Resubmissions

04-12-2024 20:49

241204-zl8dwszrc1 3

04-12-2024 20:47

241204-zk7qzazqh1 3

04-12-2024 20:47

241204-zkt5wawmhk 5

04-12-2024 20:45

241204-zj17sswmdm 5

04-12-2024 20:44

241204-zjk6kszqbt 3

04-12-2024 20:42

241204-zhdecazpfs 3

04-12-2024 20:42

241204-zg22bazpet 7

04-12-2024 20:41

241204-zgm76azpds 3

04-12-2024 20:35

241204-zc576swjgk 7

04-12-2024 20:32

241204-zbbl6szlgv 3

Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 20:42

General

  • Target

    Payslip_Amendment12009.htm

  • Size

    5KB

  • MD5

    931df36f406e0f5495c5d77fa91bf035

  • SHA1

    01bbb0abb4f14451a48800e47d203732bc139920

  • SHA256

    09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5

  • SHA512

    df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351

  • SSDEEP

    96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88c624980d7fba4b24c7e5db724dd7a3

    SHA1

    109b92b9e4c6f404e93dc0dc69433a2ea10fad04

    SHA256

    27a82db6833f2ddba25a4e69c79987c72db67c21646aa5a424288475729b3f3a

    SHA512

    3911b3447d2efa7da8ae63e70cd40505ec40ffbf70d060ceb5cfb1d67890e5a803713526b1f84b6ee15e9b4d34389f206f422a1871c609dfe3a748fa05997039

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6f96b585acc0e58e246e964fb323710

    SHA1

    274a8c47657f4153501371ab96f0c1c09f237e2b

    SHA256

    c0b1004a397307635f2beaeaaef507add5031e9f8fb236ad9f79750a65fbf65a

    SHA512

    5a24590b69c1cbd42c1da6f5a01b1f80c59eb02827eeaf8e0fcaa6a3a76e2d82ce30d3ab72bd7a9ce095669590408db0b9d4e2637aec41df261d760117339b0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0298a60130d7305375728f0b03834c

    SHA1

    86278f07a76a8a624c2bde4a3653ab01b291bc71

    SHA256

    ae8f0893d5cac43a2bf99cf075d9327f063f5b2f5f4e5cfb3c6718ff8ea77aa1

    SHA512

    5a5b0d57ecdfb12bcf5f3490248d82d23a27a7a9a5fc072a31683e2eb49149091d7d51925831cb744e316e32e93d6443dbd815dca4f01e0911065c6a2ecfbde5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3735b6f06e5c488766cd6e978c16e1e

    SHA1

    aee0ee0d264e74c6ab0d8b3ada228543b4035b9e

    SHA256

    e66947f6e1c4576650398aaf74c43ed5c24a138acc5c6895b3da17f0f0f7c508

    SHA512

    f4949361db92cad1bdfeacdc977aa9cb72a5a5cc5808d72e65a9fa284e677812fe0caccaf46ede518b322eaf5f5135a51f2f2ef4a6028d00a6158b9c993eb868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e97693ffa509c139814a630bafa02ac

    SHA1

    76b5893c0c487abbeafd16533f7b277c3ddad23e

    SHA256

    2d24123c6b36e1bdd8d5d94e52b837fdff4632bc684b70883952fedbda48e748

    SHA512

    664d3d575d956ba07a967ce9d82a58ee5d373b9851c50e6a8682a09376661f469e5451ba969540d206982a21622718772bd4d7b4726b6c4dbbd48b82d1143e03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af816a2035dd58b3dfd58a61ad11f848

    SHA1

    16778bbdc91147918901ada035a016864573c32b

    SHA256

    ed212ae1d7a86e448a44a91bd50ccc30668696e4c8aead95bfb4e2073d40c1fc

    SHA512

    522c3b609ccdb68844f8773048f3572c984f3acf0d02b0020ff50cb0a3a713c2cd5e4d0c333d10e6d0ebf6a8bb6cf3383a53cf606b00610b0d0edee968b85575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b7bca79dba74f99eb057429540b4e2b

    SHA1

    404121b1f141dca71a758aa5593539e2a3c4b10d

    SHA256

    4ad76a23cdc319c22a4efa8ef40306d812747a80c53cf8ee43e63423c9a67a89

    SHA512

    e86545fb7ea83be06d807f36e32856cbc24a61444ee4e7f6194b7432c1c031bc80af84cc37d2296020b591487e58c27c81ddf5abaa183b37f38b7e9bfd39c857

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    580f13dd6885447dfe6c9ff108d98c8c

    SHA1

    7e67ef500fed6b210c355a9c863e0512eefca6c1

    SHA256

    88d51f952e4cf2ba08a5c95fb338d91271e2e9b2d4f4bdeb08540c24500fc331

    SHA512

    445873461438b9d50a565ae5891ad2fe7d8b8377876aefc179a23d9ee476ffde8b0ee785d82cfbb6a13391ecb0be7ee1af06aaa5debe23610d2bca3322e86e11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1d4aa1ff84143c6d240d75b7a8cf4d1

