Analysis

  • max time kernel
    100s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2023, 03:15 UTC

General

  • Target

    DJConcert.xml

  • Size

    133KB

  • MD5

    953222ab6d2eb6b7de89d3b95f74ec77

  • SHA1

    f43bbdc1192337e41e60bb6d1fe025addfc2641e

  • SHA256

    25c536be4f20b49d27939981abb58280efc1d91d484c75c06a2f908ec60f2642

  • SHA512

    7e4bbfd53df4fb671ed0af1f58333e0b176555c4ff02d9a7ee1b4995df386ac1438ad16fd037837d911dd8e1c7906e892a51d1ca8b04d299065ce82033bba1de

  • SSDEEP

    384:V86ZYLySueFChASoKXACGPM2Mds6nI0+yzscdARZCfb+Je42:e6ZYL95Z3XPM2i7nI0B3ARa+Je42

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DJConcert.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1904

Network

    No results found
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    707 B
    7.6kB
    8
    11
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d626d597ef1071b0b43a279100398d8

    SHA1

    c4d04361df471fccb65ec05250a0d8228496d37c

    SHA256

    5b9faf9d30a0315390d637eb620ed2079315416d5d6d5ad7b88d8ec916ecd2d4

    SHA512

    1a0b6196255073e42b39549e52012aac0c044300711dfd1bc681ee7d57d520c5805a7416b75cbf0f2c57e7853de1bc340c1dac67a58255971cc72825cabc6e6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a5adaed4f53fa03b44941f601d55019

    SHA1

    0afa4b52ff70fa8fb52fbec00c120a73897f3291

    SHA256

    9d88780c4d1767444e8f92b6d16dbd2d21a0552a0abd934c4601ede390225c6b

    SHA512

    0e05599368f2869803d449137c383200e051941ce26e52a7f545e0dc68d28de59e6776fdc408d39ab4d55198f2d6655f0e01a503cc6239a3a8dc5421f059f5c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26e6a7db4bbda4ed72ef190a757f0e8c

    SHA1

    f506e74ed78499eca7c5763a18e6a45f5aec0686

    SHA256

    1b43931df75fb1049019297eb64cb8a6e8772dd4c122aacb4530960fd447f744

    SHA512

    5a4a8698f93148e5907fb679263a46bcd6830d1162588f8273d60a12ede079d36284cf295baf2ba5e4afa30b6cea6b64d00054f6d1e2a5965023660bfb5d33f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c539b6d55f9d636d355a4f98151109b

    SHA1

    81d052e21b292a7c7638bd204b3987d037cd7802

    SHA256

    45846f5d9bee81f4bd4efe82584aa6a4c8810aa4b49bfa997f95adf1c97e3303

    SHA512

    67277f34e82ff3ad67bbe0df256bcf5dda23c2a84da723aa2a542d5aed5ec1276e453b153fb0ac6a34853b2cb6a45a2ff396fb6b787d74d943ba532de823fc3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa14a70eeacae30763719b53b3888891

    SHA1

    b32205b993b7536186fab38fa765ce48a8487467

    SHA256

    99b7c96ba5a8c30a1b557def268ab020b1f1318a1774deaa27ce62359f996e8c

    SHA512

    354537af90e47af592129371afb59f48875dcd166985630e4d645825747f0fa40e2e4227f3340175b79ab5546a8fb73f69003324e3c66166a719d1548574b456

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b96fd63ead760d2d2d14e414d2cdf0e

    SHA1

    e709dc0b91b8506ec974ede289d2cf4496ab48e4

    SHA256

    d0621cabb4d10e34d668966e28f4fd2896e8ce127f59a0d65f3ae4c44dee27ff

    SHA512

    1eb85d887339b158b7fe803543071b2fbaf5398b64af487d9b6c9d531dd304d9b2dc5db59cad5472626f81ac90b2b40db631c34b10d59752aca5c74b6f6c52d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa81a2bcf960e374ec137cb43fcde55e

    SHA1

    91110c1bef5ff216011782b47c2cbaa4a3d1fb80

    SHA256

    694dca402a10ae0dbb9fafb57b0f685bfdc97a9800a74de258100cf4b91df260

    SHA512

    0d152cded717f13c3167a41783e8bb09dc40e212ca906f82df8ea3ae41e5b36d72e462d0727ce28da9866d1f670127dc68b0da965d0c84049a50ef1fefc600f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef1f8736f135d58c66c6c37c61cc721c

    SHA1

    8434915f4978704a0f8ab155964ab3b9b62e4ec4

    SHA256

    6e3b9c2c98acced36809e5fb6f59a1cd7ecdd9732c3578faa4eac6019bf971c7

    SHA512

    93cb0104ca06c222067623ec65bef35ba9fa5d430fc26924361833dba7ad8e8bf216b89870d60807afa3ead825ccddd19cc5da4ea39e4841abb0199235fe6df0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    796f180a6439edb511e724d7984c4353

    SHA1

    3d6d2812bde322cb24b8ee7b0355801fce04796e

    SHA256

    2f62dafa9f1a61a3ac38757fccca1a43779bb61ad8e7a4cf120fe6e2b272f2b3

    SHA512

    fbecaee9e1fd0bd53402bca7e675e59d9b825ac9de7af715f56111fec082d532649ce20dc80092584d4d36c1a49c82a4c6ad5b79edd41ddd4e4619610c57f257

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab408C.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar421A.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BBNU2GST.txt

    Filesize

    605B

    MD5

    34b6091345c382aa8ea80f15e67afabc

    SHA1

    f601b6522cbf94b5f3a5bd66b70673c342cb6cbb

    SHA256

    5682a4be6a8288dddaed600ebb2f5ba0ac1d00380c162dfb48612c11cd1ef617

    SHA512

    d0b6be3d7fa10dd0815393c88d5a349bdf9c4a84d16727c075ee433a811d865aa5f599158919cba947f7fad9da7e3d5c5de59426d13a63185127724ee8107fcf

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.