Analysis

  • max time kernel
    94s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2023 15:18

General

  • Target

    SOUTHLAND TECHNOLOGY INC - Account Statement.xlsx

  • Size

    322KB

  • MD5

    f9dca8e579291b07cb6ad6caf4a99012

  • SHA1

    8fcd59130e8cb396b28457f7518e00637e6a44de

  • SHA256

    e10dccf77e6d9aaa8d1b623031aeae2ed2d99876df5789f49de32ca311c4a474

  • SHA512

    5cd99cce0866b9be5c384a4eff3e4eb599befdb747bed6f57501a3befff887cc55e6ab11e756f4fdd7a381761a0b1537e6c8f8bb663044cda1357debebb99d28

  • SSDEEP

    6144:dCFwhnUiCDVK0V5AEB30+pZLLJQ37Xro6WXCZkSpGfiylngHtnmp7a023vnk:lVv4KsBk+pZLLEbZNpGfCHtD023vnk

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\SOUTHLAND TECHNOLOGY INC - Account Statement.xlsx"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://sites.google.com/web-office365-online.com/ssamd?usp=sharing
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    f98460a7f42d95c75d0e2c4331d33b22

    SHA1

    5c88a5dc1af8293abc438bdb4c1e7dec56ac6f0c

    SHA256

    eb589bc86051a9e0c0910b7741d73ffcec184d61b989d521e22e7e12ef9ab886

    SHA512

    02b1c94e25bb1dad21b0b090a8a400a2bef58f273150ba15c640dc17e1d4d84082bd26d83dc6297f2e16e4a747def262a838c5478624246897e9ab0553b2178b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_0000B55B07F557912D5F544EE3812859

    Filesize

    472B

    MD5

    666a57a6f86b37884e40d9443602d3a3

    SHA1

    e77f23f74fd9689ac7a691018a4d1032c1228df3

    SHA256

    e21eb6c697e2acfa15884166d8a0d084aaae2299ca22d22aef67e08196268e12

    SHA512

    d82cdc29eeab08fa4907c4f2543f42e60c812ecb9843151e6f6a2a4add924fad11cb820c540dce341cfce0299a2a44fca52267e33cb95f59ea88d864beb7e79e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    aa62f8ce77e072c8160c71b5df3099b0

    SHA1

    06b8c07db93694a3fe73a4276283fabb0e20ac38

    SHA256

    3eb4927c4d9097dc924fcde21b56d01d5d1ef61b7d22bfb6786e3b546b33e176

    SHA512

    71724e837286c5f0eb2ee4ad01ac0304d4c7597bb2d46169c342821b0da04d8597491bd27ef80e817bc77031cd29d2182ccc82ef8ea3860696875f89427c8e0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    d880cfd9efc27c57fa1c980caf940388

    SHA1

    8fc7e6fcf4a484236613f2a6898ca3f42bcd3212

    SHA256

    be69c40e1db72905a416e23c984eab165c05fc931fd6ff4d1bdff5e966a12ba9

    SHA512

    7bd2355cd4e2a79b8a02310824b0a9bd45bdf8959050a8332b4b3713df8df66dc7965ee7a4a01050b9d039afc9c52a23e3009c7d4ee9aaeec9008c7e3fa77a79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_0000B55B07F557912D5F544EE3812859

    Filesize

    406B

    MD5

    16ba4460cf52a6214fcf641f0de11de0

    SHA1

    a1e478b85041c3593c75778a6ecd82278b97cf8e

    SHA256

    ccaa3e53fc469a2455ed7fcaebeea386ae7aed4484f8d8c38143b097482034ba

    SHA512

    52c11a60187f068f9fb18f684a90180511aefbba224dec28238b3929bb919b094e1e741cf0919ccb68be19d0b8f41be973dc1662a177947456c9feede652cb86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d308224aca4d15375b26bb36238b1dec

    SHA1

    99d3c4e6280268376cf74001e6515d63acd1221e

    SHA256

    9d7d03b1e2ca3a538492eba4bf9b9b7a0fe5117a0b2241483b7371d4294f4c7c

    SHA512

    6caddeaf47fd54c37e2098d0f4ffc99d451c82aaf916305ef5caf0f70f8bc796c73574605a03570c6954158dfda334012c83d914723cbedb72a656d049a51403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81541d0953a3f227ff6d92426fb73908

    SHA1

    1f9db1ec12f74689307e9397496abb9d16fa4545

    SHA256

    564f1f7c27905120b59b5edbbc576d94c026c79385282ccceb0f0ca9c8006692

    SHA512

    4fd413fa07d3fd9672fda996ae4ad7d9d219d14779c53c6d03eef88becc26f2cba90683d937c4f2dd210670f873e1bf335a65e5bfc3071733ef33378ca2cd9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f70a9c8c5a6039ade4d1db4c09a7752

