Analysis

  • max time kernel
    153s
  • max time network
    222s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31/03/2023, 14:14

General

  • Target

    Setup.xml

  • Size

    298B

  • MD5

    3861a3795095fe81fcb8382d2b9066bd

  • SHA1

    2cef2af9a35d636c3af48902c20891ec49a8e791

  • SHA256

    b19463cb9b847bdfc7dbf8133d9702d0a0ecc4175335c4a75db211e0196f84b3

  • SHA512

    8e881d7f7a8236d36aef500473a3dbc5a98d46c1596d33ab76e4669f858d86c6b4881c0882c37d2d32b888fcaf6280385932ca5ffc6a5143d625c71b8fc8b294

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Setup.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1844
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1936
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1848
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x570
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1380

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            e71c8443ae0bc2e282c73faead0a6dd3

            SHA1

            0c110c1b01e68edfacaeae64781a37b1995fa94b

            SHA256

            95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

            SHA512

            b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            e88687559b67801676ad1e58f8fe56de

            SHA1

            e88affd5246db96b133d7d0a9f6d9fa50bc3542a

            SHA256

            515270d71ff056718edb56ced88723e2a1bf65e0a28b59e4b8cf1b4c572ed074

            SHA512

            1afb768f0745dc9066c5d0578fb7efe98e25d44ecab7caeccc9ecaeddaf3f90e5fa1434f5fe4df9ab2cede0cb5fd963b25649b2b5614cac58091cc241e9d1496

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            96eddb1917b043d1b6e6231b3aec8e37

            SHA1

            f0842d96320a6e0490f0632d624a8d4fd4d12b32

            SHA256

            16f184b0a3d9df3459904c9c925c0f52604b0db5f58c48e0b849cbaa957cc9b0

            SHA512

            516a5f991d0762db959eae82dfdea26b741678a95850b970a55c4f35ed0a667e4080e03928d2ddc01a4ccf7fe17f0a8b3ec1c33dfc1c8d4c9941afbb0f3982d5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3a1af296a0ff7d1e727029d50c9529cb

            SHA1

            7a7a9ca4b50d94e7cd5abaf927d14bb572aba30b

            SHA256

            69e94b0ea16de3dfda351454b08024578bfa3f3fa2f76099be10b359543fd38f

            SHA512

            757e5d26ee3cb2ddeb8c92d7809c6c44e76e2081c32f1d731900f0a926941717552c3917c75a5c71052710857d117094652e3470b1d833f774b5bb12844e9835

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            63a54fba06e3bdaccf24161077e808a7

            SHA1

            8d477be3b78bc2bb57c4af0f2511583ccb8e276e

            SHA256

            325d2cfaab1f63804f7f183f7cd5a605e01299a8942ddcb1040fdeb4adf90c9f

            SHA512

            f84893cc8a61708e1229a4d52bff2f4892bbac3e499f3d85edf42264e4c878624e53563c90663c330854656935c83b0b2319acbd89612ccf0afa27d198ee633f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            c012ab25559cb3f2421a20b8ae2b4163

            SHA1

            b1881b21ccc9195c624e2b717794fe2168c1c773

            SHA256

            f18af885218af9fa16faa0fa32c8a217f5b1c69e3ebc85d36d21e7affa87def5

            SHA512

            007004e6ae2f1d12a76d39c543e4e42f1516ccc5ac002bb84fbb1b261629ee8cbb80fb83492e97776884ea818554bcf428227ed3debcb624028fae3f7b6f8151

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f3faf9fdae304a8f56cf627626d902f3

            SHA1

            198ed2b4f25b25c2ffa7945628adafcd8d827e0d

            SHA256

            348758d6e64fff296995f916237f7370c8e7128a5dd3f28cf1166436a88844e4

            SHA512

            50b5680148d9982aaf5bebfff8dc2657bcc620a338f9c0bb881e30257cd29568e0bfb2d6945f270c11dfd6159814bb79705ecaa3b1fc31e1fa2405503eaf552c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYXN1WWD\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Temp\Cab3CC5.tmp

            Filesize

            61KB

            MD5

            fc4666cbca561e864e7fdf883a9e6661

            SHA1

            2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

            SHA256

            10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

            SHA512

            c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

          • C:\Users\Admin\AppData\Local\Temp\Tar3E91.tmp

            Filesize

            161KB

            MD5

            be2bec6e8c5653136d3e72fe53c98aa3

            SHA1

            a8182d6db17c14671c3d5766c72e58d87c0810de

            SHA256

            1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

            SHA512

            0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

          • C:\Users\Admin\AppData\Local\Temp\~DF4305C52CB7FB0F8A.TMP

            Filesize

            16KB

            MD5

            f092bbc80ce4aaed75f53273c3dcdb92

            SHA1

            7987d6b5e222f976db40ae7827cb8b31bed83607

            SHA256

            8d760fd02e1c767f174fed78c3851f7925b5d0a888f269670b2df506b347a559

            SHA512

            24ac19089c280cdfafacd7d9c813a094fa7a67b2f089091b770d3062088df15e31f56803a3646a62750a4360960f3b9789f2ee34c2ca6f74d27ff022b88623fa

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7RSN60I3.txt

            Filesize

            603B

            MD5

            65efd74ef11af9a963e5a86eb1bbae01

            SHA1

            729f8ea2986020b1fd7e1f400a396d50303d3404

            SHA256

            f1cfc2b66bb392526e784a218636924779602d1f8ef497b88ff2b301084a7b09

            SHA512

            da2cf57594f3eb00f759337b1a7b2f9e076920fd5c7ce3fdbd4507cd702b2acaa002e2dac8fd4e38ae0d1269f3497bf8f8b2767195d5ab4b9c50d4ee692b91ca