Resubmissions

04-12-2024 20:49

241204-zl8dwszrc1 3

04-12-2024 20:47

241204-zk7qzazqh1 3

04-12-2024 20:47

241204-zkt5wawmhk 5

04-12-2024 20:45

241204-zj17sswmdm 5

04-12-2024 20:44

241204-zjk6kszqbt 3

04-12-2024 20:42

241204-zhdecazpfs 3

04-12-2024 20:42

241204-zg22bazpet 7

04-12-2024 20:41

241204-zgm76azpds 3

04-12-2024 20:35

241204-zc576swjgk 7

04-12-2024 20:32

241204-zbbl6szlgv 3

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 20:49

General

  • Target

    Payslip_Amendment12009.htm

  • Size

    5KB

  • MD5

    931df36f406e0f5495c5d77fa91bf035

  • SHA1

    01bbb0abb4f14451a48800e47d203732bc139920

  • SHA256

    09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5

  • SHA512

    df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351

  • SSDEEP

    96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc7179e836f6d94a7c767619cf8b0f9a

    SHA1

    02be03d1f4627d4e80178bc963f6b018f961987f

    SHA256

    f74c9274cf738f40d17df0efd3eb15230fc882e7f1aaf9dd91e731a63a57be9f

    SHA512

    1fdb178d97da77e880c2c67f7ca7da9d37c7e55f891fcd30b1c91d16ad03dc86b885129de994a9e00469c8ffca793fab9a4ad3e7b4c6cf7aed5b7bb17c671bf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b69edd2c378cd8fe96efbe4e04ad68b

    SHA1

    cfa843e57729d3c8351fc931c841feb9d25f3512

    SHA256

    f3862d578d674ec9e23453edccf3781d145fa886932826c1198d3e2751e09890

    SHA512

    a0f48226dcb18b7c3544da5d68b05e2def3980f9a44d12045a9842f08a47d368b9221493c8c5c41f202097ebf333e42534f4d7915d3ecc9ea3cd2b499ca09173

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58f719ab7ba31e89449d346066241da7

    SHA1

    f077f5b1aebf5eb31c487dbc45960899455a8ca9

    SHA256

    fe4445d185dc8eed45ed9a7e6eb8d9d3dd752995df02c83927f6bd6da3e81f35

    SHA512

    4ad08eca235f619d17b55948f01ee363f0f2f907e2342075c551f15a09fa9d8ca049fbaf81e9fb30a84c933364479920da3e61454fd46a9c5e73215bf032a02c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    054f4f348bde4b5bed6f2d62811ca9f8

    SHA1

    9e0933c26ca4fd0f3f23ddac3101d73dc25f73c9

    SHA256

    d169fbb6c0e7425805567587c4354c4f4c460a2a1df10ec862fa7d8e024dcb92

    SHA512

    df0c0763f359b4399ec92b1adf09e8d753abc647adb961a36ba8c39b97a77660db110380f6c4f81434304df06bd91f1f4077088363525b7de0b8649e6a48fead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    539e3aee1c7f774e5c03fb9d2c0095a5

    SHA1

    cd53f7d04933add6acb3b1df46e62efa9fda9a7e

    SHA256

    1beffb431a7ebad909bd5a5873972131990b241a73d6678feca574e160feff84

    SHA512

    9086e9b274d706d5b2b634eea625073983e3567dbe43d8e6adc8d1db6519b00f8e609595f121c18b67fb305564c025456e21507d6e4cd6380964a90bf0bab2d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59d9a513b0cb9e8563d642e0ca8c99dc

    SHA1

    168389925f473e0e9f4c17baa8e6207454e67425

    SHA256

    6d05aeb19483dceefbca28dceddb066dfbf30c51d6afef27596c4ad8b8e13af0

    SHA512

    b13594afb21fa70fbc137ee24c813e131f2c47493359129b57ae280bb9176ecd84aa3837c7560a457d979407daafcdeab26808d2a6ef20b858eca5475582f10d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f31c881d1bcad220c89b87ab69facb1a

    SHA1

    f314a78c009f9fffac5fe5d374a1309e830d949e

    SHA256

    c39574c906fce08f031195908d77f3dfcc02d2ae02f01738147ce3c0e43d2565

    SHA512

    5190a8e20158e3fe3fd454aa4306a0ee11587675988a85e9faf022a6c0d138b8bd2e25aa9f32ea8d345663668e791a30a5d560ce0dc568986fc4cccad30d9844

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a118235ea9180f412310a8cd94206e3

    SHA1

    4363a81b90f79a118512e400bc259aad36a4ef53

    SHA256

    f403d9fccf6d47454135f4b91c87bee132574bf4c0826405287cd758f58c41e1

    SHA512

    4b4bef19f582d9d1ef5f4e51df0580679eb5db10a1a70dedfe916defe8d27a4cdd2b46f2704463276eb2f4ea0b76da51ea95f0bbe30b08090f0cc6e7a124aea5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bffd63fb625555e228b8d321bc4220d

    SHA1

    62966678ce82b0e0bb5cf0033f066e75910ab831

    SHA256

    82f97461a7daedd84f7adb882bade737b3d28ca4f0efa5063a3bf4fb29ec9730

    SHA512

    85c1a3ad01745988200d87ef28ed1a5fc9622afe2938ada29cd1975a7aa8cd1377c018d53cbf914bf35d2dbd27abede22a9d17480f4b6735f8a158e2455508d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d65f7b4290d775474f2ff379b111cc00

    SHA1

    c7918c02142fb545573431e79235fdb0206a7f5c

    SHA256

    c39b9ab7ff4b19cb045d0cd2707b9b610d3f7a1b0cacd184706619170df3020c

    SHA512

    6508e1f6cc243839ab6caf057eae12faa2374f5735a83a6a16be11522f6c9a30356513f5ddc8f0c33161f4dec6ff2d761264aa97d6b141f4037a79aa83b514de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80556a690ca23448258a10ed3d7bb938

