Analysis

  • max time kernel
    103s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2023 22:49

General

  • Target

    publish/share/icons/Adwaita/scalable/mimetypes/inode-directory-symbolic.xml

  • Size

    3KB

  • MD5

    1a9526bce4500770dc9da3fac276de77

  • SHA1

    8e3be08d46567e15b0d7beb9c749ff361d61aedc

  • SHA256

    4698902117a08b3a216ec9187382b94d85d23ba1230497b823bc4f0398301b3d

  • SHA512

    2860804f3b03574b29679fc070f167cb7c4c5b69f7cd0352bc68f74c665e5075dcb543441bd424dac29b04205456f6d26ccab021b1bc879fd41a5819598e824d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\publish\share\icons\Adwaita\scalable\mimetypes\inode-directory-symbolic.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1396

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    ddcd3c580dfd14fe174f4fcc6a94d72a

    SHA1

    a9803a108083bd40bdfd5a2cdd07694e1ead49ec

    SHA256

    e724c6d780c2c94d3ac3d43cd536e0baf4419e3525a0adbd256739726eb68967

    SHA512

    9e029ef309293ba3f44697489c4e88c11e1b1742bda30eef6935683f18b26ca499fb449c2cc0bdc1b6148f990a623b23e41de0293d1d10b69cc3f2a43f36234a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    6362f22388bbfb79d98c86208507c2a7

    SHA1

    3f2326ae7ea4fee1dd829bf71409adb4d8a449aa

    SHA256

    edfa6339e7afe6dc8893e01a67c48693ad4a5113b7818b4ddc6b52f4ae7cd0c0

    SHA512

    0bbb94bc6d63cbec613d000a10c9243b96bed28eae60b70d657b7a27f37d04a094162eb447b4db734b2c780f65e193dbde22ddbfcab49a33b592bdc33052f57f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    6cdab2e2f479995408721d0bf5436986

    SHA1

    48ed636109acdca86242d077de999414e3fdf6a6

    SHA256

    a84aa915d6aa0c0a4084f951543b37afe9f9c6d861292b2dfba13fb424089b4a

    SHA512

    736c4825faee9b2e4ba0c90e54152748d4a044302f804226cdf1ee85a7416d3e6360f01eebb850d766fa72c59cc6b0817b66314f8aa21b430cce32c920fd1d6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    f46d60f5f7992db067136952b2b8ae38

    SHA1

    fc4051b92e814e3c6d6a5dc07a08ec80cbc8f479

    SHA256

    78504e4e610fb87c1a5756a58c2c11f248a7ad8f8775ef6de829ded3297e8fba

    SHA512

    dd6758929abf3478c1cc28f565c6d3a2174a21d1b3a61c1aa93aa651f9ffa552ec8722d533823c0a8f31ba645580f9220f3f7f4d21519575092cc1f8ac0c39d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    34f3033805c01eb5d9acca3fe529a94f

    SHA1

    ec5240e80a56b39ab4a72dda770cb044f7b6d398

    SHA256

    c82054330558f59a3725fa2b0f9b1e198dfa46551ea0dcb95619b38801f636cb

    SHA512

    93fd14021db5598af04c919fbc105b31c062d0e5f1f049329a869c836dac5ab951eff7439a817f3872a613c6c55fb0f2ed8de3820f77e794c0fd16fb6aab47b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    1a9d5faa246f03ff7e2673f2762ea459

    SHA1

    b3b9e9a46d23ab1656eac019d2c38466491a1b3c

    SHA256

    7d3835c8a3e5cc51ca679bc5b62ad1f112619c67f25ae7d4cf389b4ca80c8e86

    SHA512

    2180e53ef70668cca050908a43cbb92e65929a30321d6f8cf35c7fdb98d10a9c352c42defb891d98662b0704fecdd408f79e7600f5bc505830b6e75eb3172ebf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    25b1a6fa8c85fc6fe28a6fc2c67f6ee2

    SHA1

    bc2e512a00c262fa35dea2c8e9c02be46a20840a

    SHA256

    3d1bea0854c1470c65ba2c5136fef6a08538e89f5ebb09040e7ee6a67f16c632

    SHA512

    bb63754b1f0fe63765207c117b37a147427691f03fbed88e40200c87884992c6826c751b52c586ec64787e44bac25a9a86e3d79623aed3a7ba33a22a94b2c7d5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab13B2.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Cab1424.tmp
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Tar14F4.tmp
    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TZ7L61L5.txt
    Filesize

    608B

    MD5

    d5692ea7624dc7d8de3dfbe4d4a34ffd

    SHA1

    f0d00073da707844e835a56ce5356f2ca0d91eac

    SHA256

    79a2d6455513e502edf060089f67e9ab677d86ecf06292fd452b1e558322d63e

    SHA512

    77633782dfb30ca0ac6fdc071a48a18d70b2fec334a0af9e3fc476d44ef28bf73041747678561efa2ef862df5346d165daea6c662b30dd7170cd140a7e237a69

  • memory/1380-54-0x0000000002270000-0x0000000002280000-memory.dmp
    Filesize

    64KB

  • memory/1396-55-0x0000000002D10000-0x0000000002D12000-memory.dmp
    Filesize

    8KB