Analysis

  • max time kernel
    100s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2023 03:15

General

  • Target

    DJConcert.xml

  • Size

    133KB

  • MD5

    953222ab6d2eb6b7de89d3b95f74ec77

  • SHA1

    f43bbdc1192337e41e60bb6d1fe025addfc2641e

  • SHA256

    25c536be4f20b49d27939981abb58280efc1d91d484c75c06a2f908ec60f2642

  • SHA512

    7e4bbfd53df4fb671ed0af1f58333e0b176555c4ff02d9a7ee1b4995df386ac1438ad16fd037837d911dd8e1c7906e892a51d1ca8b04d299065ce82033bba1de

  • SSDEEP

    384:V86ZYLySueFChASoKXACGPM2Mds6nI0+yzscdARZCfb+Je42:e6ZYL95Z3XPM2i7nI0B3ARa+Je42

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DJConcert.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d626d597ef1071b0b43a279100398d8

    SHA1

    c4d04361df471fccb65ec05250a0d8228496d37c

    SHA256

    5b9faf9d30a0315390d637eb620ed2079315416d5d6d5ad7b88d8ec916ecd2d4

    SHA512

    1a0b6196255073e42b39549e52012aac0c044300711dfd1bc681ee7d57d520c5805a7416b75cbf0f2c57e7853de1bc340c1dac67a58255971cc72825cabc6e6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a5adaed4f53fa03b44941f601d55019

    SHA1

    0afa4b52ff70fa8fb52fbec00c120a73897f3291

    SHA256

    9d88780c4d1767444e8f92b6d16dbd2d21a0552a0abd934c4601ede390225c6b

    SHA512

    0e05599368f2869803d449137c383200e051941ce26e52a7f545e0dc68d28de59e6776fdc408d39ab4d55198f2d6655f0e01a503cc6239a3a8dc5421f059f5c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26e6a7db4bbda4ed72ef190a757f0e8c

    SHA1

    f506e74ed78499eca7c5763a18e6a45f5aec0686

    SHA256

    1b43931df75fb1049019297eb64cb8a6e8772dd4c122aacb4530960fd447f744

    SHA512

    5a4a8698f93148e5907fb679263a46bcd6830d1162588f8273d60a12ede079d36284cf295baf2ba5e4afa30b6cea6b64d00054f6d1e2a5965023660bfb5d33f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c539b6d55f9d636d355a4f98151109b

    SHA1

    81d052e21b292a7c7638bd204b3987d037cd7802

    SHA256

    45846f5d9bee81f4bd4efe82584aa6a4c8810aa4b49bfa997f95adf1c97e3303

    SHA512

    67277f34e82ff3ad67bbe0df256bcf5dda23c2a84da723aa2a542d5aed5ec1276e453b153fb0ac6a34853b2cb6a45a2ff396fb6b787d74d943ba532de823fc3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa14a70eeacae30763719b53b3888891

    SHA1

    b32205b993b7536186fab38fa765ce48a8487467

    SHA256

    99b7c96ba5a8c30a1b557def268ab020b1f1318a1774deaa27ce62359f996e8c

    SHA512

    354537af90e47af592129371afb59f48875dcd166985630e4d645825747f0fa40e2e4227f3340175b79ab5546a8fb73f69003324e3c66166a719d1548574b456

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b96fd63ead760d2d2d14e414d2cdf0e

    SHA1

    e709dc0b91b8506ec974ede289d2cf4496ab48e4

    SHA256

    d0621cabb4d10e34d668966e28f4fd2896e8ce127f59a0d65f3ae4c44dee27ff

    SHA512

    1eb85d887339b158b7fe803543071b2fbaf5398b64af487d9b6c9d531dd304d9b2dc5db59cad5472626f81ac90b2b40db631c34b10d59752aca5c74b6f6c52d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa81a2bcf960e374ec137cb43fcde55e

    SHA1

    91110c1bef5ff216011782b47c2cbaa4a3d1fb80

    SHA256

    694dca402a10ae0dbb9fafb57b0f685bfdc97a9800a74de258100cf4b91df260

    SHA512

    0d152cded717f13c3167a41783e8bb09dc40e212ca906f82df8ea3ae41e5b36d72e462d0727ce28da9866d1f670127dc68b0da965d0c84049a50ef1fefc600f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef1f8736f135d58c66c6c37c61cc721c

    SHA1

    8434915f4978704a0f8ab155964ab3b9b62e4ec4

    SHA256

    6e3b9c2c98acced36809e5fb6f59a1cd7ecdd9732c3578faa4eac6019bf971c7

    SHA512

    93cb0104ca06c222067623ec65bef35ba9fa5d430fc26924361833dba7ad8e8bf216b89870d60807afa3ead825ccddd19cc5da4ea39e4841abb0199235fe6df0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    796f180a6439edb511e724d7984c4353

    SHA1

    3d6d2812bde322cb24b8ee7b0355801fce04796e

    SHA256

    2f62dafa9f1a61a3ac38757fccca1a43779bb61ad8e7a4cf120fe6e2b272f2b3

    SHA512

    fbecaee9e1fd0bd53402bca7e675e59d9b825ac9de7af715f56111fec082d532649ce20dc80092584d4d36c1a49c82a4c6ad5b79edd41ddd4e4619610c57f257

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab408C.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar421A.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BBNU2GST.txt

    Filesize

    605B

    MD5

    34b6091345c382aa8ea80f15e67afabc

    SHA1

    f601b6522cbf94b5f3a5bd66b70673c342cb6cbb

    SHA256

    5682a4be6a8288dddaed600ebb2f5ba0ac1d00380c162dfb48612c11cd1ef617

    SHA512

    d0b6be3d7fa10dd0815393c88d5a349bdf9c4a84d16727c075ee433a811d865aa5f599158919cba947f7fad9da7e3d5c5de59426d13a63185127724ee8107fcf