    SHA1

    d48d9d6354318eb52d41030c6bc7c78db8bf915b

    SHA256

    dce21c1283e77cce4fa2e81e8b6649b317faa158fb7389b19b4e28434bb948f6

    SHA512

    6778e78c1d0d02dc6f1b1acb4e08dfde92c4a26f47699c8f10aae738539b2482c9a0c783fd54251d2f2b3fe7512dc3ab97bc25fc2cda9b6c9529b1f4f8dca7bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cca3d67f3a4db4a0d98722f2c02b23cc

    SHA1

    8834f837cf5a880e2da47e7b2adefe2edfe9f12d

    SHA256

    23229d10633c285c6fa7f69f7ccdfbaed07fc4a6ecbd1794c3bf80f18d5771c7

    SHA512

    ff12f3aa6bcdf69d6c99b020d8c54707273c2ba0d0cc8572b1774b0e05070264725c903d99c8b2c9fc03ed190afd839e5947bfcfb271005bc9ad536553ae2263

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a44d0292f0ba631582f941305749d31d

    SHA1

    0a24a81b6ca23d2fd6005f05f58d1c1856953f92

    SHA256

    5899d38327f5334e17f538ab573b405650353049817a25ef281c887e38d0be5e

    SHA512

    5b3fce162b5133d78e32fd57fa183fe92b8ddeef5e89e6725ea6be1c4f425c4737e766fdff8a5eb44b788c37fec7cfb073fa45213cbd6af88ea44c2cb3bc1729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7beb84846af4f4fb521ee1a5cdf1621a

    SHA1

    18999131d9a9ee49c92ced1d5ec448969d13c147

    SHA256

    e82e5bd4adc9708f1f3aa6abb5f6d55655b0af14887e7c68a836774fad970052

    SHA512

    6f72bf66575a154fc163019e0d91a92f00b59bb50c61cc8a6c573cd2934fcd4517f6cac664752658a4e3abc760056008a0d7bcf64c28c5e44ae54859174d09c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3503de8deba8c4aac97231169c9c7a78

    SHA1

    cbb053ca3945091c4eeaaa8cbacdc7db37e429ed

    SHA256

    e01ef5fa0ed8b9b7177b9f4ea7f48bdf4469337d423ee01ee986e8f34e7e85d2

    SHA512

    26153acbb91999140d0c2d19be04691f9de81674dcc1992f43415f75d7ced84bccb2b05a7f8860c0c454a6cbdf2e4e88a44b1a7fd0b52d035fa9680b0891c1c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae770287eec9d114efdc52dd679126b8

    SHA1

    b3bf3a01beef9ecb4d597c095b011ec1f7d45d6c

    SHA256

    aa28fcfd0a2c726b1c984b036aed0ef70128b28835c367619b471466bbcf76b0

    SHA512

    4c9403811dbdaf114ca944a8009caadab688c9e79e5e7bce91310ffa31255691a343bd9f0cfe5d79d0180ac2d16d2459d6eef86bf470a5a9b040de08b910ea32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    082a89ed06759c08e21f76e11ea2147d

    SHA1

    7d2bc37399f15d4e56399b52706c05f508471244

    SHA256

    eb3bbedd1e0907ed6bd16452e7f655a3a260fe3da0393d6fb549b09b26d8026d

    SHA512

    e9157258c6bf345a4c1eb811f6947a70360493a03543e40f367148d44329253f778a5ef193fac05b69ac12c176b2bfbfc593ca245fe4bcdb1389ed3732831dbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9d836ca9a415b7ecd917136709162c9

    SHA1

    00a4db120a77c757a289cee87171765f5c3cdea6

    SHA256

    6db691c1d1e3ed7f32ae75d4e35fd9f5b3b750f038c165be472e493a7159f62c

    SHA512

    274ee7c150155db5b4306b98e0733260e92132b05216d8d9a14fba7bb2a4f3475b96aded3f21125528833b0de9ed4c2c14af60a45de2a286182dc316ba23ec3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9c5f66ebd758125789296268773ae8d

    SHA1

    8d9fb3dcb533204469b390e6d139e2a08d6d8c80

    SHA256

    8879235692f457cb3aa9a0302ee849e420f1ae2a8ca77999db6f0fc8017e5812

    SHA512

    4ec324feca579597a3227ccefe5b7d727f13995aa22c96e26bdb6f642ec48ca33e122f12c26122c6723f7a1621c1c2da65f9a51028b4aacbfa8ba6db9e2ea834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1369ef18ee4c846a4639167f0d7b3083

    SHA1

    ca8215eb10e6e901623d637f2910a54ac11fcb5d

    SHA256

    6d51dbfef3bb067b57bb0547e0fef6877fe012811724a52748a6f136b5a4f26d

    SHA512

    a2b9b022fae8992a6849c3202aba8189610bc510d5973fa6f0a112190a1ea1ea4b998246392acaac78d6a5243e02542da305060dc50d0df4742bf1e84cb38a38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3c53cd5c1ea50d04c4e49bc71a7574f

    SHA1

    93f81b29dbd910958a7b47194a3e3b4ad0b003c9

    SHA256

    23852295c1115af4fd03501cc49ee691b3dd69f5341271010ea91202c651b97d

    SHA512

    a984c7dfeeebedbc7b89e922718f7225b4e718adf5921dba34bddaec9fab1682305527aa4f87362d068d182b683cb3d8c44fc7d9d7ad598ff651d195ccfd2bf9

  • C:\Users\Admin\AppData\Local\Temp\CabBF0D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBFCC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b