Analysis

  • max time kernel
    118s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 16:52

General

  • Target

    11.html

  • Size

    7KB

  • MD5

    ad4a9397a513760d6b7b7c95949a0421

  • SHA1

    d6284164627c386d2a2a2577c4e94cd22ba9fcf7

  • SHA256

    31ee9a4d7bedce33c62b7bb5cca7551813ff7fd9c486293f749a58f4486f0300

  • SHA512

    d49b4ee6eee88e2d0f81ca03871cd38e482aa26dec4016359237b0a71b297721e068047abefe09f714ddb77f4b63fcca88de80cfc4f27c0d94faf26158bc2cb0

  • SSDEEP

    192:zzbRccMfnoFoj6FQjHRiO7hp/iL7z6/Jz0fuz55555555555555555555555555b:DRcNfZ/na7z6hz0fuz5555555555555V

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2155932f00ee615dbe5fa98e30f4fb4

    SHA1

    f9a8cb3d1d43c070a3e574463388037a102fbb13

    SHA256

    fd34473019e2823574e392f1e8b1c103583d9dfbe0f6ef2f51f752003d68c79d

    SHA512

    83e0428c5ea512af40c1d45489cd792fbf967c01326f8d019ac7d0dbf93354bc7996658e33ef1999d8cf32010a19e29ca65f3eb2cd0ceb21215331d49feecce9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ad9227758e92119aab9584323828cfe

    SHA1

    d0b231f3ca328fcbe9cdb86c346d64684a1ce2cc

    SHA256

    a6665b6f0ab9a2be2ddc89b81cc2cfe6c0be5678e25d8cf511310d1ebbaf4080

    SHA512

    642a7c26ce1e50aab3717187f7c67ffbe46742ba33527ee53eddac8906c40f2bbe0eda2678d787652e268f147e8ba9e747925d0393d59fa1fac5eb1d70e82379

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    175207bc1ae239e0ba12ccf6ad87ad64

    SHA1

    448ba52ebd0919948b629d05ed05ed986a97458e

    SHA256

    48a3ee4710fe7f8d7c1514b6c7eef8920a1d08cde0daf847b200d2c5bf7cfac6

    SHA512

    3ebdc11cae1bfd3fc7d1f2582707cb052949e29f049974348db9b22ec64c87637c1b1e2edf9636e16a08cc6ae76a8661e9112eb70c1d6ea53407a6a12e74689d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    009d87778abeb07115aa82c99ad112b2

    SHA1

    fde1342a057c3b79c9301be491a765fc97414392

    SHA256

    381208d063b300a3e5cdf48b5c1dac9aabd14b0e0b4c5bfa79f7f01295b66209

    SHA512

    d85bfec9cd22d1ae121d305d0d144c0105026703168a38940841802b2b3bd57c10a70c6ca2a668b459bcfb730928aa0f62e47333872ca63828483805ff11ec49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b75e178bf93e0881a6ccd5916756f52

    SHA1

    fe50cb64fbc073b950fe6cf85be01be487a784cc

    SHA256

    710c004de069e22cab1f44b81cb1aa16ccf9d4899d10ebc9f4e2b4e473054d84

    SHA512

    67855debf8da8de78b2d8ab78e478cf73961683209aa5ac78810e10a01a6b0bc08c386db713fdcf02749d916979b5f8ad08d3bbb80dd14b1db27391cdd3e45ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f205b9a66452709241e19746ba1b0d3

    SHA1

    4bdd1391478357b4dfcb7bab9f25cbeee2677106

    SHA256

    065d99225e1340d9e21d89511bcd1064b2277f9fa51a8f9fe759d9f01cb1d2f2

    SHA512

    83cefeeb58ae02aa17a932366f211b05ea912441e668ce570413ef49e55afed7231e1a2e81f40f763089ec1595324d99551960f34e5e2744818be1eb682eb62c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c9a3da60ea388978f7da728d5004ffa

    SHA1

    dcbca29d742545ec9287520b6466af7a9ecee742

    SHA256

    090bf2ecc12e4c278e7f554525d70c69b5be539b227be179ebf2f24bc70f9ce6

    SHA512

    8af27ed5a9832544cb1fdac17a837d1a1bf4c28d664efeb04974de78a2420a151250a412ec4aefac8fcb90fa0472b015c08f390c98919263625321afc8a96056

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e3af5cf3ffc0f23684df076e6bf9e13

    SHA1

    6945128199f0dc916b06f3f3db88148bd7469a05

    SHA256

    bcda70c32d09ed50a621ba8434ca2a74f9b877f978bb50f7b70ffbe792e85974

    SHA512

    7974d59dad36de7c49e76a0b9b99ad734e27a6d776a9b474d485883b751c448e9c7d17e92d5e071d01339cf7b52ab7b8cb0688dd17c186d1f474cbedd6f75130

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efc73172ad5d0dd52137f9a49d45fc36

    SHA1

    f5efa27d047e069b6dae7d673d52eee3af97e25b

    SHA256

    88deae053fd05c3cf8e4e91a89a19f67bd1b88ac295e98f12311b330fc340588

    SHA512

    7d338e16a86c4a695524ccf1c3e6eb090ea0a3affc9d9c8828663854ef92d7ac9bfe1a7659ed4ebcb7da329360b5c0b23a76054574bb19ec55cacc479664ebb4

  • C:\Users\Admin\AppData\Local\Temp\Cab11C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar17C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b