Analysis

  • max time kernel
    106s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20230220-es
  • resource tags

    arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    13-05-2023 15:19

General

  • Target

    gd/Resources/DungeonSheet-uhd.xml

  • Size

    2KB

  • MD5

    27ba105952636545dddebc4e8337c7e3

  • SHA1

    ef45e7d19370d3c4a65bca01b60d94339ea009c0

  • SHA256

    4f93ece615eb1f276d22cdd72d873be10a2d4bf90266743e80a1cf5d0dd67291

  • SHA512

    e4dfd2b6ccf4fe0760027e922450d6dea7b820d457acf3bf0b04ee861a40f1169bdeb1b101e007b501ed135c8bf8179e0586e8a011ec33f0f0a37883a29c97c6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\gd\Resources\DungeonSheet-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    470e4286a7ddc1c4666672c50219fa5f

    SHA1

    84e9f99cf6216e3524a3790771729b210eecb863

    SHA256

    bddbe487cf75065b83e6d2f31fd385c4a1119008aadae70628543171f6e05685

    SHA512

    7bcdcf6c90d444ab0493375dfbd1f300c2d82d7b017d0ea08f8abfe54cb57cd9a5a83b28d2881e2f4424707f040ad24f810fdd289ad8541288014d86ca8b5d19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac262f034b49deb513096119bae5ca52

    SHA1

    7f5a7d42141b2ebef351065f0cfaa803996de72b

    SHA256

    330bcbd19a12c52ad9da4ed15f7601b1eb7ae53955abed602d163ecadbe2d1ea

    SHA512

    117128d5f7bc2bd07c334d7b0c22a01753d7cbb5620e84b11e06345e398a6fe9d4115aeb0dbb1dd48403548b7a64bd6cdebe5cc9a4f22292b41c7c9ce3e2d798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7682c4f56b964c14a7866c9efad4bcb8

    SHA1

    f1a4c8e76b43ac869fed9a84e8c4019eca37aff0

    SHA256

    938df7b01e6fe5e5109e179bb02ad4f598d6afe3ffab61e6a6d9572bd9dcb0eb

    SHA512

    19bccf69a74b540a2b20794526a33d5130a0303c9dd88f66fd2c24b636a46f8b66cc48b23b31fe547759cd35bf47925528944f91a7b10339bbab26c06375e5f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e49872c7ed736033764928595904212

    SHA1

    e7da2f1b9fd240d35a28406ccb552fb56db2fe4c

    SHA256

    d0cbff73bcaa50c14722965e794e2081157b5d9b7ad1f70e2eb9df78f66e910d

    SHA512

    e1f00afb0281691c7d56977af2a4927eb1775fcc6f99ba50ae1212b7548b5ccbe3c5b186fbc9d7b14d92c6938ce7ba309da6228df1c76a34a48f15ca0011523c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fc4f587d34fa889dfa057a708c32548

    SHA1

    7d1781fa6d4fbd7afa1a9135bd12d819bab8755a

    SHA256

    9836b75d94fa5a8d8991b17f01d5d5e73e965ef2961af988092649e88f5b250f

    SHA512

    eae7f1925d3be17df6df266b5e3d91dcaa47210a0fd71b15fe22509180ab6ec38f2f813b2014f212f1d9c52fb4f33ce1ed925212a79dfcf580feb6ad10887159

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c38ebe510e0dd5caaa78559fc3fc533

    SHA1

    5288e822e327638b8dd078fd2c7033228fef6d0e

    SHA256

    2967e6b7428248c9bb78ceb644d11fb874fdb4040def2055bc8d11a6997d24c5

    SHA512

    ba9c1bd5005f8e25c86bf51fc25f5a68e10b1e8b10a4f3536cc662f25d5854bd5d5d58dd14791cb57c4dd62443dffca947ebda30bf028f03df99e51095feb093

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbdb7ef2f05a734f81318c595d9eb8ae

    SHA1

    56006083675ba499e4e376ca3e99f29f9f5212ff

    SHA256

    feb14d3da9653a4df210aa235a7d99a884d4ebfb7bfc92f77be393d4a9837199

    SHA512

    2ddb564e991d9a721df785fe5cb4bd6fda9527d5ae6e1785fc4fd0e5722dc719ab9a9baf20e1508f7ec72c8b348f299d9124a34f3a505ac61d02796778e074fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd6c83a04c490c20059af3e1e02a3f64

    SHA1

    cb991a7975ae0c3b0701264f6296c02bfbf704db

    SHA256

    ea51e34e98b18ab9441cb8ad8ced89a8561e6ce5cf9c379a58609970f3ab71ca

    SHA512

    20dfbf43a6721277695b25a1c4055e1e795c100805307bcc02c3690c12f9fef25b4c08b0109e29d5d43064e62ff0b1b82a7b957d34bb692e32f5222effc272fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c4abe8c93d30d4a100e99ef5fbfebb2

    SHA1

    3c8e8b8406710c8cec86ffb6dd9ec8ee322db09a

    SHA256

    9fd5eb104b969c819ee32a9e4e97231cef98ebd1cf0c6269d1ac2f82c071e40c

    SHA512

    a0f4ea5b6e9afafdf2c03bcb92c68feafd1dc9745360bf1096bfef8518ecc529423ee993464d5acefa75d5d4622bf9262c91b0cf5c9ea39d1ae45cadf5f73b56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2914ecffe7b8a5ad4f3f797b5d1e47ab

    SHA1

    c6baaf6324cc5bfe032308263624b6725cdd6d8e

    SHA256

    67e45f9eef9957bd26d32b3d417545bfdf8c1a483958e736cb323ba0f8d92758

    SHA512

    9f353b7d04714d94d3c73e666a601a7cba29938fddb7ccc4ca346e47c8318c54de432beb41db9600f687ddfbd1858933062e60837f8d95ea3222a7bc27f1a87b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63bdb67928b39612655520cfe1faa2ab

    SHA1

    0d3f65c318d71acddc1075cae2b5de66554ff3bc

    SHA256

    41431bfe1ef9f41bc876acd86d901f7ae0185aae00551ae4da280f5502ea9345

    SHA512

    f7949e47ba77b47f7aec0447932a8d4c88c6a1f1cbd53c5c32bbfd7ff1fd4bbc375ba9360f66f0a4afec16e8406af25b56b09533b4bbadf7f9b0312e334b1ea5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\suggestions[1].es-ES

    Filesize

    18KB

    MD5

    e2749896090665aeb9b29bce1a591a75

    SHA1

    59e05283e04c6c0252d2b75d5141ba62d73e9df9

    SHA256

    d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

    SHA512

    c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

  • C:\Users\Admin\AppData\Local\Temp\Cab9F2.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\TarAA6.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CPYBBY3O.txt

    Filesize

    604B

    MD5

    505486f80c296f91a27be1c285fd2b74

    SHA1

    fad59baf1531ab09774beae857a7749852386c04

    SHA256

    8faf465dc62e8bf90220d7984758f095707e5711d260b6c17582f1c2cfd7185c

    SHA512

    fbd49dfb0d51eefec619f19878634ba3d869e803e393b8782077415f944e960f499a51c81767ea76a2b6d7f50339d5dae8aa5bb144225789723738eac738ad36