Analysis

  • max time kernel
    109s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2023, 12:25

General

  • Target

    About/en-US/AddRemovePrograms.xml

  • Size

    10KB

  • MD5

    dfe20a0ca8674d6eaea280c139e2688a

  • SHA1

    97027b92d40f5029ff296a9ea3105b775b50c209

  • SHA256

    c97cd236f8be2b235685d3d16632482839208604db3f550f9524eafda33b9ca9

  • SHA512

    120c45bd17045b6f3d4a9295e1888d81ffa99ed0f1d146aa2eec387c1187eef8c718179771bc0cdbe01a37a487d933f55c92f6f37954f392f007cbfaa2aec877

  • SSDEEP

    192:Eyvs59wT2mCtKNSMRdMi4LBDZDHZEzT+ygx5LDkFdzj9nWyihWhqeGzpbeEKJ28m:ZvyiCDdyTO54zj9na8hqe6pbeEK5jq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\About\en-US\AddRemovePrograms.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:700
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e974d95e247621d1a0d9b06642741251

    SHA1

    04ce5810d59ffbd7fb0a1fd4fe7f26703a80c12e

    SHA256

    3ebcd479c1887c3bba6aaa258ee5840ec2cfd0d1409e7601d9f018ca469dd86d

    SHA512

    403d536aa8db5f9fd3804a297464c456df2cdbba3a17285125129de63e0a9e2da73dcc57420ae1746580942acf8c5a56fe95f331e9bc6ca817b466e397c20797

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d715ca9767c5ea028e3687ff569ab266

    SHA1

    a11ad7d478c69bcde076f7647f395bdcca2db0fc

    SHA256

    18daf5d97689e99534455645d8a832161f2e7a6a9c22f820d54b7dd24e66d1d5

    SHA512

    8b7ad0906a13c20b3f561adc1b54811e31571c82e70e8ae8872af76d7eab51929bb2f26100f7c2c4a2085f542d23a62fd597aff7e869be4840c757fbcbe91f9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddb25c2d25601c3b93c1943a4470aac8

    SHA1

    bb5be33f650e6621e8a5f9b22491d077d058bd4f

    SHA256

    21b813738271aeba291f5d3e05e5bb33e57851d128c346cbf497401b21f913b9

    SHA512

    f413d1530051fe245af5255ad7496cba4ccb2b330f1b67451aed9d12093c7210682452b7a8f305bb09d8df16a9fa3e7a4444510f44fd14cfce6533ab4656a6d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6b11b02f135d61e170a8aed2d21c0b9

    SHA1

    76f224a207266ff1573309d1cf11d684d0124048

    SHA256

    c44f81b91e60f7a0320eedd8b7b498c52afcfc6cc4abd5d47a5237efb5503324

    SHA512

    fd0fb6134083c6a4792ca070deb158eb0d1948b594a7451fe20cd8e46a691e19be772da2543eefbf4c0d201da877ddd0fa67914ede227e5924ed3283e1dabcd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fe4c7ac40bac35908157922503be8ee

    SHA1

    dd43153376aefcb76ec7ba97ee364dd16a905fcd

    SHA256

    a37fea4b34273e20df17946b7f91c20eb5d34d9528dcab57331017a7a7de4faf

    SHA512

    604527b4434e3f7e8dfe1383a402a98715de3a3480183ee28499d976f958b61d97df89a09a1596ad1e7f1dfa1d7d8766f330f31f6b43885ec2cad1a52c24dff6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d7f673f6eac3a86c299d5f9d0265697

    SHA1

    b07ded4da7e967ddda18f0c0b48920dae3a731ab

    SHA256

    40d7710fa22bd74e86d353f39321029580eaffdd7c810026a8417cc5736b8aff

    SHA512

    e8f14e3252c2fffdcfc357a2cddfc22c8f04f74686e98aefb73d2fc79222a6763fc3f8fa8bbc652d70f518c89d88623d52e8da07b556f00c7f3be900367f0bed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4070c445ac6bdabf16b4f7c7b1b4754d

    SHA1

    4556d83ffc9e7e540ebd53c1929e37a3d62e88d4

    SHA256

    e0370d7c23885f0e9168dc8e490fbb871e6678802356def466c6bbfe4eac602b

    SHA512

    7ae50cebeb51b9c47afd0f53e662717748288054d61919e9d5253b071042604566905941e48f78ee9062cadc8d66b7713794caadd94c514eff5a78b140701bb1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9STJGIJX\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabEA51.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarEAE2.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\95RHANIU.txt

    Filesize

    608B

    MD5

    eb3365907a1e87d20a504b2258ad8a4a

    SHA1

    ccb6e54c39014043fb20855568ae87f9cecbb51a

    SHA256

    ade23b24f2c2ca4791fbdd0ca7281644f8a18ad1cd524f1417d2c72fd6f706af

    SHA512

    404d7981830386d87522e5dc8ee1e9d8f551c59be8bb515ab00abb3e93f16a5b1cac11bb29cb20b9cb54b1813efdb0c5762944c3996dd1bbf0fa91db111a5d2f