Resubmissions

10/05/2023, 15:05

230510-sf581sad3x 1

10/05/2023, 15:04

230510-sfnnzaad3t 3

Analysis

  • max time kernel
    100s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2023, 15:04

General

  • Target

    Photos Library.photoslibrary/private/com.apple.photolibraryd/appPrivateData.xml

  • Size

    413B

  • MD5

    96443bb78acb322f03ab657a42a08d92

  • SHA1

    e420f83d4a90d0a7f395e83ddb0187c59a537895

  • SHA256

    35d8cf32ff8b1bbcd960e92383d0f5c587ecfa1d9c51c08c54a2caa41caefe3f

  • SHA512

    ca764b1932e1047153993e29baad286b44927c5a1cf6d32bfc064fbf830c3e914a6e948ace012f4031595188a3f5d976b62518bd5c3538e6dfaf46f407e2c58a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Photos Library.photoslibrary\private\com.apple.photolibraryd\appPrivateData.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:520

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          62KB

          MD5

          3ac860860707baaf32469fa7cc7c0192

          SHA1

          c33c2acdaba0e6fa41fd2f00f186804722477639

          SHA256

          d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

          SHA512

          d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f39f80682f5143a279e0f66d0a625d8d

          SHA1

          f4836b89168315c87ac168f16d6ef380b1929030

          SHA256

          44249363494f5f244ab737a809e6652237d0ebe1577d66e52c44ee75e3a45abc

          SHA512

          40968a9f30210351e433797ef8e8ea9c5f4432bd391f496d3db20d97a4af406c3dc6f4f0694c0a4fe4b7860dfe59aef37c1b43c9a46c65f9ae8757faf699aebb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b3670d66611cc187ceb3cc9395847269

          SHA1

          7abcfb5e58ed296674d6332042449b464668bd82

          SHA256

          bdba23c97c5e8fe287c7a2fca785d56d64f704830370d109efcd8c43c30809b2

          SHA512

          717eedbd07a84eadcd0cc9fbee0cddb0ab8fe3f0677a45c083695617b2c9988584c81cccc1d5eb378801e16659889fcb3e22d78c55c71ae46807e5d666f940af

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c45442151e8d33073e02d23015b0c484

          SHA1

          293e3740e266455ceeb60c0ab905f3a87232444a

          SHA256

          8ead88133b9d4dd86d7b514183fb6515c42a05fe0b5261afbd8b01b0a04280a4

          SHA512

          dfab8d4c99c755ce71a1d5ad53df30f66f0c9a09aa9af9400d461020e9275cb364aaa4f259d4cabd9c157cca8d50af4798d93ae05d388b50e91901fa4a054458

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8c6221d453635953b9e81a7d7f3da6e5

          SHA1

          f69f006c94fc023fc3907d7ba7c7d8ff515f19d7

          SHA256

          d6ba7f8eb3fb9d7e804e69d5e70d8a833fe84375551a8d7e5d6b6c6a5e162191

          SHA512

          aada264fe996f870af57d9aee9fc51716b3b16cffa6faa0732eaf555b57b206699c5a61e357d0f0cbbe851d42dfe79fcd4f3bfd077455644e6c2592d958434e9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2ee2490f02b63eacdab3631fc41d31ab

          SHA1

          598d52fa939099de9786d0133bd54de52199b103

          SHA256

          0859d800573a7e1a982cc393f5d490ce6f8dd82d6a3377b8f53d13f54aa4c24d

          SHA512

          36ae2e58864b35020260f11e36f1c7ef80d903eae39efed5283526c29ede0d17692e1211ae581216463633e2d4071056c6c9cb7f4168eaefeaef54655bb0f5ac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ee6cff9adb5c20f9b1945ceba3e17b8f

          SHA1

          2588a439b2ec198d2f2083a8d36f87d23ad81230

          SHA256

          03245c3054f6babb37f233d54cf6df8ee7d7e9f5ecee5eca5b9456c5d98db0f1

          SHA512

          69bd80f89e90c8a48f6dd0694974aae8ba1d6629b77819f9af212c1314936cfc60f0883eb4b83d62ae9e7190568684721a37027a3ad7b5820eedb7566efbba6e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b2a7877928ba5e3b4b07df15f55e211a

          SHA1

          5340e89208c46230a93f363f3855d84a10d296c1

          SHA256

          9ce448facf983bda6f12e4d4f8e0c359a8bb2d772e6d6858795e9a8c6e194eac

          SHA512

          65d4cfcde1dc823e2401afcdac5e813f49fbe008ece5c113878ececd7c98f67c5566b80c3aafd6957af4b9030c9450cd133727d1483c11e1ff3ab68bd6de41fb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          873d3a09850cdaa026d1e3d7c9be15f6

          SHA1

          76d01ba133472c1804fcfd587d338a09b4a7bab5

          SHA256

          940bc1873f8ddd99b7959705d35abda03ce36c7ac74c71c3d7fa4844728c9dc8

          SHA512

          961361909c8b3e9ad06efe3f3de9b1166ad837f1ca8458be414aa3c57e754ce6465fa54db7a815ecf2ce4dad3da768b659d2b67522dee3e6f7ff40675e3be36a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a0c1d15e90d81a0d4579433efc5ecfad

          SHA1

          ed175b4ae82c5086259afd648999e7f4053fc75b

          SHA256

          fece733cd57b7722e7582b19a8c84e7d46baea90bd4f4361a96ee769a0097538

          SHA512

          1fcb03d1b6932a6f7145cab528b7b888c90b14a87768572a26cc6d62ddaab878edd9e6ea92a8117715132252dff91832c55d2df5904069e493b03df7baf3eb9f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6fdcdc078b6d4969aa6b9c55618d19c2

          SHA1

          6bec3cee2a5f8f46a27523536f2d54064de23ab2

          SHA256

          42d6899e1c12bfab6d70fd4bc66a8f7358d89b65b1764ac4be7886ff196f50b5

          SHA512

          b7a1d5e751263c00771097a5bc7ce54bd913f10e6c6647e1ffe68f1f45df5ced2fbd0c2c8a73d1895f7e3635ff240cb8b611e98c957bb26ad0226904826da506

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          53ede289e5a1b68c332789f8aed5ba87

          SHA1

          beb57028bd60dd6dd9965c1cb8cc5dcb7e3bcbe5

          SHA256

          38506e058aa178072773c3f974cfd4bc925d81e4a43ef4289db408ed7cb404ec

          SHA512

          8811edf7c15ffd020d56468911daee1784c503097bd5706b303f73fe7b25920013f02e4a6382980758562ebc1ff0d2ea0f9015f534cc6ac0b660738a45cae51b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f0165568ecf5162351be710a2cb3ed6e

          SHA1

          e39e26160fc1748c86c4dac8a39a585b6e9050e9

          SHA256

          50e6a5e13db91e8c64e4d1f59853dfa7f94a5fa590dda6f4dee09c635054adb7

          SHA512

          92180045f352a2d4639cd3920e597a3ede67f1e7ab3b3497026298c40ca91247bfdf250e78237e672d8d28f1a31445f3082bcae38ec3c0f28a2b360bfec73c01

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AFOBZ3YS\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\Cab9A6E.tmp

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\Local\Temp\Tar9CC7.tmp

          Filesize

          164KB

          MD5

          4ff65ad929cd9a367680e0e5b1c08166

          SHA1

          c0af0d4396bd1f15c45f39d3b849ba444233b3a2

          SHA256

          c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

          SHA512

          f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C16PJYT9.txt

          Filesize

          600B

          MD5

          0ec51036dc4573040fe9443dc334a1de

          SHA1

          b1b450b3bbc1a6cad58ab5e30448506b5dcc98c8

          SHA256

          63cc861e146e33b02646fedb783b3cada8f524d6111edb905d1b5e08907afe7e

          SHA512

          912ceccffa2b8539154d93fa9e15b282717ded3a233c71ffad22b8f862669cedda36a6853b2ce83744d99d35801d676487504a9fe9ba8d4026a85c7e4ece198b