Resubmissions

01-01-2025 19:48

250101-yjllnstkdm 10

24-12-2024 16:52

241224-vdwynsskdw 10

Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 16:52

General

  • Target

    104.248.221.3/systemerror-ie-edge/indexe2c9.html

  • Size

    30KB

  • MD5

    c3d72f83e398064acdc21509226b47fa

  • SHA1

    df3afbd526151107acce3bae7d25f1cf33349b4c

  • SHA256

    e8da6f7472b2ce092fddf64bce7ea2960ed63ea92ba4dfbfa93bff5bf7913025

  • SHA512

    b77ea23c163d100fcaa4f3ef2020072793fc4605145c13c26302faad6baf4f27a3cb827340eef61b2c154b89ccabe5b8f773c1f34b9f39786fa6979271fffdcd

  • SSDEEP

    384:H+51uEhO56OIop2I8NKFWuS6F+TtObFhuw6F+TtOFE31+/VUxfh07oQNI7gW0M:e5fq+bz+oElsVUxfh07ocI7gg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\104.248.221.3\systemerror-ie-edge\indexe2c9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef5fb09fb6dfe800d4c4604933492e57

    SHA1

    ed8f55a20d607b6d4ab2b65f94cfd4cd5b13b1ca

    SHA256

    6a9ccbe1bcea5c3386dbe4bbbf21fb33ca791c1f9530335231fbfad4debb012e

    SHA512

    fabb6a9e0881bc7a940272584c0439e3fc8411d905ef6dc5892ea324b3c41abdde272cea6944dec32c5a3dfe05f8e462acff39b0c1e5edfb9a7dc0be3555d881

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11fcf273bc4564c7eaf8ed2452f86fdf

    SHA1

    5461ee58aa094d989865d1c3757e1cb3f4eeddff

    SHA256

    08013f1daf0a7b30e6d12c5296064d65f05d0a45cd039fbed2cfd21ffb248321

    SHA512

    8b3d288f076cedac98f56995caaf3af6ccc52fb1d7d4d753a8ca648e2b5bb6572b1152fb47f4a55a7890db8c9901ade17ce342decc34309eaf47b2984c102818

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdb28895225cfd4e2223bdf18cba1083

    SHA1

    b9c44f41d1ba51c4809b751b83a52a83b0e38ffb

    SHA256

    84a520de8cfdb14e9d3e4239b2b27c2efdff112917f4caed2f76f18c91c3457b

    SHA512

    a840d216c427f0cf5183b3a5ac74c5a52a4dc9d80bf9276be30125069acc581a65e1460e44ebf91e6c01152890e3ff8096891b8b9dff4b1837af2570e51bdee6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    798dbfd47cd7c7765d3617697397809e

    SHA1

    784fdc965844464076d75caa4d8aa163340eb0e1

    SHA256

    e8769b118f9e5b2c9206b0289596a9347849f581da7ebdee610ff9f4a3eb4aae

    SHA512

    669c750ee68f728d78ff9c8ce15b991e45f2621de478ebe446ff602bd8917750048ca13679ebef05b96f18769b767356d15b09fea5bcd3e66dbb46416a64cba7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da174b8e72d183b037a0883c830bfc2b

    SHA1

    a9d73d38b81a06c110565fcab4f41a8ec2c1a180

    SHA256

    d416a5f17d01a9f3e3b73d1f74896fbb8582374597e4aa3b14b34692318d440a

    SHA512

    0a17f9886bc837a7b2f1e1ac45a59e0c6b165b8abd0a8395b0a7b3241634b00087e0d063b3fd2041ee6be025297e908356e084170df31245b58c8478d519a76d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a9a38fc607e98953097cf5f5e8cf05d

    SHA1

    aa7997c2eef6857b4168fac7924813074e47bcb8

    SHA256

    5b5995afe75c04ea268961d84fc18d08bbb234063a6a485878ca165fffd82242

    SHA512

    386d5e6425c507a9f35b0bdbba44995c1869a925caccc16da5c09d1cb609550cec6b9e350920ac1f7413b42f910f5b00e30672f8ae389d32d13114790a21215a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a7aa59edc8f0ed4fd3a3a4d486cddd2

    SHA1

    21eb3d262e8f5688ba4ce5e4a6a4b269ed5ba7e7

    SHA256

    0f8a30b05a9c9683df6f59054e8980f02f160be0d8307b7ad2f9f0775424747e

    SHA512

    d5d1b259d18b40e5659866408345ba067a07c86d06f0e5da9a2249aa7131e1923bf41371756a1b8a3832673fede61dc734b784dc9677c3925420e53cf3ab275b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fef44708f3b3c841a0e00b9dd94290eb

    SHA1

    818aa695eddb309712d97b7e7b84f0bb0fbe06ea

    SHA256

    9b063e6187603ac80c0aa7f99b504d81f799a713d8cb0092bb09ab9c5f6e5050

    SHA512

    1861fd943c1e65fabc60bbd0bcfe1037c72786de94050f49576c6164ed8b92160712c02a40f8f9df16130e6f5a59fabe876ed74cb4bebc5841c4a30b06f6921f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0ee42cad863c8fe7618a49e8f2373da

