Resubmissions

01-01-2025 19:48

250101-yjllnstkdm 10

24-12-2024 16:52

241224-vdwynsskdw 10

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 19:48

General

  • Target

    104.248.221.3/systemerror-ie-edge/indexe2c9.html

  • Size

    30KB

  • MD5

    c3d72f83e398064acdc21509226b47fa

  • SHA1

    df3afbd526151107acce3bae7d25f1cf33349b4c

  • SHA256

    e8da6f7472b2ce092fddf64bce7ea2960ed63ea92ba4dfbfa93bff5bf7913025

  • SHA512

    b77ea23c163d100fcaa4f3ef2020072793fc4605145c13c26302faad6baf4f27a3cb827340eef61b2c154b89ccabe5b8f773c1f34b9f39786fa6979271fffdcd

  • SSDEEP

    384:H+51uEhO56OIop2I8NKFWuS6F+TtObFhuw6F+TtOFE31+/VUxfh07oQNI7gW0M:e5fq+bz+oElsVUxfh07ocI7gg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\104.248.221.3\systemerror-ie-edge\indexe2c9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6a46a729cd06e1cde207b62226d244f

    SHA1

    1dd72cdab53621240a7b22d6fc49a18abbb33c9c

    SHA256

    1c7f4946c5847a36ca0970b549b7a08f8754b2a1f63a7858e2ec7db723c5f4f4

    SHA512

    ad56c923d7e069dda3e4cf6d10bd14f7c85abfb69de0c30c53b77e3b514baf99d3bc83b4d522db594f91bd89959bca6a711fecfa13347e9ce31429cb199e31d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5be328dcede52c12428ddb283d0df13

    SHA1

    39453caca1f83d9046b21a5eec983f07b2837f54

    SHA256

    de5c53b47426593f1af3117bdad9c9a6d17df5197cab7e2831850fe3394d28e7

    SHA512

    ca7b91aa4ad7c4c2cf53db629cac24abce63b002f989d1244e697629d7304d0b0fac8a947a6c79c51c9c26a143db0f17db2337d0a26dc5eab5df4da357c625ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b1d3ab3c96a67d60876ba15598417af

    SHA1

    52a640514187d41218630b141629b12449333b1e

    SHA256

    bb436c7347added0db05a029fc7e5ee39f20ee7c2f0a9229c9149669599e689b

    SHA512

    41c2ce7a16dcc8b2265819fa9903234d6b9ffcb580a7a3f9048c9294b2e4f9df07a576b1e5928c73bd3903a0355e438f53eb8a44e338889c41c3629a8dd9f044

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d31789ae8810966ccff774c9fc2e91e3

    SHA1

    9e77fe87d8000fe2e8c9c96af2277fd6f63e00fa

    SHA256

    70531aa2579364bc441aa7b1250d9bef59ac3acd824a8cfc0519606d048ac97b

    SHA512

    b81a8e546a62c828b6eb32e90974893294154730fc8be98a09797901a0d6e3d651f4f99f9a89c16e1daaedaa6deb9c8ab6e35ac21b2d91de5f765b16cb8d9517

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d828a55924470aaadfc965499f1ee8d8

    SHA1

    462a80b7e088d4d4723880ccfefe28237a26dc46

    SHA256

    81b6db8a99dc64f495f3ce096abc2552c3f9a1cbf827bd6c7eab263694cd801e

    SHA512

    e3db848fd2800ee376dc38021a3ab4f624b38f5cab91cb538f40ab5d46121014f1938f479824d900a26364454fb75e4a8bc221ef87c66ea4f041f70e516fcc9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6971702ebe06914ad402de4b3096125

    SHA1

    a1a71a464b6afe85018dc356d6d4f72a450d65d0

    SHA256

    3e1edde29c041d08afcb10d1d4b772d20b9d9c75adaecd74c3fec48eca1333c6

    SHA512

    a327cd2ae0b30a5bb886cd2e72d84ae56aef723de2ea0e2a42e6cb999301b7574a30d3f0281200194fdcfb52c9f7fbeec8108958b3f4f4bcfddf94ad826a5239

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8adae5bf5c58bef456b4a1410add7051

    SHA1

    9ac45b5607fa5cd88a5b05e014c0061d26092c48

    SHA256

    d4049b599c7f5e4caba0663ca7c875600732315d4a11bcd3aec116a1ba085c3d

    SHA512

    7c355d4eeec1ae26024b6cdeece81239d8a679763a1026d2e006484479b026175cc6519012da525c11174c92e9d197822e071753e083ecb4960d51ee9177f93e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    838345a311655628d7039b9b18b5a353

    SHA1

    85659afdc43b9b52d4be4c9170a6b5d5ef6b45ea

    SHA256

    e36b1ba1eaf8730e206d2128e1eccd0b8124bb1ffdf5fb935d228c324cf77231

    SHA512

    ce3052a24fcac12592502f8cec23e16be34aa047cb11bfbacb2bf9889a6ab5bb6e52c15d1f1eaba64e2c033e8136671a1a5d3ee4357019b709aa14dc9debee30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a9f86d81c03965499e7c7f7821777ea

