHA1

    04288b3a9f36616088c0111bea2473c8a32a9756

  • SHA256

    2ea93fd81425d720cdfcbcccfcc878f16f5e870139e14b851d149679ec82375a

  • SHA512

    2e5cc2973b00f2d9688c4cd051c3b40073828b5e65fbb4cf24f0123a2c262c5bc09e8383d4a27fafd4acc96c380d9b7c646176d4d92c77f337065dd69acbeab3

  • SSDEEP

    384:X6CdeU1ocy4K4lbGaIBvhpNC9CKVlObz6r0sZZfk1xCejiw:XVdZ1ocy4xEaAJpNCCVbz6r0sZBexPiw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c3cf43f04d27ed42b938c2b5981c240

    SHA1

    271f3377bd2d8cbe1f0cb7ba3fd1544cdae8c98e

    SHA256

    04195b5413c753e69f7831323102685e719fef91cb9fb8b5584772976af91a1a

    SHA512

    3035422ad08f0230f6bf0df954b9b5750de88efaf0e8e4db257a39d9325a6142c2920217212269c4f42493951f00798788b3308173aa6a8096c10aea1fff6603

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3370928b83245ff135c93e55571c2597

    SHA1

    9f86e0d86622e9bcc921c6a9271d7a239eccc639

    SHA256

    d0fd31eb1cb307cf94d1e1983cd1eb7689085a78942f02ca5917fc0ea95c2f11

    SHA512

    dba794e9ad45a242b102ebe2af16a2e6246a4e841b545838e5eca0226a0b6ae9aaf1db9c980e682bc2b846da449b9426adde630c0942e8fff1ea2639a38871c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5764b079d4a1d07e31d7ee2543bebce3

    SHA1

    1d5cc581fa5a9b9067620da159b1eec9b95206aa

    SHA256

    7eed19a32067afb65b0fa3d91cc2c2e9ab422073098c0fd0a2d6e3e4a42dd01d

    SHA512

    a4339cf4c84c5404e3f3d3be3c449903fcab04f4e37b598ad96142907231bb892ba05199f0e8f4812806bf549a9c5f57a00d8e8db5f980d8b146c7e66112e3b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36fbe715d06e83d2e49a380dba796f81

    SHA1

    42c30faf3215792b82839b6650c710364110cbfd

    SHA256

    e52d9f42d8dd6cafc96f77ad6eb44f14b90b1e6ff66b18d6d8641f72743605a8

    SHA512

    4f65c28de6465749faf1d295d2576bba692658c3ab0a6f15ac744a57fe71799a7f3f6902ef55b9fbf46fff6593540ff777196846fb0520317a0ff1ccfb58e032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    603bceb30a175000b82f9e1551f35f73

    SHA1

    70ebdde9d844e988c8835fd37943f20c41d961b8

    SHA256

    02aaaa073ce2569d5615df3c8b001b365600a9c771bcef14cd3740a845f46c77

    SHA512

    ac2c8634ed045bdfb46a60fb4c0be6ccce1973f6bd4f20aaebf0b9802d8484f99857355c699b0c29c29c1ec98b4818dae58e722eb4158df2364d90ad4b1c98bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3fcc83804ee0fdc21d603a7f9e87420

    SHA1

    2c7404f81ab638e2f595bf85c7b46c9b832fbe2e

    SHA256

    d77ca918976e60a1973eaeb9eadc776f8106cec15fbb762b7f69406a57b7469a

    SHA512

    3a2be45453f844519f8ebb8540ac529b57d7a117211098ce3e76ed85adbd289c8cb763b0db6efb9f0d7f6b49c1911ba99ef66419ccef36a563a306e77b1c3814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48064ccdf0739d622011377f660d2945

    SHA1

    0e20b729a634b8ac142642c576cf31b730e6d63d

    SHA256

    c31958211dce70ac4ae039f53f55f1b3880b8c925a655afb3f41d68c34cb5d06

    SHA512

    ed075b037c648560bf31c029909e63ec29b37e68c5af798dc0b6a1245b2968b31ed60fb709b3c773947fabad781025635a2ababb2b225631d9d780321fed9880

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e86b23fd5989dc4584c8b1a10d620885

    SHA1

    b714f10e914b19419da9b9291153838bd72a699b

    SHA256

    d50037541cd40d98376553666b8ac52b40821b79c2eaaf9f35f32e02aff6e479

    SHA512

    458368aeda00d39e1a84327637c930c39c4507eeca84b6b3b3a3a2d2f48a451234d89a99e984c45583e59a3e0c2880dd851c8702335f5220ef98ef98822f634f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f0d06ce16a143e84397fe1ecc9e7cad

    SHA1

    ee07ff90f94358095d3c58268e2ec3f86538774a

    SHA256

    50ad8fee341a233e326e8096e1820e0e8f539c3d1d59599f9edec8ced1e11e5e

    SHA512

    5099e2afc1a493f282afa32ff679c2c14e5a1ff565ebf2456ce101a5eb8e40ea346f2aeb6e19f70301ea64ede69490cb675304710be299b32c2994f570f2fe3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7cfb3789757018d356e583057975264

