Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2023 09:35

General

  • Target

    xss.svg.xml

  • Size

    368B

  • MD5

    b2191c36c5dda0f0099cf3b3f5c08875

  • SHA1

    8c44dc68c59453777459f23b82ab497dbb0061c0

  • SHA256

    e44901e51a734fc6227e786466c8359735f37771fdcfc5acfb055c197a75c732

  • SHA512

    1fdb128667c314877ceae6775f6e68f5bd1c2360783c2661df24a4a4d79d1a8a9443bfce36af0a93321f1fa0d1b6e4e64ab296a4563513b5bf97f6a69549b627

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\xss.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ef9586f2edb57b7eaac4a6e395166e9

    SHA1

    af7ed0912082a86abf2c9371cf445e75121ccb06

    SHA256

    9660bfb180089bec4b643d94ec2b13dae78f34614d6b2990a6499551ade74b86

    SHA512

    fbcf2a3224ec35f474abc141cd33a1a174649ce421892d597554da734a8828575b0bfd72be44a3ab47c88efc1bee9d58d119a375a2916f327b6ad5b6a9e59feb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0a38ded8c5044accbcc7b99e221c187

    SHA1

    6fb0b9375cedbffdbf42fc710ed0378644da16be

    SHA256

    3940d571cbc646d5bd7b59c6c1406e3aefca6a6a6dde05e4cfcbe24cdc69ab22

    SHA512

    511a3cdd5ef465f2ef5849c7a98ffaaf5c01a7f375e4de7a667ffbb1e26d62384782beeb33999970cf8fc048578ef9701b3d29cd6bb71eba17fb0e4502482fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    891c02dba213a7e34dce81fc8fb8a8bd

    SHA1

    c64fd6542646007fe08cda3e747ce3de23d0bded

    SHA256

    dcbcd0401ddec4a8bbf3979172e4c4a11c35567dd8649375805322abf8d3fe06

    SHA512

    644ec7b1053c0b9b2aff1cb0d7fd9362d8d4332ace43f356fa46cadf26d1ab229b4c57131e13c079eaaaa7cf7280f2c75f030649bbbd12fc18fe423d35fd72f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71bf34cc589c53389925af1c8c7d0e78

    SHA1

    b2992e93bd2e99f122d37c755a549019792aa371

    SHA256

    fd0648ab8477cd674a84e469273d586811392b2cb5f5b5bf45eec6fc001d7598

    SHA512

    5e995d796bad42f6ed81b1d61da123ce78efd3a441c61eb474046e57663559d656162c65db83733bdf0939ef64ebee31554a170d83bd3b4072b668b970c82911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    baa0fcfc470305a28f307eed49db14b7

    SHA1

    998d5a683a6775d2b1ca5b3ed7b05c2daa0ff2a5

    SHA256

    a3b8d2f5873c5f47f9d63d46a17810e47a9573a44cb8f0403f60a1cbb99adcff

    SHA512

    68c303b85a213981bec89a402dce2d598f41e822e040a9e7cb45960957856f90bfeee64da2929042f6a5e942af39f04de37435ec81d760375f17e1451136735d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c353134b5b7bb8a36e8788b7459f0f41

    SHA1

    1517482ac678a29fb8d79502def9b7b94e945790

    SHA256

    febb9968643759d01c7222161d67bfab4d036349e7c3848739d3ea44cb95521d

    SHA512

    6b5104a9fc45979d5579b3972abe9c95680b2545e7515b1b0766cf4fc4dd2543b31d28b4eeb943d385384ee641e588bb919c3cb90e04951fa2e4de0b8e491cd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a2d0ae3f49b5d53fa759b32d13537c0

    SHA1

    fe468cb69f763a99fb1d4fb13f3733671927d623

    SHA256

    213570038b4ff3d65813c0b4185810fb29ffe87864a7e909300553959f87338b

    SHA512

    450bad842a56cffc8cb9270c299315344030d5144058359c5146f281498de3d784f24c5904e4844747b55ab3d0c6637e5b2713bb85f01658e9317ea7f1ac518b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5376830c46ecf62b2bcf52199574a7d9

    SHA1

    810e4dafaad389e1e486d053888d775988b5eb60

    SHA256

    62140d5dbf8df9c193f55537c257fba06fe7b0f4e2dc600082e487d708dd8848

    SHA512

    0b1f97ed5a4549b0556525d3c6d2e6822f91aaa079077d42a70435cfaea2fd2cb20230da0b95cb084412116210a9f73eeccc95229f24d17f1bf5ae02e803893f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QHKTFKHM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4FB8.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar51C5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4B7A2AH1.txt

    Filesize

    601B

    MD5

    22e12943fdc5ae70a1dce2cf30155859

    SHA1

    ca8747230d5421d0ba03be4add8529f3e95e5ac0

    SHA256

    39c399ac706f0d137358a68f4956223be8b7a5f2225a4d59d475e3e48b5c0574

    SHA512

    00b08dff45ef4bf161c938361b0a861c13dd7c23b18f0799b5966e8e33ad6467673092e2603122f52f9fc85c507c426a3ff972f4db15182db223666da55890b1