Analysis

  • max time kernel
    100s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-06-2023 21:23

General

  • Target

    machine.xml

  • Size

    33KB

  • MD5

    0869544722561f5aff0eefc83fc7b001

  • SHA1

    1e118f4b5c1c6a7b1858e3fccb1b1d1095561976

  • SHA256

    ef9b9387168fd1dd6c996f96c134d9c44f8eb06f9587004bf997252a520182d6

  • SHA512

    ced7c9a5363cabdb87b01ed6b4ca190a690640dddf5cbcc0438acdc611a8ee942cb6cd73c78d3fc2d59f70171f22ac832a10b1e23758dc92599ee24acd978ac2

  • SSDEEP

    384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuh:dkn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\machine.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:332
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:332 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:596

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    8bb7227bc7572095c13d2f3fbfa0f974

    SHA1

    c10d0e089581f7218489478376e1f55e99537e81

    SHA256

    9d6eff711650170d0f453415ead853cd9f9bb9ae280d0f1811eda9e374effea1

    SHA512

    e905c6f3d34a77c7376bc582a8fb32c9b057eb8f6f3fbb3b145b7103a9c6ff3c36c9cea700f719da212c99be1e29164f13b29cb4e85100843698103bc4ee8cb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    4c541127dc79826179f8e80a11da963b

    SHA1

    83e7bedca35e4a95e8b721b3f67858905ce9b8f3

    SHA256

    447922aff361bc82325eba65f0ebc14f00d9cd6f98ad5c2558f05c6b79083ad3

    SHA512

    1c6fd68386153a7a6ef1ec5850996658ce01625c3dafd075da80290f8832ea75a9858b2f110b7888c44f6720860e5820fd3c357a40b5bee707960c6ffa7f2857

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    3c328b8032b624815188fae804eac89d

    SHA1

    101e6e0333eed92c2f1f9ae0a0ebc0183036d277

    SHA256

    1b8ed0a5aaa5e0a86b4df3c4f06e2602b3b0d8edf914e712de593eecd4f685bd

    SHA512

    95c78b4f00adf7488db982bbfb5561fd79a2855a0495e3819864d3ac50a630b260a58a382ae01fc164685932ccee89a8abefbacfb5d4d308a94a589206e32fcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    72f32dc57e449d0a91196103037eedb3

    SHA1

    0a57e466297f9ab2b989c3f13b18bafab15f7e17

    SHA256

    dcf491a7990c44bf439b9e880e9a082952f17224851c67fc47273b96da1fd0c8

    SHA512

    9a6527ce03cf68bb0f6353fd734f4e87ecf807fc62b05e779cdd15f280b5f3619fa42c15178b992e477bd57914f821917fdd61d66d8e22a7ecb1e544abe395b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    0617faebc374729bfddc6e878a50d2af

    SHA1

    ed384837d19b2de51e486dcdf8b271edccdb84b2

    SHA256

    182278675f5ee37185cf8e1a7d0df27fc25f52ffdb29e3b3ccab6ffbe3193ac1

    SHA512

    44534cc835f1895d68ba7f5a0dd9f2647326e533247d90efb0e5db9bd84f4dc320d8540bff8890fa17c161d1b293ace69c55b25faa1fb62b73c4054d66293f18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    6571b5e366a80d6171845af756b61226

    SHA1

    eb3a1f287b3133448f86b8a22d46461523e901a3

    SHA256

    efcca9c7557a5e161cb8d54dce3ee82ab350e3cee8657e4120392ee66615b23a

    SHA512

    41af1170c9ead0b3306c01a9d75819ac13a9e0ee6ded17480dc66d9930802b67a14d49eb7ef2ad496a3143cebdc342cef732b496d45673f060e055344495172d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    4be85bcafb945ced9215f6a290285802

