Analysis

  • max time kernel
    34s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2025, 20:09

General

  • Target

    void/7dec88c2ec34b8483abc44e98ec843877cc5ae88e094c90d46bbabfafdf3749a.html

  • Size

    10KB

  • MD5

    ff5e80953341f1cb01a5d31fffcad2c3

  • SHA1

    cf2b440681ce3c658ff734517a16cc13afa7ede5

  • SHA256

    7dec88c2ec34b8483abc44e98ec843877cc5ae88e094c90d46bbabfafdf3749a

  • SHA512

    bfe9629f07e9755b2df63d632f7eca214c29fc3d701c77ccf4b1eaa7f9ec518af01d141065af38bd242223344c518b57dbf8c9c43d669a191bfdeb22703a9509

  • SSDEEP

    192:PN2x2BvekROFASf+mhf7h6RyfVah9OLgmiMMpIFaHU2y92N:AxeJROFASthDERKgIAUn2N

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\void\7dec88c2ec34b8483abc44e98ec843877cc5ae88e094c90d46bbabfafdf3749a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    203cf63fe757a7c15d48bc8e6c5b5ffe

    SHA1

    9f9f1ec4103249e99602f78b6e4dec3fe84e5e2f

    SHA256

    0827f2bc72c479a371ce3d945a03054526cfa9b0c925ea7de0e7b7e144f80b3c

    SHA512

    dedb416f80192684da5484ae6cb916102c5c180896824c3b76b5d8d093fde5c9fe79898c3a4ba99c75fcb0384ee81ce4eb5c8b50cf324534d6f22b6d214a9270

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb2cca2964c9db843523c81cc292592c

    SHA1

    c6c8df4ab8c29d88e0d3ea6bce7194c808b91d21

    SHA256

    492083ca2b6f6d9ea659075032454dc42b0536293e88410bbfa8be1a13205fc3

    SHA512

    7ef8ec0f926cd0224fa7e3f2a0374471eab22b699e8651e610a971ac0d9fda2c09f4f12e730c396dc586236dfdc3e3d3b3ff7926b3d4648be2add26e5fd8c0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7f7e4078c71182502e3bbf2dbb6471d

    SHA1

    8480093a69f84778ff7f8d8dac670093610e9236

    SHA256

    88ad4de4802bed052ea872ac7df5a5d59c820eaa7315569448e631f3f51e6b54

    SHA512

    2086534b23e7e01f906d4788e069f9e67c3fedce2d3f4616cad5dd5e74cc8c3153e2848c4b0f8973d6aaf18f5f49eccd8b275c1dc6e2112a948bf9411d65417a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fc78d4143e140a7e01c0f802570cfdf

    SHA1

    84d3750c77aa23bdb0b168c07fc26e9b8b72e8f1

    SHA256

    d5159c9c267d678bda96b91eb7948a2a70c1557296fe66339a03a2c639c18932

    SHA512

    b95e9d441a0f861f1b1554a8f2b595a37fc82b655aaeb299afe950fb7c75843b6773c2a68ee5d9a88af0a2833cc26dda12b180d9918377c54822aa164390b635

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18b4c06813c0cf19084bde660cc1399d

    SHA1

    7eeaff282074e373f63507a3bd07fd250d9dd899

    SHA256

    a5c158a28bacb04ce1c892968616617a36dbfb5490fb7bfdc75df03f2eb23b70

    SHA512

    00622e585a12725a8f3cde9f76c19f567abfe917ef6aa5e0556a9ab6c78ab2ebec79730649e9533a91e09603d9ed48ddd75062150e93d5a7659632482c933e3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7416bb3a9dc2afeacfcc55ce5fe11bc8

    SHA1

    7853691ce9295e0ce8f5fd62f95c625730592470

    SHA256

    1c4262087f5c6bb010b12ff2823de51f5afd0d6a7da7720c6fe1d7a8b97c5f88

    SHA512

    58b3df8d7c1b34f5f13ba9e625acafb179d215016aafc9c1744c0599d472888b78dc5b3ea929c5ebd687ffea3748d84c860d56b1494044d40585268fdbcfe505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc524f28bca1d6aa25536838f3fd14c6

    SHA1

    3714ed2f73d75043f90a3afb3da2ec6756291942

    SHA256

    98b4f330cc46c7f25af32f93c899055f43657a08a318d07c572908e503897af0

    SHA512

    324181fb13d6998879a6ac35b3be3259cbb7b2421ac7aecf95a7d8b46907072c5f98027031569692999a8a4d1a52fec41ede4ad7b52a7a212df7f14a3a97ac0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f63cba2054ee45f63fc72684af4a4b0

    SHA1

    6be93c8a1f587517e097fea0aa87c56cb3a1c8c3

    SHA256

    4ad9dbb8ed8e65c611f9f17d2bf02822eeb82757d1089ff8652209e697d72b20

    SHA512

    0fe613375ecb8177d9afd3a36e03534147f317aca6940d6388332b1cd448396d465c4cbecb48af011ea18af337e88ed2fbb13b661632f8d6b052ee7b7bd8ae07

  • C:\Users\Admin\AppData\Local\Temp\Cab652B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar669A.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc