Analysis

  • max time kernel
    215s
  • max time network
    519s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2023, 12:25

General

  • Target

    App Settings/WinCal.xml

  • Size

    1KB

  • MD5

    bede56a7aef6b3db49ab7d2eb3f2870a

  • SHA1

    bc18289b953a8ac6c0c8e519f72e6adee933ff98

  • SHA256

    1fc29fc668043aa03ffeb2d61868d3369479c3cef2c4725d162cf5344dcbdcfa

  • SHA512

    2bde0a5f1983b08379c262f86aadf8635834674981faf7feb3ebc39b12ece95b21203be82fde2fe88f6a662836374a7ac3d6fb8057d5273923259b3af206a3a6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\App Settings\WinCal.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29a94823005bff50689d183ee9b1a424

    SHA1

    6331772148414c2c14c9ae186622f320b6e2e9db

    SHA256

    52b58ea9424290679c123ab32111c76a15898a99527eeeea9ea2ff425bfcc6a5

    SHA512

    06f190d924322126f0b63dca9a24b05b7e855b01ab987ed0e03508ff3c82cecd4b3e72e86a9958883a7a5b637b68957b5bb9438fa26e2a0e44112691d3d88e34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d27431363f3812931d9afef197823de8

    SHA1

    2d7c77ecb4ff7706553dea38b588e6991d16a765

    SHA256

    39ea6ee06a683cc5bed8d39ea8379c4e2d21a4563aeab94bb7d405c4bc270661

    SHA512

    1f8786021558c583c3f7c40bb3ddd0cd512752259c7df1b27f72295e1b1acaa1251bd2225b825ace7c75eaa88f3d8dc551fdbd05b2cf89ed445d180f48461203

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    090eb6688d1375c78ee29ded1543212d

    SHA1

    48e1033d32d55b4598006ff873811b354ffb361c

    SHA256

    726ebc1398cc2eb593537bf14014e939f15eedb9d570b416238c2a1bdd4b191a

    SHA512

    660357d6ba151c73109403ad893374070ee360578deeea14ab4d7096fe7a09b10fb04759fe83f18378df2821b6983a20bcfefdf35f9f4c158df3b63137706ae8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54ce3c4e93381a8bf62e6320981b1f1f

    SHA1

    2d017f1a986b5f9702b46024582c8124c632ad33

    SHA256

    ca6ac51d0bf2c89d248c519eca8235ce0428b33935799a3232a0eb004c6c79f2

    SHA512

    c0874eab3e7cc32536adb11143364d4cf3defda1245cc11b5197a7fcfda8794577be28a8cf06d08e995e6222ad8e1a3c5191c941cfc91bdcda6df91dfec5cc28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f1517ae5448ca1c28b4a60cac415f78

    SHA1

    6106dd71a48d478431eeffd7f39e69d678330d76

    SHA256

    ba84bfbbe1a04dc175f5323ca45d0151d3e40f832746e5f862b650b636d9800f

    SHA512

    01e3ae13bbcff4e4fff30a2944339ad87338cd330aedada9b06bdddb941f0469f8310d11fe763bd78db428520a7b5fb6b834a039f3fa84d8058d23edd10ddbb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c59ccfda6ff7094c087e3ab71555b59a

    SHA1

    85190605bf509c7542927a65bfd29c594ad28055

    SHA256

    80bc8157a43f613f6b1852b2d502d926333eca225a5d1e475a8dc90ebc64efd2

    SHA512

    90a2147bf5bc601ef46a8d8f201a863f07fc4b311931ce69b8580dbb77ac9fca858ea54dbc94b4c20f021c1d05eccc92609e9ba0b6bd5843c301f4a22902d40f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9052f018dc832f833a0e3928ce2cf63e

    SHA1

    8e9222265190c965e2d3b27566e7fe88dedd6aba

    SHA256

    e84dbb34eff31a1681f01de24b4b28ef8ec15776bd058b6c6e7754d8ea888e00

    SHA512

    99c31a8b8c03939e4e0d01f8b410346c83595487e8db703dfbf00a926949d248dc23ac5e3abc18b1d8c9230cb0bbf9fed4ee0bfc5403f74309db1303cd491e37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    790ad4d56714447948f593a3204f8f69

    SHA1

    2444d63c6751f36d0df017c29f0cf51cc7f37885

    SHA256

    3f5f8e8d9a97307f1825f4122be726c32b1ce312cdbdb18930cedf9d01b70a9c

    SHA512

    f676f2e76c87fc821061097d19a5209b4685b74ecc082be3a215f6e96372a3c2878467f9834f7634a8d3225c88a50a36a50498368db7a9c3d1d111274f3b7a17

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0ZGWADP\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabBC40.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarCA68.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DHMNGTMK.txt

    Filesize

    601B

    MD5

    6d62e1ba3627c982d13c5ff610f0c0e4

    SHA1

    37441906da61a7e8cec68c27705fdeaac7bff350

    SHA256

    b69a7283470b625cdd90d25ce08e7938ca05bcb6293536500789a23a43cb0232

    SHA512

    4e22789f65547d9ee5fc049b10dfdfd63218e612fa9c66f7598cf31b01bfb1003c27ac13b9c7a3fc154d8b95a91044a99139ff85e8ead87d0a1e13e379506210