    SHA1

    f2b320ab58aa0a833ffc6971ead14f514ff9f92a

    SHA256

    0d1f2d2cc73a0a3ab983819bc085653fff488e9b4e764952f8bc740b5efd250e

    SHA512

    6137f2b372d1819ce58ce611c118ecc9fb5b3f814948cd38ea855e606df1a4c1141a526036f971b0a692d37dbeb8b2610960b591d59cd6563e781d1a6f7dc57e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    3efb6729db2956d1265a7e22534ce7ae

    SHA1

    881942c8f678d2980d2c121a7f94b29d1e8f5a38

    SHA256

    facc9b8528cc7abe1e7284337ec8ce3330c045bf6c95a5c43e32f5a9117bb1d7

    SHA512

    cf9441d87aa6e75050f9fc7222bba89adaaa6b19e403e1a172676e4ed2bf65065ea2223cba1fb57dc961e5f495343ad4b846944acfee35a7847a0784f360c824

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    9eb33d8b45afd5f860b889ecaf8b9a92

    SHA1

    e39111e58db5e35247ffd4f669fc7766c09c843e

    SHA256

    c0c6891bc73fc64fff7f49ae9a029d9ebb80a5bd4872b73093aab8db9c24a246

    SHA512

    58f08beb7390992adf31eca883fbc659db9aff50ca60e77f4aadf0f7289800d049497afe932aca0146a277305adc99f571374ba056e93b7da317f92dbb7ed537

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    2b2a2670866743ef67210c262b8bfd4b

    SHA1

    497c509140e9cd55b01c75521abbfd8c26b879a7

    SHA256

    cc0864240f234a6a9336059a7682bb5f0b4003c35baccebfa292148fa024e76d

    SHA512

    f7bdc0f9dbf3afe06357322f7f3d21efdb78af547054a9ad9e041c6b0a7d16e78b062edb1eeb3b2feee37c06e03a2671436bbd0f0aad4efcd0ccfe5a66c4a85d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    04d7f3a9693ab6c6ef1e0fb62dd6d86a

    SHA1

    be7dfa7b1a12e6691500482ceba9e1ff77a8c1ad

    SHA256

    66f5fbdae929fb0b09eeaa57dd987e6d8e73f73628aff16e53f1dd8fd55a30c6

    SHA512

    1904941b89ff0d41b2c7d9f23f46a8cf99bf6cfe56012464212a7fcf5aa29f2377f36e7e7b38afdeb85c57af505a4c782035f70a5890ab4569f0d621be94efda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    a860ddb37db6165c95073776ce46c616

    SHA1

    d1dffcc87fcd6258a1c04585945bf90ecece777f

    SHA256

    9c950f3fe8477859888bcd51b91296c63dce7e55d6a2fc4eef5e348cfb33b902

    SHA512

    0df13d4cfcc32613d91d811a0d6f4a90a9e907e07c1fe97c3e6c6ff40be033f56e349a5dcafd03a52952d0134284b468e5bd99e23307aad0194b783858e9d5cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    8f5462a8a638acb97954dcc778315dcc

    SHA1

    0e81b1cdd8b2d0a6438b5a674d37ef8cf27e9052

    SHA256

    5560ff1bb8f57517ec07c5adcb7e8423ca408828e9db98d356868c5b2e13a366

    SHA512

    2b8a9c43f89751db12c4896d1d7c7d21fa5d64b2210d29a01aabe1cabc8fa750043a4273b058cd5cc411b5d8ee87471d82505cfac1bb35e1bc488f2cae96f047

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGZY45B8\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab7581.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar76B3.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2IKOJOUP.txt
    Filesize

    603B

    MD5

    3b08a28f21bbb9ee47ca9398ad915bea

    SHA1

    74dfa40715d10cb01d185ac2d28ef382d41900b3

    SHA256

    8de8ddd643dd28fe064458dfa916cbcd19ccc1bff5c2e45e400c886298303503

    SHA512

    11205876cce6b8467775f939e5d47bbe20911a6c56ca0e8e02dcb1cb85fdd35ed81585496f489898d8e227e1580bca2a405fa00c43c6c552748109597e5c5873