    SHA1

    f38a422cbf132a35e9f1a38d224bf8fd922f53d8

    SHA256

    da80d98d08bf790e1f1c41f2c4072e06df2bc699f5aeed91f830b68ab372590d

    SHA512

    d44ee84952b58b2a4ce9a87b7f6a346e79028bc9cbde4fc329383d863fa3593a11a078e3cb997acd35335ededee99fa44895a88e79e9dbdfa3ba3c8a3cf9433a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce7bcb2ea78f972169690fb5f2864a81

    SHA1

    0c64915c50c8c9d70dee1ffbfbf542eb08c832c4

    SHA256

    3b629c0105f2b8151c6bef10c26e21d2d8800c8d3f56183874bb0e2bcd1f887f

    SHA512

    44d83be37d01be66b05984ec04295f6e325f221669b058f02b81335fdce3661511a08eb6f787f0ab3f18eeccb0ddbe0d26dd9bb74daf5e427863b56a67c531c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1ba0ba00827e3b698b47b213f5daa53

    SHA1

    16cda7837003786cde06e285a28425b31ec794e4

    SHA256

    d4a968286662440ba4a27340afef067961209656c5933c94d9b6615110118076

    SHA512

    f30c29c3da4256718526f35856fa0a1fe53e5067831c0ccffcff8fd1f5d3fef0a327cc4244c0a04c86b1a81754731298cf44ab62bf73724041eb20be8f495c16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0428065d4f7f5da76eb3569dc4b2101

    SHA1

    c3d315a1aa09237841040c7f04c77b8874c5a74a

    SHA256

    9e021120f6b910941848958743d8ec9c43b7344de49e61b1751a7aa4c823265b

    SHA512

    477c556c29e54c472c99f5fe0d4cc54590f5fb02dc0a167dbbbc64bbe678d3f58e1bc32b43d7b29862944a2eb4bc096dae680c525ac7e8983c6864601bd933b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0cb23c8bd3c25025bed43b0f2ca2abce

    SHA1

    01c60e4b6b26ac7e780321605862068605486d9e

    SHA256

    ab4340579e9f4aaad2d1b2da15406464c75a8e0e3c1ccae2a32ab6ad47789ba7

    SHA512

    eccf43ed27bdf2147e14f5e9bd079cc81a5c06b2bf43dfc01d1f73c6ffc19fe000268163e894e35e4f42afdf746ff7a6163da010dc55986fe708d613bfc18484

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5cb9165e5fbe177b7a8dca2f324a1b2

    SHA1

    baebb2cd60b2717ae598ca8532818e55d36dd4e8

    SHA256

    4082ab1c425aa9efb0441256fb98227539eb156b559c9b1f29895bf83416bc04

    SHA512

    9688009a0289a93e3c1309318a3942b4421b518dc649b7b9e6eb75f78ac7bcebe683531d3e60db6438d9b4105b25a729cdf0082ad0d1ab73a078964719bde7a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d04de69957dbe1befd51344c9f6c7bf0

    SHA1

    cbf530901dc1cd3c498769be72b35f2a5824ab7d

    SHA256

    def692f851725dd5e062f23bf519ec729cfa6592bfb479a8daa1abf447b5c35c

    SHA512

    86377cea7d75a8653ba1f1d698b0dcab8c500b101bd4ebd05ca5d9cad1763786247b898755d5cb6aa4232d482321ca3364d5bb6aedd09decf4efbc61790015f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8808f2cd8df5bcefac0335f3705b63c

    SHA1

    cfc593ea90ffaec6c407075d78fe81480e0aeef9

    SHA256

    61b1c4721f1d44a9ffa707c37c40763c243fc9f3d95a7fb18cc5c84e3cb78d1b

    SHA512

    a42a38511892bee8c1d59f532cccad819d1757c6c359615e1f5ae2274818ee9a9fdafa3869ee8c9ca00080d50791ff2947f937cd8608fc304da5787e6f7a50e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0db311c20de8d05fc3aca6fa85e19bce

    SHA1

    858e27bcb369de52c730e2e0874a5e9b0b179a77

    SHA256

    66db0b7242be7edbf3ff03b17591a406ee1061d93cdfa16ad241ac8d993693d9

    SHA512

    2aecd58abfe737b6b623e36a7197131a1d0f7e86d4a5631c57583a67219438525008a1c5b3529a202c6dc32062a234793f32a6c3a4065e0558d3dcfde37a7b2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5207cc4f71c6f795cc4c75fa384508fe