    SHA1

    dbdf4ed44602894ceb5e181af107bd1b85fc67c0

    SHA256

    c6c4f7f58c3242df373806eedc2b6ef6c2045b9d4139b0bdf6da35b72f57cf32

    SHA512

    f5e4b56a6e660f14471dd3e6c998a0ac0730b5471b51e2c396efcc7f2a37ec1eda4ea37d6e807f6ada2ce75ace2afb152b480c5473e68610b8d6dd58bfab2e58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a56164e3e85b8fbfb4d1050405c8934d

    SHA1

    e9e33b4450a4169a74db2e660325994a04731bfb

    SHA256

    6120e1267ddee270c200fd882b62c0094fb88b47c1ddaa4409ea79de919ede7b

    SHA512

    958470f3c4a3b8a0185671877233adddbfb2dfdff7b4102100c779d7f3adc84a72098cfe683129d9a3c54f3470918f4dd6e4b3c91f24370d91406b7fc8fdbf42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3dd02961f4660db6065d98ee99d4ce2

    SHA1

    2a070b3d385efce18f1dfbdbc759f268b4103913

    SHA256

    7dc22bc7bdaa596bafcc17f183ce3dc6a71a129d87eb5025cc333e60b63a51c8

    SHA512

    c65415ce62c8865941b4acd746bc731d748abcc3b60300fec7d2447d8d57630d8dbf75b69c0137106aa2c023a40b06a86a2592f5ecf48bc1b5d85f49d7c22299

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bfcf6ac2f463cd6f5f2376efdedac78

    SHA1

    87d214bc516538c6b6dc2fb3b97bcdd77461cbf6

    SHA256

    87fdbc824e1f1eacc077fc0f0ea193bb015277bf98d6118bc54f056f681d90b6

    SHA512

    7d97e805911990b6609b42f7c57b7354c937fbc03da00151a382e66029f5b243f915d6baa9a6ccede339b2dfdf48048c24a43bf16cddbcb12d2a472ab3c8daa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    593979a81a86f18c21e1f80b1bda9979

    SHA1

    7995872885a2a763ba094edcac789182e174c66c

    SHA256

    e0345874052a779fc5a1d202077ab09c506e1e00b18e40bd68271a97648f41b4

    SHA512

    13ee9c20f8d9bd802e1a5ebf3414b20a28292970676c37aed21dbadc311b6b1eac360eec2abc1778157ae801cfc48c82bc147ffc6c3e987eb9ff6b6768df800c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b45b80be179a65d9ff99f75357bbe88

    SHA1

    0763e4a99c1afcd54b0e9923b59e627473d8afc9

    SHA256

    8daf882252742f9c900f58f98f85b57a45f9dc9283feca4a3259768613a6433b

    SHA512

    d8b8b2be63622f9f53607103e6135435a50b9cf2c0aac5b14e845d9088ca77fc3f96ae3098ec3813e6db54e9d048268c54711b0f90e5f21e82c68458291b6232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2355e93698cd930dab064ae3c064edf6

    SHA1

    8e4b7f0cac3a9e7554408645b4eacf9ea01d0af8

    SHA256

    b83a86efb151734520e98a0e5aef079bfd4b36771e79621ab0c62f93e71b6ba7

    SHA512

    2bacecc8c26d4b58306049713e060ff19c1cd321c15c908c543e8ebdee4433307a158c5211409a8f38672fcd2e87b3e853591a28a99ea8508922ea3a02632292

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cdcd767a1777a27d4a333a9267b52b0

    SHA1

    41555ef0c0a048c557e3b192f6c35b64f33b603c

    SHA256

    defe53e378fee393e29ba7d0ac5df932b8ae8728c1ec24b0740bd81ee592d826

    SHA512

    f818037d666dd90e330ae616cb94da2612607ee50c5c878f61d14c67dcb65641d9401cb44c1733b33088184d63972423690d062892274094d81f8ca8bbc5d078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19b96a22a2a3734807b5d33d3dd10b89

    SHA1

    c5e70d728e20553b758c1b2c2a290ac8c85dd34b

    SHA256

    76608bac0d57c180feaf56552306f95dabfea03a63f23c900374733c43bc878d

    SHA512

    eec395117fb35a5ad8c115b7cd2c03ecca29021405ba8677887910609ae3593a8e43933a29f3fbae68b5a12d057a0f2bedbce6d881b44234c139599dbf8d2fa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b5f75f0ea532072f5dfba292d9e8d94

    SHA1

    3b316ecc8fa6f5f2eefe29a1b8f3cf99bf925a63

    SHA256

    d3e42c2740547a27a8665f9366d2bc39045cb004ec7b11f95dcf0d2e9456b7ad

    SHA512

    396a882255ecee8d61a26b5fc0b23056f8cd2ddb9c606af79823694169a87aee9489237e9879ed977b325127fa91afc877e5df0463404b4b80abacb6f9e64f58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b11bf21716d9815b192e165abdcaced

    SHA1

    c78acaa9cbbdce5ebfc747bd22be25e3de1e04c6

    SHA256

    3e61f69e8e513e2a7f793e0d9f999efd44e43c2ee0bc6eaddbf5100c7c6580d2

    SHA512

    dd07a601426c72edeead56a950bfc8bda1d1b12a5f8ce1073ecca765db51eea804cca0a2df2c68973d5564aee3b261674e7d5000f381b24ebfc9248974eec56c

  • C:\Users\Admin\AppData\Local\Temp\CabDF49.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE018.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b