    SHA1

    efd2c4363ff1503847f6c0bec61c5349814e2bd1

    SHA256

    7a45616d4992a5c6e356a3f93b06fac8fd2517a5cf6df030d71abd065df08b6c

    SHA512

    c00ea227324b38e2be1216fe63151ebff9f7f67bdec7c3ce0a5412754ef3fa155555bceaabcfca40c84359679d10dd1dd8fa3cb548443ad93520d8f9e0df90cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb2ca8a8b690a5940ec1dc08093fbb5b

    SHA1

    d7103b05b9242c11379fa736fb0baced9d376ca0

    SHA256

    d661d154e440911a651df4fbf797b9716a4f6f7a669b2d6768751940ed6a201e

    SHA512

    ca50cc9affabbe9213f23d30b06c0a3401ddb37f610124d496e3e6e9332390745f3c385f3f8658b916e9229ddac4c294bc426a6c06739e55f5f4dffb05deb9bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9266f32ef53c5cdb3d541240c9bf487f

    SHA1

    22819e4536f42004423bb4274e4049295d1a202f

    SHA256

    a74a857cd2da286a70c95922c825ccfccd55b69e7812becf93fac5f004e74735

    SHA512

    7188bd152b01f9dc932b0828df81fc8a742debaa9ab5204a3d81f41675389e8239d629e2da8c174b614db7a4bb444b33135831ec1e8b6054938414ceba927935

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6484fe2f5d223873d1513b00d66db4ca

    SHA1

    8495eaa2307e79c5ce7ed0a410a988e03b695915

    SHA256

    3277a328ace568cd2bb662c38e80273be68f6fcdbdbb2aaa9b90f9cff040056b

    SHA512

    e671ef106f82343f494aec4d6ea4897aea0af68086e9fa4a1055695671b13fb6ed19c93aa0dec2141f8664670beed9c869df03026974dbbda750ad82956d1299

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    742975a73c69220827c2d4cdce17edb5

    SHA1

    8250418a1aa1d433d4b4af0bf70dcf8e4041232e

    SHA256

    bdd8ae7267b0e73fcfd33979b9bbaa8d9a82b243cfbdd2f263323f17ae380863

    SHA512

    554d00a1830c3614eba22bd187d463c8958e010d97f80c364eb0332867bc1d735cb1460b610020eb695ad1686bc827f5eb091b3d8ea920cf08eb89a393252975

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76f96b49b5211bec8b5f361bba8408c4

    SHA1

    3424c4bcbd7615a7bdeaacfde359940e884690fe

    SHA256

    9693cc6697bd89fe8a6352a64fa78038c8f45fe2cbfd9dad44abd1cbaf4646f2

    SHA512

    a783a153a303fadfbcf4caa253ec1f88ca2bd0a0ec71c3c133168cb06cf5db91bd572bf4ec8953d383232a28ce38c2bc6284922483b138531b8fb548bec09fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c519c7a5c8f1dc3070c4bf3c34ffdef

    SHA1

    dcf451241651ed9e9fe6db7793d874b3bb8274b9

    SHA256

    19dee2bf0cf0abd5482ad5fc1a53b4c4dfc9ba21db53391cb15582206d0a6709

    SHA512

    b640b360f6d188d46af57717285faceadbf6d968d49a539e87e056751f7ea7a6b5daf96094261dbcfa1d71da240c32297bba4109819aa55726f9e5271973cbad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc8bd23d871bc4662f95fea3f2b4691a

    SHA1

    b77f25ca90097c479fc71b6dc0872b2dc54952f0

    SHA256

    2dcb320d087485b2de2041bf8f97b6f45ed51e53dc4eb3dbd9e0862a372ff5ca

    SHA512

    b254e1fb9455fe5e052cc29610911f364506296ed15398ea78bc79e88f58aed143d2a9fd5655a6e8b9ae80fa8656568b7c051bf540d2cb076d463e4185e4c711

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f757962fe24b3aba5366c7e9df84089

    SHA1

    eb153cf93310b6be666a3e9fd7f9b59e5126cb38

    SHA256

    fec7921b026fb91cb700f73aa966661ea4d11d79d3d6487ead037f411cbf8826

    SHA512

    2613e845e63fc539621289460ea6263f02328d395253bfb0980c5c16cb11b6ad16b96b40127d40b8443e9bf4bea16801650fa086158ae1de25441525e3c6e43e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9d7b0442f1662773618ca13ede938a2

    SHA1

    64711c208fd52020d5ec71b5215cf62c287eb4cd

    SHA256

    41229272653aa7b019486b1f6155a9d96ffbf1cedf7e00c161e63fce7691170f

    SHA512

    f0b33244bf18b7e980b2fa862f193df22acde5e5ab418dbc64a2a49e72c1d30bf1a69f7e91540757c0b92c5bfd5d48c34a8eab0688ed53a30922e813b3d459d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0e61f3f6b283ba39b895c22b481732b

    SHA1

    eaa02bdfabef4513ef22ba44d167e3c7a780e0d7

    SHA256

    7f2544645d03a4474d4f443720717c3bfb1ad7b4d34765e1cc811ebca876e1fb

    SHA512

    fbb1ce7c453b6fe7f83ef2fc36cc44a585f57403d0190b396165e6aa6ed8c427327fe799ff6534b3a9dffe364504866d9cfd596ba4c21e24d18f83ff174346c7

  • C:\Users\Admin\AppData\Local\Temp\CabFF18.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFFD8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b