Resubmissions

15-06-2023 09:53

230615-lw5tvsfg54 10

25-05-2023 01:24

230525-bsr4gsff42 10

Analysis

  • max time kernel
    100s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2023 01:24

General

  • Target

    shape_06.xml

  • Size

    1KB

  • MD5

    f804c3c0fc87fae049b25a827c8af161

  • SHA1

    445ad3b8c8d54a5ef32b25289d76907b4d32c9a2

  • SHA256

    f51e36583711e18097f4526a3303cec7efa3609f96c8051a5eb4ad0c003abdab

  • SHA512

    bdded52d78a6dfd4dd37327a752aef85cb9235a03702fec858696643b5d884970e3896b737dc1f894888ae6bc4e5b8ea2bfb7822b3ecfa87e34a7f25ffb33cc7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_06.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:276
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    b5fcc55cffd66f38d548e8b63206c5e6

    SHA1

    79db08ababfa33a4f644fa8fe337195b5aba44c7

    SHA256

    7730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1

    SHA512

    aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94ebc6bae50cb692151c7811be5752dd

    SHA1

    5582ae129edfe3d375e197878152ff9acf55a77c

    SHA256

    d8d517317acf0aa951f8c2a5f4f86b22b04c1219587c3ed3d9724b62c80cf2f5

    SHA512

    fcfed383b456ef0d45204001e4217dbf4c8af4df633db100522e885ca4a2f5a1498192751b0c48461c921ae80b10c03ea7777661434aae42ba271b7d1e4bb09a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6f8cec2e0c13db785d7339c9fa17859

    SHA1

    292ebfe497868fe8fe8d499d85d325ad4e7cfcb9

    SHA256

    b50fc32012668b54e090b665585033f551086e5b49b7e2bbc92129f11d29250a

    SHA512

    be4845f172d0c29c77982528798fdeb6fc4a86a0fa7b1e63d7af11d13c7ccf285746e8ae765ce2ed4cb09d950b8950bf233431f24d1a75754d57812dddf39572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be33bdd9aff544353d9b2c4465012980

    SHA1

    dd7d838ea9307fed71868df8ae7e7fb8ebaa8047

    SHA256

    f7f3d7df645bafb4169da5bdb217feaa59e36b05021c1579f22188cf7afdf646

    SHA512

    98ff93bddb1161bfba503b03d4a84a11a64509a3dfd5c3053b766fa3f9923ab051d04fddcc0b67f7972d108b5b83ef514ab68a016fe197ad7f99d023483d8491

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17bece4359d3a02532356eeb1393eeeb

    SHA1

    83dd81880dcc850fb7ecc51fe5f3db4425973ce3

    SHA256

    5861452cfe9668fa1fb612df5bfee8bef92ef317d02a957da67a52173d396e29

    SHA512

    ea34670a601a9119da6732f7a29b135ffa071dc286a47ddbdd25391503f466ebdb65039ea9580eb8524b205d54de13adefe77d882454ecb624ec3ae2c7f9671f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba7fec9d818926dd04fb3bc1f2e34486

    SHA1

    0619f7882fe42fdf03782a95b8eb4b86fe6911d5

    SHA256

    4fffdad33ffbad5241e5e7e653f6d562302c05724da83e1ba4646f53788979f1

    SHA512

    5b084db8ae324f6c18544edbda0f052783f5ceed9a37b3c607dcd51c8216e0a733a2f10844ebd4737284fad5819b816d37346de07f9e31833e777c882ca231f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cf0b2a8436c953719fe8dd8895c6932

    SHA1

    ba3d6e88a74cea93d3fd147b30ed43981261ef65

    SHA256

    2cb2dacf94720bbd00796edc13d929d88ddd747b46dc2670e6f28dcb8dc2640c

    SHA512

    57c85bbb68b315f04b52bf4803fe538ff041b1dabd489c3bee13ca4dd95d1213a1344b50256d17504dced331f74f873dd8e412f51f3440078446686a4b44fd5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f08cf77a02f82cbbabe80e1f5a2334b

    SHA1

    e8205dabb5d80a1b0b6ea2481f28ee13d6fc56bf

    SHA256

    ed1c10217c52bb2cc33ba655b8adff57bdcc1d6223f3eb817a8da85b512ac76a

    SHA512

    f14dad660f2f1c1ee84e7916b24ca0184a8c751383a935b8c2f1bf56cec1741f6ec08ad73be8889be49f2aeb1f9951c0a04b2487b0c144d98792c1d67b14ed3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    edef0edbbe8fe9d306656eeca26b347c

    SHA1

    83ab9106ff758a0fb4524ded4a4822408bf73f80

    SHA256

    183bc0b3652c8b6b03d3dd50142c995bcad8dbc6af0ab427ba0d1db0b71b54d0

    SHA512

    7b8a0ed7c34705b8d30f053336c6197c7f2bad5e22c29e77ed1b32ea09a273762cbb313c3e3feede805369ed5c97c7c19cbb7d8e3f4f4e831f58d6022628b967

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9858a3ce6c4e59d8ea8d8127525f6a1

    SHA1

    8e04061b5bc7c94d145f62f96505afae6f1347a5

    SHA256

    ad2d47c2986d5abc13a885fe3327e57db4a0b41f4c4aff862a1cbe6f7ff38e3b

    SHA512

    cba02f00c23f6849c3d9876d1af6a3834e3cf23fd24abc30e9671bef33d81080d9d0fb8b3bebaa4ef912b398d637db9513f51ff78899453059f623ffa8741d57

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QHKTFKHM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab3880.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar3D00.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\21Z5TOVX.txt

    Filesize

    608B

    MD5

    98d65674f15c1d9b3d23a446d1d806ae

    SHA1

    a72fa2068d58977d7357780be286a2a1fc46441d

    SHA256

    854c8e199392395f4e03e4d0fb5dcf71c9afd88a9c3c3ec412f3a0166f169a58

    SHA512

    83977ba5ece683b6f8ba89d7f2dab15c0dc226011f294c14c733c9d7a44047bb32e7ba6f7946ec8087a8b91af6b603bc5c7263a18c1644c02c760b11bbd67a78