Analysis

  • max time kernel
    112s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2023, 18:57

General

  • Target

    stella_wa.xml

  • Size

    9KB

  • MD5

    4ee3c0dc45185231589902397c7a4c38

  • SHA1

    28a4882e91c2bbb68562fd9373efe43d24dce3ff

  • SHA256

    8fead4d413917d70a317375083a0cab7bcde24530fed6d9eb39de05bf14348f2

  • SHA512

    c22274e0cfe22cddc65f0d258ec623360ba34d8ddeb09a2e7c88290d949cb20f76cb6e8ba8f02c7f5ee7ef4ab551d2d61f680c1dfa0b9acb30143f76d908eec5

  • SSDEEP

    192:OCxf3sWhw3hysJPiaJfdvLZacjO/SbEgle3iVIept8CMei3ttdLx7Kx:Oa/sW63hNJPV9VZvjbj03ISpei3ttdLI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\stella_wa.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    b5fcc55cffd66f38d548e8b63206c5e6

    SHA1

    79db08ababfa33a4f644fa8fe337195b5aba44c7

    SHA256

    7730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1

    SHA512

    aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a5f12821bb9cf43b7a69b599e71f904

    SHA1

    8c45ce38291661f082a5f18e1881e033096e8776

    SHA256

    c6ab0e39d36beb2b32f1caf15e08c3ebf98e4b26b9ec4c74a54141c1bede8294

    SHA512

    b6cb222dd5c0a19d3281762bddbb18379abc459a5f0aa77e805c2abe991719d03682e4cfa90b3b10b022981091507a628345daa2aef12602cf730d31e30738dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d47b8077e7e19741f6b28428644ee332

    SHA1

    8615e43faae48a2d8708aade6fc3b175ae25335b

    SHA256

    dce36aa6f45ce6711f970d9fbcecb29fc790926d74cce22b2efdfa1a0cbeb616

    SHA512

    92391c65413000f91460e3da9665b086b83c489fb1d94ef51d4c30a124a7109cfbccb879986470dac0f4dc35bb1d6b65132472e663dd5be2d7efaaa74c215851

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d47b8077e7e19741f6b28428644ee332

    SHA1

    8615e43faae48a2d8708aade6fc3b175ae25335b

    SHA256

    dce36aa6f45ce6711f970d9fbcecb29fc790926d74cce22b2efdfa1a0cbeb616

    SHA512

    92391c65413000f91460e3da9665b086b83c489fb1d94ef51d4c30a124a7109cfbccb879986470dac0f4dc35bb1d6b65132472e663dd5be2d7efaaa74c215851

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8bda7a70925b90b80e778e47e72fd28

    SHA1

    83f8937cb796bab54082f4de58f63e718e9e6b88

    SHA256

    d2405e2f23f262a481ba65d90146b7fcb8d0d8bbbc8331eb5675a5ca3c5013ec

    SHA512

    c959740a607a97cd5e315b5bfa7a6fe8d9d9c3abdaf21bd74f34a6ec60f246f1264ed09dcb983ad8373886708ca0de13051a8d7558ce0ca392953fbbe2dfc004

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8bda7a70925b90b80e778e47e72fd28

    SHA1

    83f8937cb796bab54082f4de58f63e718e9e6b88

    SHA256

    d2405e2f23f262a481ba65d90146b7fcb8d0d8bbbc8331eb5675a5ca3c5013ec

    SHA512

    c959740a607a97cd5e315b5bfa7a6fe8d9d9c3abdaf21bd74f34a6ec60f246f1264ed09dcb983ad8373886708ca0de13051a8d7558ce0ca392953fbbe2dfc004

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83f6dd338957cc138961bd22b5ed77c3

    SHA1

    b42f46f7afe73043361e53cb0e63141672e5e2d9

    SHA256

    3893f3dbb0e53bd1ef94d5142acbd22af9bc6a23683858f1922f338657417cfb

    SHA512

    10d7f4f7f09dc9d9c2743c3836d4259b0ed4a8a6ba8c72b5519b218ec6acea20543e270a57acb8e715a297041b33d81f7e4c2c49c1a1c62092d72e0ed2a56e26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bcbf7cc55048b1d8497830d5a673fc83

    SHA1

    5a605ff5dceec7fe8e0e0a81561db59071e401fe

    SHA256

    8b9795483d3423b4bb497605435b38b6a7cd29f18e35597b1137155840bd08df

    SHA512

    9c60de0430c1bdad3a3705f86706a192e57649b397f25840274f02c3d639876dd0fbefb11b51adda7e95ba24037997f81c0825fc07b164628e1a30c1abca0cb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d87869e81e4bcdd2e2d57e3ddeabe0bb

    SHA1

    2a4034b7b377b38cc314a6d9554c11e5cd4f2110

    SHA256

    ac8dd80cee3584dea5fe47041478efe980e1aee0ae42e314f3b0fa5100061533

    SHA512

    f01adf62a8d25e97a9dd0a4c71c0e5b73fceffa4dc99fa07092b2948d14a963fca0ba2e2526afdc69105c564f1001573b56777ff29a2fa404fc62fc233439939

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EV74ZOZO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabFA97.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\TarFCE0.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YTYK50R2.txt

    Filesize

    607B

    MD5

    99da705dbb38cb3a1c49703053684906

    SHA1

    e2c35876096c674170410c4243ffc9a26c84b5df

    SHA256

    68e10e90420168605c255057944ea227b0bd13df63ccb995cdb85213fe59ce64

    SHA512

    99bb0a65256aceb26fd41040c51fb17de70195a5723a5882749076d2e627d5a19fe1f5d98441c364f3547c895facf2d89984660811e33af7ae3a3c4758c1ee93