Analysis

  • max time kernel
    116s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2023 23:11

General

  • Target

    GJ_GameSheet02-hd.xml

  • Size

    722KB

  • MD5

    57dd9b02a612ac070631f1074a39038e

  • SHA1

    13cf4cc70086e4da6f2479a878b7f0bc88f6c765

  • SHA256

    25dca27287c94938e4a9f95212aa14f966b8b57632e7be16a6e1bba3f2c333c1

  • SHA512

    1b9e0f4beb3a9817a9464503940553aec1a94cfd8875ab03ce131a81ab049758dc210ae65362e266e52c63e48b695d10d73592f5663efc1f7710cc48ce9062d4

  • SSDEEP

    768:hDXO7T3jucJ3tyy4vPbxEqCuCMCmC5CICUBC5CcCsrq811qvh7wEbwm5RW0v4G:4PX8ySEi2SsrsG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GJ_GameSheet02-hd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:608
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1700

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    7758df2d7849343ff8990ebba7339c42

    SHA1

    4d3e6aad1a87d3c0f56c10febdf3e55d75c3d7b4

    SHA256

    6f987374b667aa94cd0f8db828489cebf01537a2fbc6e42de00ef4fbd1c3462c

    SHA512

    842f20f71b3d78cfd4cd8d706e6cba565a5c25f791d2a0067e3a42fe944561e5ac9f69adc862f81a5aad0f4b9a3009109117ab5f7a65aeb49270c68a6555ca2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    867d4b528969387687fcfc8143d45671

    SHA1

    0f1ed97beae4a322c9b5acf61aed425d5468321b

    SHA256

    f08ea4aa042ad649fca9583018e457446c2caefb85326bcc97d7a7dae07be318

    SHA512

    9daea4d7398fecf6465d2faa1b490a6d5eb19a3051c1e37b00587f6f066c403be92b41a5216d1c61a7162815d723b9b306909961e8cabf849de5b1e29861dcf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    7cb606830a5053ff95d865925bdfae54

    SHA1

    2716e32f8933046e375edbb2a9d831362391eb15

    SHA256

    dfdcb6fe5aee9feba3b4d080dbe2e9f7732930af7bf3b73e62a8eb837a3c4434

    SHA512

    83194d5f31ebc6ecfce6487957c954a39838fcdcae15876f99e471dceaec3640d53a56b9abe8533a09a6c5a46bb01533e2f6b43080a9b2275fc6a6e11c43838d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    db487fcb1d7de3a717cb45beb76b5a07

    SHA1

    e462a16bad48b18afa9e2d78674fa1ba8534be7e

    SHA256

    feb65017c2d31f89da210d45fd0247a0bff140fea1b11e81bc19e67299964777

    SHA512

    9fdee6657822cf12f06ca394ac6ee2ee28407b27072d17f9cb324569f6e759d902b6e730c0e5cca421c4b0c6c7e5b7c4ab5c8839d81a998a75f9fe025374c149

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    61b8ff84b079f0c93e9a1c495de5d9df

    SHA1

    8dbbb7e62f9834126b549fe25fb1a273e3f6a928

    SHA256

    7f0c87684e1f1c9e124fa3e166eb3fd642f35bc7e3c467800bc266af1eb879b5

    SHA512

    7ba122acf80b35dac7ac4b5ccd7445db446435d75fbdc4a8adc4418dc77e079e3cb4579a131f1a838db7c469d135ebe0d0817253233754ee1cd09ad7e97812de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    d137aec8eaece09d4a81dc4994682d0a

    SHA1

    69b9cbd760c5d02924c497a6420a5cae3f876ae7

    SHA256

    406b109493bf74d31a88a8bc2da47d83f0999c828d748a55e464472246106de8

    SHA512

    2334f5daad4e9bff8fe95f2bd5f8ead5a752ec8defaa0aff29baf17e0740d9846ec38f8d63b58344627452cded10c5cee42a96f906cf40b00186a4621a9f36d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    326e531fde91eca6e2151255cf0b1b60

    SHA1

    ab673219e19e2baf85d0556c0b474b993518a7f0

    SHA256

    1cb73f4f689a6b3355de702c3545b80de11c6aff97469696fa667fa995644b81

    SHA512

    03a5cdb26cd7ba4795f8b3bdf6b75c7b952022a2ae0d418ad328081dfa04a25a62f0fbfb31433c83d116946fd37cd58194399cb97acb72b74b72e3a217551c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    c87b96b44e8da2afae1ef8922471fdab

    SHA1

    b9aaec4c80eca997b1ec49dd762d400c4a8ae6b7

    SHA256

    e7d575fe77333a8e0bbeadbb0410cd30efeb06a06f61fb122060c6cc3c872a85

    SHA512

    e82f0d675c4c5aa6eb2ce8776429e0e29f1623831d44862cb2d2c5a1381cbe09c8e0028e76d240779c91d35f84561ff702ca1191a67e1a1cfee0bf532028bf5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    032e664b6a1d3dd42506fa6d7eaaf291

    SHA1

    c254d40991873ade2507295e9137164c4655e858

    SHA256

    1c5d2060ce976eb8bab104679f325f1ff130b991767b606b1a20fdb7d091acdb

    SHA512

    687ecae9c1ec78c0f2f478da496daf8a1f72ac7f5d98f4515e1ab32215b54a8f82e4133f898dc87984805fde4c9902d3e25a618acb6b13802362aa0cf609f04b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    c794ef470fb2a592f1c7d4f73e289a3b

    SHA1

    afc6e19fc69bdcfffcdfade244df6f749964591f

    SHA256

    41fa200b951f0676ea80d4e24037c150ccd426b90585dcd9ab8e577a8c62626b

    SHA512

    5f1380cdfeac2c29759dd8b9d46bb4edcbd0bbae13230538ab35e8fd531ef38a9c6d3e417445d34e269b3256b771e293f9c87b5b78a194be4ee21e9881b9e60b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    741ca1c198eca1f2560840c481487362

    SHA1

    78e70ed7ea12c39165ef1f4576d78fde527e1215

    SHA256

    de3ad090eaa48341e54e593d9b7bc4dd788c38e4c59e44d373131e69d3aa2e41

    SHA512

    a78050929776ceb3e964c71ed8e415d7e9c9e18bd53708bb58bda3ced50bf2d86892692e07506c6059b0df0306b9dba030c38e973f5410173ef4a04ae25766ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    5c4c515b8f1a9d2840523d0297acd3ac

    SHA1

    1f4e07a6f3aba1df084d4abf4cd0a1bfeebcf751

    SHA256

    3285ed04f1aee8512046347dcb4209f027138341dc93bd4b62628ce0ae4142e2

    SHA512

    906118d0b623d48d93d4825d376263bb4ae5ec72fb3f57224062a016b7d1e2793467580d3449be34a7ad132c6de3de1862ae5903c1fbd99933f5b49fa489ff73

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab761C.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar76FF.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YAVOHIR3.txt
    Filesize

    606B

    MD5

    fb9861a6caf429440c5cacfde98b345e

    SHA1

    a03134d20466cc750a0c8ab50c4f34d3106e4efc

    SHA256

    32a3ad94b25373a8c95040d54e0bbdb5dbc7f7659c7a5ff24a4f8168223f73d1

    SHA512

    f7d377db72d628969b6938461d3a0fc27301161e7e77325efb1a25ebd6066e226c794275f66f9123e60849305e752de56eeb1842e2f904031f6635bb37010f83