    SHA1

    9f6ad8a0d3c97dc957fdf0e35fcafb776e72bc76

    SHA256

    4082550e23281440b08ae1ef8fa59fa4f73e182c4f8f35fe49b77be73414ff53

    SHA512

    ad043f81420a38603ad25524f19310e34e20897c43e8e590abdac2fcb739556a035b93ae2111dd2b49b6285fb77567e53fe4a7b8a2d4b71a31ef5898ab673eb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1400278a4ca62b67a08790650b0e5320

    SHA1

    4c733df927a4136733f606fc11008a147723309e

    SHA256

    4bb28802adef28c9b4ce978794629c67937a6b839598439053bb5a38e4804100

    SHA512

    7b91a6d71483af515d70c0a3e3aefd21107abbcc2e3b4f91dd9e56fd3b475c853fc12a0c1a71b1e4cac0ecf276a330c10941588a5b67c155c30302895d6400ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    928348a6e330cfe75c0660bc8e43463f

    SHA1

    15687d0bb11357b27fc68636b368b3c4f8a773fb

    SHA256

    a078a1dc612b51e25474aef6fa70694c251932c43669da03fb3ee413b2a96c44

    SHA512

    f2dd8e972af8587940a6c8f034c80f7c3174b8ec788b7aa32b628da90b3dd84bb588fd147c2dee2241876e1fa74922dd32a2a8c77f6fd1915499345cb2fc43d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92d26b5b904e4e3d439afaf292a5128b

    SHA1

    beee4fc832c6e30a2a91a68fefdce00c485b4513

    SHA256

    70260dc4bbd4ee564bb92a5e4a3336a9c843da6fe15e42f0e37e6155aad64390

    SHA512

    c7537fb65e5cd67e23722cfe17dc876039279348732856054f793ec080212ec2537ab6c96f3be656cd7d94c5acf0e622dcc4cf4004d559b4d39831a096916e07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2420fb77671e6d1006bdb21bd589d112

    SHA1

    2ed0d17ebc154a78879797d6a5bb185ead5e7727

    SHA256

    7d4872af503e0bd8cca36c5795990bdd52efac790c96e45f571e1dfa0c7fd1e2

    SHA512

    ce5ee1bab9bcbe78131650c41a3512d5d7427bb390d40b14ec5e9e8c0f1aabd13b4b60a382d17c064fd03b75b7edafbb52c43729335fd738f2e8ff9bd75bcc54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93229dd0dfee54761e6f6e5be6834870

    SHA1

    680be5d39598db51d453d090198d664880bf3438

    SHA256

    19391e009ccaa8285a9c4e5b054369dad0315f3dba073f583401cf55b3108527

    SHA512

    0405215b735b7c11f0569b060b1924faa1e1e7dd3f1f960dae800f6a0fdae8eb0de4baadf5ccd69d4eee12d1f86b975529fdc8db8b74344e2c9311607a9f4996

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14548d3cd32ff34d74960bca769efa21

    SHA1

    af8411c36323e14ee694c35b63a19be0fa529904

    SHA256

    8a2fa6bc4497459d04c1296b8df17cc45dc1d8356573b7f676bd9fda0e615b91

    SHA512

    f734c54b703f65210c6a8be6dad84ea732196c345479c135f10b761fa0ac35d025770451097876e52a848176bb88452a8f5ab76b0364a621fa308b234160a894

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83d49cfb0f828e5f5d153655f788559c

    SHA1

    d85903642978734297363a9d324fc6963cc40e49

    SHA256

    f0aba8dd6cd782dbbc8962f4af2d021185f92d18206cc07acedd9e29db51bfa6

    SHA512

    a1945a44e673b173a9af5123931c69710bd1a4d4f1153b66bdc94dbbaffb5a5df42281720fcc37b49458ccfe92061714ca797fdbdf09cddd42fdf2bb50fdc914

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cdd2699f90594a56b14801d4abd0f57

    SHA1

    82e1c796735dec76e08c241b272e0baa2136fb06

    SHA256

    35364c65b9c7b225778d60704e1cca00440fe205e9676a512063029a6050b80e

    SHA512

    e432a5623fe7b75cc9509e0e10e36cb5b5b09f87aef38a690186a094ec6416f8beca92a03b4bc7fb5eae75837d46cedf779704fe22fe430130472d953c23a77a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    165c514a0bb491e716f50c94a4086909

    SHA1

    c67214709af8b02d5c9efd865e86c014531fe3e6

    SHA256

    832fc11146bbab38b076ed2beb2d940529a23f62ac94d631296910f07c130787

    SHA512

    c2e45d398f0985c7975bbd522afde30e81bad31b717b6189109190c8f1c8ee52d51907e1ba9ae269e00d2ebeaf2e79a753a69ffc7fa1a0314c453fa4e77de2ab

  • C:\Users\Admin\AppData\Local\Temp\CabE62D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE6EC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b