Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2023 15:19

General

  • Target

    machine.xml

  • Size

    33KB

  • MD5

    0869544722561f5aff0eefc83fc7b001

  • SHA1

    1e118f4b5c1c6a7b1858e3fccb1b1d1095561976

  • SHA256

    ef9b9387168fd1dd6c996f96c134d9c44f8eb06f9587004bf997252a520182d6

  • SHA512

    ced7c9a5363cabdb87b01ed6b4ca190a690640dddf5cbcc0438acdc611a8ee942cb6cd73c78d3fc2d59f70171f22ac832a10b1e23758dc92599ee24acd978ac2

  • SSDEEP

    384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuh:dkn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\machine.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09a96e0d000fab7368411a93228d4dec

    SHA1

    9b981bfd6cf9f3e3010fed9e5ee676ff1cc6d0a2

    SHA256

    6f5867798d4ad2b9854423f102f3d2b82ffb5eeb350306375f9d7427220452e4

    SHA512

    89fbb8bfd82db5e233f5d999b2864add7a81a3af1380851c1aa0804984f2e05f6b6900cf855e87e3cf51ef2e00fdcf7a27075a550cca973f64072783868bc15e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba0476b32b6aaadba4b93acad2c3ce1a

    SHA1

    6dd7042bfb2cf0d126116e456bde929c5d041916

    SHA256

    049976a7f7225aa23515086b5bff6d93a4aae7e8634c6da81413e317bb9f5002

    SHA512

    3a07833e3eeebe20234638a92eec01387bb8a32348dc636c44561c994bd61938c174337a84c888d40d3cd6c37e21ed9f79cffafe1e4a9b7c74445052c8f43dc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac0df73acbc360753f0c753ad71698ba

    SHA1

    22288bab193ebfa4494d804311a497809f321da1

    SHA256

    034740020f31bb93e23e531e82ebda14ab0862a944a6f2576fdfa4139c6228b7

    SHA512

    8ad552f6a54011c93ed4e31e2d9a74ae41762ad07b23e75621c52437ae016fd10f16fc02b1d59a7170c8427a0e70018c70bcff037fcaec27580f506e9d144d69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3223a4953ab123a114bef124a00959ed

    SHA1

    2392ba65324b30c3f6d943da1e426350d31dd935

    SHA256

    ccb4300a33da2b23ff4ff380f3329bad9a8081bf794eb0cd9bbf914a4d0cd436

    SHA512

    122354f5876be071f5def4f798b58a5910b8ef61e0385c9f9ecf7edaf5b7145fb08b951957171cb3e68a4b077f3a244ec9e682e01588ef9b35a06c55f475d7ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5d5a96bf68ddeb03d3892134ed89280

    SHA1

    4d85e7606e980eb5eda5f2429d06ff3023e3fd9d

    SHA256

    9215670e87ab995ec19fea5ea8a1f5bd720551f0f04c295de8dad28042880b9a

    SHA512

    e81a0a0dd7305ac29b8ab87c70cccc2160c83ec3516f23c87a0c8325204ecfa84c8b23f0d509e17691a4c15390a62d0f2e044178da62e0e46b04ff8717c7a61a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ec5b7038376fdd8d72f088c053130eb

    SHA1

    af62adb3a4725cdcd568a654db9317721b7b4b51

    SHA256

    0b9f894dd2106f167b2b69d3dd70d91aab4fece9d2f0640d7ea8a38de7f078cf

    SHA512

    cfdfa16088af21f4dd5fffd186d407827702100249ce868347cd8cdc0aed66badacd93aa6733fc6ee6404e33c8148dedc6edd0d3cecb19f15b1a6d7a8f776b65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d6b6be15290363d5b9c4ab34734f7b1

    SHA1

    4e571e60ff611d4ebe267d84f060cb42e7bfdfbe

    SHA256

    2c6a49f3173aff9eeac94e4f33f1673d923fe454b1f6c1a14fe4afc6a07aaf74

    SHA512

    a4f26cea8c8954e6c57b0ec58e44236dd54eef08902326504425c3af7edbfd84c3fe1a55ccf08be106342785fa933420a72912e648aaf9ec6a494922a46a6546

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZT1SZ958\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab7D3E.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar7F16.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G24OW77F.txt

    Filesize

    604B

    MD5

    89e2fa5bf245925d033f60b1d5902620

    SHA1

    3520c975b24b80a1805b2514e2da035cb2d48d60

    SHA256

    4010562c49f96ed676d918ecf6214e7eb725ea1e282c2df335f89fdd68d98af9

    SHA512

    aec71b16206803e04993135d4c61520db29ae1937773bd6f1f4393016ec7cf3448e28780cf8c52213c757cfe0585d4c37f1cbb2554778fcdf54ec09cfe7f4f49