Analysis

  • max time kernel
    102s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2023 22:47

General

  • Target

    SecretSheet.xml

  • Size

    8KB

  • MD5

    7eca932fc2d95fed5d4f10f0fd5e2fbf

  • SHA1

    357eca98a853c29d2f20bc4d4ca21bf800bd4053

  • SHA256

    e7e344f8af607b4fedc13c9e46e45d23d17366cf7e0c87fcc9b1771bb7fd4642

  • SHA512

    5943bd4f5071a2af1e1b32e5037f20047439ca3ed15a7b7c82ba8f76920bcd5d87b9c1bdcabf795efaf7ee3dcdf5c13fec670ff30597390e62906eec0212633e

  • SSDEEP

    96:/y+sYktkoxSYkEoN6GkYk2ZqCiGYcYkKKZLpKJYk/NLbaK7Yk/N20JkUYk/Nf/0D:a60b19i

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SecretSheet.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1408

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    dca58235e4bb511ecb594fc98adf39d4

    SHA1

    6e63586c5c9e107dc747563509adb59211ade04d

    SHA256

    a6bf71787c4b2092350194dd326958c0f4323e70c03d3ad83362d7d5d2c255c6

    SHA512

    e3a41a6bd53053aecb285c8c95ebd8f6e5905998020b55055a6f8aa4e9ce050436c883fb9556907ae9554f95ba532071daf7783fc858e4eeb72fee6b2e31695d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    69e4c4970baef4737d212bf399ed816d

    SHA1

    fda602d0f9ece87d7afe7e77806f3fbfdafd713f

    SHA256

    6b5c23c83296cd808c7c34f90c573b3972100fe000b135363133188207f6a2e4

    SHA512

    1564c0dbfe77101cecee9be30df510a62937810a67793874a1e76b200f6a16bc208750df36c46ac6361ed73fc826b1d632e697d6c3d6eca6721590b196568531

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4de4c7d490f7c926aeb42857ab747f5c

    SHA1

    8c56da170fdfd3b608ff46b46a5a32ead1f01e9c

    SHA256

    7f30fd987b523817382ade02087541c35f7740ac63df1efcfdc7a6b6928f5b71

    SHA512

    95f357ba9d7464f927b35f1b567652deaa6ada4782e7148659e1ab09c596193e49f7b657bcf3b9bc2156b3917ec86d70532427a8d00e6b7edccbf3292a492b19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e8811085f4e2e0efbfc579243b7d3cdb

    SHA1

    7aee676feaba23ac314f023640e4d83e9d961916

    SHA256

    e2f419781c87b6e82c2acb6d30f99ac9d5a971eb1f999312517ea3b01c4e3aba

    SHA512

    e87aa3b1cf5121261e3f0d451f8297ae04b91fd4eaf0bd52915f1dfd0a4b69647b1b1c743e7715217f67b859716ee8256f11f8a39de9590a79eddc3639c3c78b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    28112fc2db5cdf84d5a6997a17459572

    SHA1

    cc5db476ea026dcead5faf9183042dd959d369ad

    SHA256

    210a7a5899d4faccab85498cb009325aa88d4d00b0f5b0a5f39a4dc098444818

    SHA512

    63633d349fcedfeb3c4dca288236a11333fc1ce53bd5d006eb9f5e270986d8949607e18823509388fec842040b5902d247106ecd0b9ad858a82161e19767d62c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    69f88241c8b48ba5089783e009017d06

    SHA1

    466e0d7ae0a05fbee3bad141db84664b39442998

    SHA256

    c97d7e2da8f5c9a922a3139178fc25febaf5104e9019354d0b02b2f31a898804

    SHA512

    e33766453c58a1d97554d64b729345f3050a4501eee1fa9a16acdad6144eff31b3324b2288ed0af76ff5df35f99e72f81e4964815a4dbe174e6af4f8ccca34a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    027539d801b2e553b275c44d46ae20af

    SHA1

    bff12f086593026e36ea12136830318abcb942b7

    SHA256

    49657688d10231b168c076d8dd883abb7f49742823743e7899d00e626427f848

    SHA512

    d56ba964ad8644c9a10b2247eaa1b5b578072b5b209f950475b5a4fe6e22b11ea92bbc8a185ed264eb5ff2ff57f2a0f39b9e5d83f29c097cd019e00b3a8441bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9bc5bc5ec0fde4dc513cdbb2f468b9ea

    SHA1

    fc3ebb742247f2372d9a7dc7cb1ac609d1456e80

    SHA256

    4a655faef75e33ad48cd2bb2acd228d0839653625484210be7900c316305a70c

    SHA512

    cd977c7bc076e8a16031c0040fed54a5b91f0da0bc5e91811cdc34ea982c5efffea64273931a76b06ffb642522351892b07a7f719c3c514630519622e30e8851

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9f20c20e50b788be94f2b5cc46dcb6d0

    SHA1

    c3b97a7ba0e67b4b538e12c2d77cdc393c4607fd

    SHA256

    c6e7b478dfc0aac9ae365959d803bfa5c776a9753104cdbd6dae494e631edef8

    SHA512

    fe6ad2a2d9da82b5fc1573560fcddc6e49cd9f26fc39c1df57f453fdac845c0a276033cf2a9c2beb9a2357644c268914ca275aea8d530b7eb8a8089e98997c46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9f0f5c79d6252ff75ceaef8d412e926e

    SHA1

    abd4ce0f4ef35c0d080239ef447ba5fba2b998b1

    SHA256

    29c5ee8d20c535caf37958b7ed1cfe628ea2737efc32f6559394d7f5eb68b044

    SHA512

    a1ce53d312199feae1c8a235714e5fa2df2116309629cbe5d6d7b3d13d8efec6cc11932b38cd8a149731782b2be43d01e29c4e3555cb31450d4fcd775ee37776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5d29d750e5ab3dc0b5760efe99bcbd8c

    SHA1

    4f65805a8e70fae88aefd490c1abe54b6f240389

    SHA256

    f5688396420c234f70ee14e0311da89a8464a7369ee9ec4f9a2337d94cbb5218

    SHA512

    605796f7aa59e6b4b80cf7005be24746a224e9bd384b80e1dd078d80383350c873f842e33d35604a364091fc3d37e400772bca97cb7f8fe0680c6948145a0b81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    77c3da3452f34cfa1770ac30122726b8

    SHA1

    ac41e4919fce745f8bd2974915736d7e7320b594

    SHA256

    61e3d1f05fa19eea4cb3e05040fa44ad137f19e49704412f843982fdb7dde13d

    SHA512

    87372b05fe5260dfa719d2935faa95530eb6a1714d3de256531afb7ab96284738cf88d87f24a034e71329d9c54183bb09c21816f2200c8f5e32a1258ec9f197b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab762B.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar77AD.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y4DW2D3Y.txt
    Filesize

    606B

    MD5

    7d1031cd41284b368214fde87a19660c

    SHA1

    f947c33981f0206363d0d6766cb20638eb16e59c

    SHA256

    379dd5f55afc9092880faff9b72b727517711509d40db2c71bae64da7ae7450f

    SHA512

    ac0f013876e0a4c830a102aa99b081dcd9887e82e8780e2e32d194285340fc117d0473ed15c0e020e46c3c404d0df4473a738c5c2103b277f6fce74906b782c3