    SHA1

    17296e17cf45a893b475ba09172fe28deef6adab

    SHA256

    75970786778ee491e0c911c1e118201cad86f4dc609cb013764384aafd85ec5c

    SHA512

    fff469351d25f8f9b64aa0a0fe878dbd619210688573d27bb5846689077952b7a7b83e6c1cde476256d50a927219490371d6ad2208915a76cac7946a800fa730

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    966741afc9709c868b94c71cb200bec7

    SHA1

    93e4fe7cfcdcb016332203687ec6d1a3ebf495f7

    SHA256

    eb1ee616ab30227a39319d4ee5aef0883f7ceb2024ac6456db4d0312c1d5fa26

    SHA512

    68bd0ca32c0172be043384907c5c4e881bb25eaa4775681248dd2a20b438b79ac019b4cc601d8bdf0d74b7af5c42ec6cff62a22f8f22924792899b9e3b5e6809

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e70762aa3ec5b7a1afecf813af32a6a

    SHA1

    fae43170102e7098fe9913c5b830bd10325df69d

    SHA256

    c2f20f39bfba417563eae6a5dd31ebf2f2a5c90796a9f82ae63b010f0660eacc

    SHA512

    ec2fcb2d77b96b4070f6e41e8949489d6ffa45992e43102ceb579960b9689db7e722472b487259f01ab59f185cf03e0cb3f7b5f407294155294c8f84b3e9c79d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eac0fddef7268313d97478fc18b607fe

    SHA1

    0959236912903162c5072ac8c476328d4d7b1005

    SHA256

    7878f7274663b945ab28ad834c6c4441f88e6642b69162bfe91987d320ce5603

    SHA512

    0c18fe55ed413f8cd9af49b457ee05290f656b853a3c7b3479b4c456530e63b2acbac00a631377868f62e0e66ec3789b175a34fb53318bb86440d0b6cc284150

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04a72d6c714fd868fe7d3873981ef8ff

    SHA1

    0f9625fabe18721e4a92c6edd12f0431488f35f6

    SHA256

    ced169a86dc153b1dbf2936314068d64f954a46908f7c3193967cfc32055e30f

    SHA512

    d4ef4e94af38591b1a3d884c9b0e1ec86d48a3f33f9e4d3d2387b978fe8fc92465a0d54043c589f6108b820d82e065f2c49cce78e28be293f1d4dba2a14d52fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    269dbc22af94587b62a4d455b812ceb1

    SHA1

    c64dcdf51acb69b14e80280e8713c69af6fa7e41

    SHA256

    f74a548295f295f0d11ac2e57c37eb0e120ce7be171b7738107d63818aa0935e

    SHA512

    4a58c26165fa499f98481f915ab4abe914520ae7cf717d1bfaf16abb05c41b4475f29ef780a7ce92d1ee4e156240144111450d296e7c70101c5a99a3a63b1511

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2bbb434307a0d285634d99b23bd3050

    SHA1

    cfe73380f4d108dd356edd7d38537ba0332d8e73

    SHA256

    5af8f09a44d2fc564f7860951fbc7bbf5aa7c5af6ff362872948eb0858619efd

    SHA512

    399d9185a563ab07211b97af05507cca7ccb755dc27729a9ce8cf29fa4fc759f9bbb6bd2518833f0fa10c25973ad1eed9f5b70a0eb82531445a6a383ac2cf9e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d85bda741fd722a2eadc6e7466757b41

    SHA1

    65827414176264113227e7b6cef1e1e4ff97ed70

    SHA256

    4bf79755f5af60a360a66d15fcd86efbba80cf1fb637cfeb5ef2079aa781cb2e

    SHA512

    a1f7913c6a123a5fc10ccccf46bdfc85b75eea5c2a9fc0f9c8408acb4a37adbfa7fe162b5f96d6b960b5f5caba293986bd3a1e7a81ac3f86757327d4356918b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef5a67179629ec3ea675caa1c67632bd

    SHA1

    36e120bc576b9c091995fce9bf863f2746b1ffd2

    SHA256

    d7b1a8a840fd3609e12292cfc1f08c7c34ad8b5687755b5e72f0546d3ec393dd

    SHA512

    ae1bf6493333e6db6098b55e6b52d078b6f89a532bcc140a99e8695f3954ac17b47346e9be43e27bbf50e331011f64b588de9eefb290536fb70400f481a56af0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2613937be35016d695adcf46ef3ce5b2

    SHA1

    4db6ff33b94adfd2e8c3826d605c711d7b7903c0

    SHA256

    8991fbb8d6b3293d683f3ea76cab0ac1269bd1785c8b38c4eb84f1fb32e424cd

    SHA512

    83c0f30139115bafdf4568436d11b966f4c3888b725a8c4a69d18db2e105d309e918c8b31112f2c9a13162aafaae59979e5f5d0295dc5d47685aa50951d00fb1

  • C:\Users\Admin\AppData\Local\Temp\CabFDA1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFE23.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b