Resubmissions

04-12-2024 20:49

241204-zl8dwszrc1 3

04-12-2024 20:47

241204-zk7qzazqh1 3

04-12-2024 20:47

241204-zkt5wawmhk 5

04-12-2024 20:45

241204-zj17sswmdm 5

04-12-2024 20:44

241204-zjk6kszqbt 3

04-12-2024 20:42

241204-zhdecazpfs 3

04-12-2024 20:42

241204-zg22bazpet 7

04-12-2024 20:41

241204-zgm76azpds 3

04-12-2024 20:35

241204-zc576swjgk 7

04-12-2024 20:32

241204-zbbl6szlgv 3

Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 20:47

General

  • Target

    Payslip_Amendment12009.htm

  • Size

    5KB

  • MD5

    931df36f406e0f5495c5d77fa91bf035

  • SHA1

    01bbb0abb4f14451a48800e47d203732bc139920

  • SHA256

    09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5

  • SHA512

    df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351

  • SSDEEP

    96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d77ac354503ca2ace9d9cd44af97c1cc

    SHA1

    42522db036ae9e2c9de0e15abddbde47c9315fac

    SHA256

    c4a2eef2768cc32692d2706aa2330304c4d803fdc221ddfbcd671143fb5432d9

    SHA512

    3842371d0a3a1486554f303cde70eacc0726387b23b86253a4448ff9eb692500ec97d9717176e1cb7293ba2e98ed01b009df0f5c99fee5020b1aaf22c82aeb25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d7b5647af016ff2abb415678f1c67c9

    SHA1

    b8bb4af808f182ee14997d8ca9c31b056da8ea10

    SHA256

    225081a482cec9b5d7047826004cc4014003512972c46fc7397149166e9bc0b6

    SHA512

    769c1b2082c25744a06932e67792a5c3b6151031042b52f000c15af163f5576013bf4d0cdffda2b0ffb5bcc5f76c14b6dca6b681b1ae27e42537466b1abf9d2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddffe2c5f020bf87ebd280e2604e7fe8

    SHA1

    ee47a6b5ec85fc017566da0461d56699edded325

    SHA256

    af65e28e85f2c95954a280066199fd5e79c8be9427b32361e56922a4a637118e

    SHA512

    4719d05ac8b78c6501731219babb8a91aa08d07c7462aee158a680d47e2150708ad86eff3b1ca24d5c7085d5e1a2cf6c24e53540aa60ec46d8c09807072c4719

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b812467ced9dd563b87f162ed7524682

    SHA1

    566cade436f0cbd0d859cc9c95d6c17c40b21d95

    SHA256

    a28adf31e5bd02ba65ab9620a3002ab55d70c5fad7f67cb76cc1e11cd5e4b059

    SHA512

    861cda0d209c60e7439e5ceee97f8acc1c67944aa8f92a3bcf7f52c0b6e23f3afae7456ff025905a0f0bfce4caf9129f86f8bf710d7413c14a65053a3ad6f18f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eae7129a532e711d150371ed235c729

    SHA1

    9063a7025219629f8271930105f40b0fb75da9ec

    SHA256

    6c995c7594cd4dc230b430a5240077c520e00f99ceb8e704a3a33ab263ba2b1d

    SHA512

    f551c60d3622f286ef5f9cf656f0e3d218dc6691b5edc43a93d4f554f4fe908990ed075b2f2864424919b5860083e28d4d90efaf287187e017cb4ba06239010a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05bd87c715ca1a9831e3f19ce33644eb

    SHA1

    c16d9d8e007a063e70122ed2121ffa204e6da5a5

    SHA256

    8b4e2c9549dd795d31f57b12b3b07e294f5a4109658488f16e37b07f1bf9f8dd

    SHA512

    f10807f418ed134f4eb61f922699ac9c92eedfcf9167a0a9a1c421d129ba5aab83af279421e3dc812b1addd224de73c4159de7bfe174749d9b78cbd3176eb4da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4b5f203f71ebeb9a3ff7e62efeee22f

    SHA1

    be605903fe02a5fe9d4a9e5a4064d2e4ed107bd9

    SHA256

    417e151a418d9b92ff349574d61d75e66b91468b016884020ffa34785470c8d8

    SHA512

    c82085d042874fab259a6d2beae6cd23096e20ab20af98fc6c48bd2a5cec48b20a0268f6b3704c534dc844acd14a6a0fff8d2e0380b11255c56429ee46db6a66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    848b603a603c4a6483364f45000aa41a

    SHA1

    32386df565bbc1a43d3b2d0da718c4ebf932e286

    SHA256

    89ca2afd54aea9526776c73b933f1f68cf3dffb96992a7b63c9ca64b1fe828ed

    SHA512

    69ebd8411c1347018836785c3fecfd7efea1553f4300638e2f71a10f6d23381f03df116c6b928042936dfea0cd558c89e5e17190f130c86d3183f2e5201d0114

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a42ea21d2670c4a9b9b46bc3ec6539f3

    SHA1

    af0f2910396953fc036d39cecf9810c18d7457d7

    SHA256

    c1884475a7205aa53aa88340899067a88d45b1140379c024c4cf89f0a17bcd39

    SHA512

    141fa08202c3a2843ad6f9243af68188155bb6d7bd97637933674599c8867e572d78942375c355ee9c82c2f41de199d15f9b8bbaee7d80efab3b64811d008981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e8efc40af231b6ee3a42efe1943b35d

    SHA1

    3fe2d41d7f1530860f8d5251ed783cc9d27a79af

    SHA256

    4081838bfc63f70a642ecb37598ba7707737e09d6785c9ef1e87b0bfc27f7f6d

    SHA512

    f29bd21ca5d172ad67d52ee4b3ec3e78414656de42128c2aedbc925f86880cecd00b1c2eda40205bd4efbce78e3e1f03d7993c88b7000630c1f020625a626350

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10df8c0c88aa4f518fa92c66e210aec1

    SHA1

    f8a1ac429c54002626560583403d83074d8b0f37

    SHA256

    bae4f7ec1c965670ba8ce72bc6cd6e4c7e93d2a0d579fb31b968d76368e76e42

    SHA512

    d8c428e166b9dcea5871b921f288fc8d71a2cc34698deb248294026cc3dd05d33a04b828a62993b9a5bb170f56ab276fa9db5a43c199ca66c1866241216e50ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f44ccebb51a9f83c6882583ac0687d0e

    SHA1

    a2f7ecd95d2f20cb8740d60d07752a3e7b328847

    SHA256

    a9309a4a54e5aa9fb1cfd7d8140ee94b3233df8fb8f8613488527aa060a40d12

    SHA512

    b2e5d91481fd22338cc854ae4614af264525de723f05ca5510426615216831df3c2a9e9c63e3b4d4f4d338c45c249ab7737ffcc6ca5eb89de8ad380c8c425d21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a06b5adebbc5267d5a756b9462e27acd

    SHA1

    e8e2413f131730fedce0976b0ea2721303cd783f

    SHA256

    ea16e990d48b9756c5b289a72b1b57efe62d1eed51fed0bd864766f022f670d7

    SHA512

    2f713d5511a815eddd8d6d7724ad6f3a18ab2ca596b587f9250bba5ef61644de6eea5a6b044b86905d25e7dc8b9a17af9163bc53fdd9689c059eff4557cb0b60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bd2775a900c8e5994112df57e8589b6

    SHA1

    4df344fe71522f2cb95739e843767cc90c58401c

    SHA256

    2e76a76b6cfe9357cf0f692126612ea54390da9da5fbf6788e88508b959ac8fd

    SHA512

    86a6b41f3846d48af0287fb09f800ca2b2c944a65b916ac9390e4dff5e23e547f978a294915d107a60ea96fa7df78e33c8af9a9f19a7fc26454d204664aa64b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85401bb6898634eecde2c85aad506736

    SHA1

    f2a15f58aa80c08b0c8f078ac539b446babc073a

    SHA256

    3cc30c4ba34e80f57836ddacd699428b7711799e97a2e3d5d083b865cd48d158

    SHA512

    6b05f7692fb6e8e8c1e05bbbb7ffe3a29e194130e8f2f0a23d4957d0ce96d620b6cd0cdd3bfe49464ada1fd6adeeda2910fefe6d2e6c98e4b13146f302ac1f6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    726163969ccd45a2abbd0cd11e22175e

    SHA1

    195329d8073b1590f93c791de00c2f76879ee254

    SHA256

    b7943972323ba18a4f380db696cedb4734a1dba971e08b3387f83a7a134b7d8a

    SHA512

    e183489191cc2f88b86cd942c756548cbe6d0587bd6288fd0e800c411d45f749bd7d7faeadfb13548941ff4d7a555088fdd090429c277c0ff3a163a4e579b5b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    057646573e41e8bb2720f3a03239abf5

    SHA1

    94ca926c0baab226a7e03f5db4525fe409915d81

    SHA256

    e4ed72d8352be890ee72490fbfa477dfe1e35b9bafeb9b5d6bbcce7a95c92c5c

    SHA512

    87f08ab512429197d5659ab53be088bc98256ac2cd34a48f07bd15583b015faf9fab3cd0abb3e15cd794ae0aa9e5d0021956e16036cc9e51113f13f956c1e73b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7a6e05d6c50119aa4d1cf7d03ccf1e2

    SHA1

    d53017ba8035f54f349b6a25777b5481bf92abf7

    SHA256

    bd72e64ea9fb2cb5238cf46a4c08ecf7b1e2c9f2a4363938a0b0a8820a17add9

    SHA512

    acca87d951097780d8336c5a53331d66f896db6c509baa1ba54eaee893fbe3b2f40af01030b495c2d3bff4450afa81026785c3a2b430d55f106e358529f8b916

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14deb2e1a3363dbb398ca9906b9a74ce

    SHA1

    49ed36b193fe3d9553bf94078f849bf8aff6b90e

    SHA256

    9fbddcb4612bd7633c88c2356af73e50b55b713c131ff30acb52b9d952519aa6

    SHA512

    f639da3e642660f095720b47ab597a8cdceb567a8020faca3bf786be0bb5a9cb4ca0c38e5225fe675f9b749c02a3ef31e23d641c24335cfdf759b36efc2cced8

  • C:\Users\Admin\AppData\Local\Temp\CabE36F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE42E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b