    SHA1

    1415334bc135ff83eb1d9e47e7aaf7cf1bb2a93c

    SHA256

    c290ffc9f030000a3d0b73000f5f788f82ffb8413aeb66806ef64aaa6860ba3a

    SHA512

    83e9cc474a9f13c4be53c2100c7c962788f150cae80b24baa2988a95f669416ea4c408a2d86bee173d8bef8dd51891c56c7c82f613b91957b3abfa04564a0710

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2c99170656c20d136d484099f0dd8eb

    SHA1

    9118b113e0ef628f4692b7a321f6ef75fa8eec4a

    SHA256

    275272d8c16576291b8e020dfd87b518b4e517cab1b5e7066843bd3ad983a54a

    SHA512

    f9054467d1e75d5d97ba4dff0729107372b752aa4032bb3b94981cd71a999c4e05b40b77c1a264a2f9d21e4ff178ab5bdb592cb13dc8d6f60deb3a19cac39672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    b928db09c19fe891c22f5fa2b4af1e6f

    SHA1

    a377494151a074b9d99d7975a83a737b42b6c5d8

    SHA256

    6d043c16042c903d956314e07c76f660f632f01978d07f46d9b89aeeaff16d70

    SHA512

    e215e6711b90fcdbec9dc2f90ff929138c3274b4b8674964077da729a2cd6d4ac77167ca8321b5b39c6052cdad28df79893e50843acd14608244a09f546cac95

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\fs86f0n\imagestore.dat

    Filesize

    5KB

    MD5

    5244b96b0c090ec6aa2071deba9c9ad9

    SHA1

    9a9470fdf786a213553f477913a595cca21153e3

    SHA256

    e0fb036245c0240448547b4f749d37706cb7d5b28e38ffffd76875088a378929

    SHA512

    08dff230f07631e526a3b60b89af7ff50b917ebef5dd3284188311318468993ba3409905aa58ce6cb768d518c66a840c47826f96cadfd2cdc969277789a4a7ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9K0T9F9G\cb=gapi[1].js

    Filesize

    55KB

    MD5

    fb7f5db104bd33f097b226607ce46aff

    SHA1

    bdf5e95f8bbed4bf59a84eac0b439879c53c6173

    SHA256

    fd3867b08c85925c2cf29618179bdd11eb2b3701f04f4a83ec26d86c396e731e

    SHA512

    d6e39c70b8a67c63d6f86b98d5c20bdac9b57f1634219079f3106be91ed27f32a9e3259af8e338b62704715297e4ea3e79bea722d785564f41c6e389417af16c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M90WC9I6\api[1].js

    Filesize

    17KB

    MD5

    10d07a96b0a49af79a2226e943a23561

    SHA1

    442dadb78b9717a18c396ff33d9e5beafb863595

    SHA256

    2ae319ef83098593b6130cb36e08c9c1ed74df461051e85891fddd5be3d52c80

    SHA512

    e87ad22ea5aa6625eae020155ed303d506475abd78d20ce4f2b8cc3d83d54bceed3501eb7e689527136633d7c1ac29578e2954704ad5f56569687ebb0c7ffa1e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M90WC9I6\favicon[1].ico

    Filesize

    1KB

    MD5

    ea69a3f95dd5484853d128186db7e13d

    SHA1

    5fdb5fe05108fd6e5386bbda06778af4b446dc6a

    SHA256

    8179e80bcfef62154d1ff7371a1c60bd2c6c1e71c3da2f4a8b1db518a1900ec2

    SHA512

    2169d31065059c3677d025f27a5650c1e35bf83b6d6b3d80842b0809ff67e85388cb00213a4bd3fa76f71909a21298c824b39299a3980ba3b11c0297db472610

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M90WC9I6\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab846D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9BF5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MZ99Y7WU.txt

    Filesize

    239B

    MD5

    29d10ae1d7cf45a715f3a37cabfa89ed

    SHA1

    f6d3dae8cf438b050ff27d9cdddf647669d5f61c

    SHA256

    b54ff5fcd69f3f9a853197001d224323ed079b8bb63dd13316869f32e4b0182b

    SHA512

    9ee4fb9dd77cf04280c85dafd8261796e39aacee3d52c3b6802c12b194cea89cca701ace7adf7ca3e5897c8714b3be3acad3d3a91492068ea49019af9d42db81

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XD8QO0NE.txt

    Filesize

    600B

    MD5

    cb908c823e0b15eec1fa0316a96883da

    SHA1

    a71465d6ddf2302af2820eda0742a779475d0c3f

    SHA256

    722c44cccd30cea2593420d39fbe82c0af9bfc9d901b8970ed03813251850d86

    SHA512

    85616c7921e25a12d61f5bfc346b23b06616a5b2897f9083ec80c06d3188cfe2c7425cfb05044351c0153a12e83f8aa141f090e682c053e04b968c895faadba0

  • memory/2032-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB