Resubmissions

04-12-2024 20:49

241204-zl8dwszrc1 3

04-12-2024 20:47

241204-zk7qzazqh1 3

04-12-2024 20:47

241204-zkt5wawmhk 5

04-12-2024 20:45

241204-zj17sswmdm 5

04-12-2024 20:44

241204-zjk6kszqbt 3

04-12-2024 20:42

241204-zhdecazpfs 3

04-12-2024 20:42

241204-zg22bazpet 7

04-12-2024 20:41

241204-zgm76azpds 3

04-12-2024 20:35

241204-zc576swjgk 7

04-12-2024 20:32

241204-zbbl6szlgv 3

Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 20:47

General

  • Target

    Payslip_Amendment12009.htm

  • Size

    5KB

  • MD5

    931df36f406e0f5495c5d77fa91bf035

  • SHA1

    01bbb0abb4f14451a48800e47d203732bc139920

  • SHA256

    09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5

  • SHA512

    df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351

  • SSDEEP

    96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dc5a069f64ec40178c6780c0eab2a7a

    SHA1

    86b78f7e30e133bfa8a1aeda3e0ec338bf5b0adc

    SHA256

    308a99bca2d612d09a4bf371604667773e4bf72ed71dc2fd0693dfd4595c489c

    SHA512

    928caf4280d9547bd1751b9f324a7a71965762bc64ddd42896acc72c06703e9626f589401a66c01c193ced3eac69a76a3ea556614d50deeaa1568f72af6cc964

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5daff74a6761f47f1ad4d0e83c9674f1

    SHA1

    73f7ef32c251592569c2570fb993ac12b4423889

    SHA256

    012b554e4c0b495ab6758d2444b201aa1b25edc4ce3ccfb555fbe27a53f6aa78

    SHA512

    4ac6af4ab3ff1d1bdc0316f2b80d77401c6c87efacccf2c1fb83ddcf4bcbfb40043caf084cf26ce08767cf4d4bf6604615b41dfe534dff8f1dfff2f000d194f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4caaab9a6fa488ad58c4e5fde1546a57

    SHA1

    4ea97a0bd9abe7d1ce7ee0e0be0ed0f674aaa687

    SHA256

    eb505bb74cce5e0830425262e4b1af440393dc17f1b6a6f58a72ba5a0c4ef1ea

    SHA512

    5edd08d9f3e2b792c0006c5cdd01e468153695388c1bc623eac15f573bf43bc09c8e1f88e97901c0d4d78049d89f27bb9d31e2add04546d63cde4d0f763e96c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae80ef41371645598d560537ddec6d9f

    SHA1

    52f5c0e47c6e1216127592ee3c4bd5caa0acb419

    SHA256

    d1756a510c221b99d88d95d86099f3f097e2678ae4fbab2f530398b31d8eb8c9

    SHA512

    c269f23f3090e2c6dc3f3907d15e467680bd9a2c758d0ae382950d601903bdda66f76f0ef9ba373cbd584defed571e98a0aaa8ff48ca2693a09daa773a6d38ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96d58fc9cdca9e3d2d86dab06dad0af9

    SHA1

    cf080b216b1cace08301aa14220bdd92b1a9ddcf

    SHA256

    470c65149e4ca1df1c5b3fbe043d907841926a5a5fcdbe3732afe75ea65f5ab5

    SHA512

    7549fa307bc146e8d86029d1e659b210ce60716647921991e712e44c25b662406c7c92333d15a9d61c0a46d436900d275e7ac1fed33076e041e026bb2d1c0654

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16ef5bd17f476127059c325a3114042d

    SHA1

    5f94d847d9eca8b39e1b1393c71772da9782bfcb

    SHA256

    cb141c175e39d2e4de1eb8465e4f84acb68b95b0d12ee8db36df784d118e41cb

    SHA512

    a825c738ea3935f2470c93cdee4155fbf0afe0efcd429d3445e321a83c9b8b7942c6cd35a7e407e81a85b4315cf0eae32991d15ca12bbd886827be86179dffde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34208134c3bfb1c72129d3caffdc188f

    SHA1

    a68b5093f8990277ecbffeaee6a5808151b8425f

    SHA256

    f05d1d23912b52113052a001a0371f229b5be6ad7992979d7e6f489c1627451e

    SHA512

    6c0acee200056a363f92966ac8eb4a51de78687d18cb92c54b2e571ce7ab36023163a1fcf2872a1201f28eaddd5778e2fbe6ece11876ad0cea055d118f111649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0780f8f8c4a4be39f1bd7bd74bb4a55d

    SHA1

    9534a05d72ccb2fedf560a36706f8346c33e31c8

    SHA256

    383cd29a375f503ab8409b55c15051aa7820936b2fb1db341ae8f31c0df10052

    SHA512

    e68ad00af9ff3533bbb5524ef9a896caedf1e1fa0e4503d3ce18809b482900e718bc7b901c3d3150a08a9bc7494a1943e9284749dfc387e42b48f3d8b8e3dd3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9c25f60ee4a7c8e867b66274e19b348

    SHA1

    ed77e7cfcfca59709e4aa227f760759d29d14e83

    SHA256

    9555d7e9d68702ba4372bccaebeb184708e8bc16b2be5ffeb551bf2ce6e8c6cc

    SHA512

    459fa5c5b84071ed0f8c7b408f2361a6cae7a6575ffb391d744dd5e76c40c22dbb3ae69cd0650f8744bca764d3ed3ef3bbcf088bbcf6f7615a190592dcc17d69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    240ba4c4d164eda87d6e85c9b4a4423e

    SHA1

    6337270b20050329fca292a00ae322261ef9eadc

    SHA256

    43205d1f5a406270c44a845b7e3af541d3be7fe1d49232c501d286eee57ceed5

    SHA512

    eca6867517ae7861be295f77b46b49074a5e8b655b7499b5d5d9d1e388c2f00d502de97d0eb842f38d88f0e4012a06afeae2fa9aa6053017ff4dd48a11a606eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b29d850a66e8e8f5c3add47b989c3a9d

    SHA1

    c01a1920d12a6969e1a6e5da77415349bc5ccf25

    SHA256

    c59e84e96f5f5967e887d394a4b19a0ff07a57a4bb0fbcb395aaa7e8e9869950

    SHA512

    3e5c5c774efad4382cd7a3835d78674a78e728b8620e8d3f2eae6f54c023742e9a293e213de7be6405f462a227b57ff45025881c53facbfa14c82e5fd024b4c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1f4979820ea30d21b7591b16756f84d

    SHA1

    9616937681e2e5a4b487235139a2c7967a884fbd

    SHA256

    2a7677d421713f8ff19bb858779c535ab874c91f4dd86cadad3e530c9831e355

    SHA512

    52056760dec3d94fd3f7c32a79b5afb2d3e0b215bc279b746d0f4f78f3e6fc46295b2f1901c11f3e0518a1ebb95d772b36a7a3d1c003a213f7f857e9b20bf88d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    556717138378b847560e9dab125bbfe2

    SHA1

    ac0064c1dc8d9673237e5225bbb98224e909f765

    SHA256

    dfcf52c1d1fa53a3f0ea1699cddd1116443127aa7b96fe4865b6a78c71aa83cd

    SHA512

    0cf90f6705f0c523c000401b0fc086e4a4457720359a8d137862d8dbf04088ee47ec5cb7aaef34989fd2255b024f5453c2be0ca0327bd74957c0d232a5c19073

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1cf9050c3e289d0c67a7d7bafc6cf41

    SHA1

    9af4cd893f4f833c09db963afc38e317ab73ac18

    SHA256

    e89e32c49dab7ac69f024dfd08a3fb73242d908001516a3070b6c86e8194b892

    SHA512

    818e2d138bd4bd6c46fc8c9aca617371e5dd921c61a906b214b939368a9ffe839eb899a76a7eed5e80c961dd9e25f5199369695eea57807be11e1ee84db8b62d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7190362e421f90560a93bbfc86998d2f

    SHA1

    b4a706c8d68e7cba94bf91f193ec75343baf505e

    SHA256

    db2396d9838223f739fc0c667cbdc1b33e48e1f389afdf1bf49fecfe8175824a

    SHA512

    9b09faaa4ff8b2d05b2ee4b6af8b756d018c1bd33aae994471440c67926cf300c1b99495bd2638e29a2ae805d386e0942bd680e63fba5a57afa3416ecd6fbd9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62d385f4f14c7a21c08e29425e1ccb1b

    SHA1

    8f6c1d7bdd151db534255ce591fcafde6f11ee65

    SHA256

    6f901ef0e7b8652f1d0e608b9a3ee9be0232d258bfb801616154e62a8fa7c82b

    SHA512

    9cd0debebeca98a8d46986a5adc8e74df4906cd9b97c7f3525a428778586c32dff19ad0f96ec9c1a0ec197f7c2f7ee53e343cac1a989bee9c73863953be24c84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    942250d3c6cf71d3a1270492a2a300fc

    SHA1

    c20eb1cdb89ad25d0e40570251009275fed2a3c0

    SHA256

    c75bc05867a598275a103a808c2544db5d6033d2f5fc4469f761e279eefed9b9

    SHA512

    1ab897bde93d48e787cd8a2ae801284eb2d0df85f68c3811fd3378d503de7f00a72414a8f0ed21e1c964627b4af2b4cba5fb6b90004c0a7c5912f5c236a8376a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea8fc15955044a8a616e4bfb22e778c7

    SHA1

    a69960a12a74aa35bbc26936bdbe41bdff5a7f78

    SHA256

    77138e584f63b5fa7e292c115d8b1670ce6480bd47888f9b884e75dd66857d38

    SHA512

    6056af313bd6c732848469cee578692fd861872792a7cbca7736dc692f14619ae864035e00c9c922133aa44b02af4396752287c0ddccbe8e3c178dd32446cb34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    135e34a9cf5b3ff1a39bf05346ad4685

    SHA1

    4c5e4e3a486a0b504d44e0c3c852fdf530eef523

    SHA256

    8f52a308768648b4ece231a2ac17d26612b5f556f489147afe31e556fbbfd5d1

    SHA512

    421180634688c190c2cd5b592b1ca46527d2198d081d05699add11a868630957d668309e49db70f5e4ac7f3c3696ddc7136deda15db9430e41d61e3a95778023

  • C:\Users\Admin\AppData\Local\Temp\CabE67B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE73A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b