Analysis

  • max time kernel
    105s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 01:30

General

  • Target

    FAB-blue.xml

  • Size

    1KB

  • MD5

    beeb15f69eb7675da389dd2a7d25e61b

  • SHA1

    9b175d994ff139e6079aa83e8d32cd97f9799ff2

  • SHA256

    3eaad41cf652ff44c03f0100b20dbf00d0bcac736147619fe9dc66050095a1f7

  • SHA512

    5c711726090a1b3791a62fdbd78683caefbb056a900598a67851f1e1a89f0f92ee1e8854c3875a141aa958517be720c45f1c7411089c3adf7367f2e11076d04e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FAB-blue.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:864 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9495a83b2f0a1a6086dca718275343b

    SHA1

    79690ebf6e0f2300e356c19104c58aaee99dc6d9

    SHA256

    39c34e0317a50bbc15a6099cc71f324e00f43c275a41c8ee5a364af7c960602c

    SHA512

    a1cacd4ce47e4530ece73f31b132e8b4557d36b0a298a4b64a8b50ce0956f3ffaeab09cff5e74f1b621dd714c44c3a25cd6b04399b9cf47676b9250f8aa35d05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5016b963a97ce8fea9aee3f165ed85e0

    SHA1

    619cc6c799518e545551f1ac3dfa80705fc6a2cd

    SHA256

    e365418ef4d233fee4d7de142b9b037a9bd19d4eed98de9f26a768b4f88d5744

    SHA512

    8312a182f8d05efe09e454819c9da7462cd05208fe859f58e53991a0a58a4432109f819f406721cac037c88868135617f68cedfebb6029fb62718688a5eeff0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    386411a22245970745a05a67a32e0d1b

    SHA1

    ed99233f064a046c3767456ab22ef2f27acaa7e9

    SHA256

    35aa905bd821ce31dac6d76e30310ee85b3bbcc8c58793e9f751f36751ab9050

    SHA512

    37565e8841148d16ca3ceed3542eb60274cbc52dd4a2701b08ca5304fea2c8d8a6cd8ebbfb940c81a863ba86e3f4ccb61d8e7b32a9e66e899b141e03d0a9860e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a08c9af97d1bc3f1017c60e4053d7e37

    SHA1

    cd0d8202fe7076b29b16b39ac0a918d786466fec

    SHA256

    69bee230afc926c52389da758b0d00d9f3e2b07c164f11890135c1f4fdcd05f0

    SHA512

    8c5e5faafc28af7ae692392c59fc1c973e9c4e1c80a1bb37aefa813a1fa7faccfc40ecdfe6b44a2a716167974e47bb183bf0050aa02f38938890443be167499e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2a999900a0bf8bd88760ec97d33483a

    SHA1

    c0d3afac030a08faa4bc4ec0fefd6baf1890469a

    SHA256

    1760c323cf970dc32a4cd36a6744cd40edbc3d228c147f0d06464b7efb7462ac

    SHA512

    d9152faf95396315ff280f04bc196cdcb3093870dd5337a6c0fe1650cfa1b9ba4a0aa83c8e459c4807ad3beaca1cb851db61be6e17382229938f6d016b884721

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79d86c72841ee58d23925fd382139e70

    SHA1

    df3c751a2d51304a374c1cdab58699e83343729f

    SHA256

    c061383119fd9171842a75b53e5ecdfb3b2291f7ce8654eeae88dd661b29372d

    SHA512

    0297953ca1c6035ed3857004f5c12fa8120bbe431809d102b8e467d30e5cbdd2912ee73ccc2f30735c221f8bceaec75c38a5890a667d67539760f2144855f516

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77204fa99e9b0ec3081972e237e3c834

    SHA1

    b771154540f89413f8460372c5970c9324659215

    SHA256

    365ed2b1e9896433b409d24796cc7e55f7fb8bfcfbc4894a61f8c8ccdc4862b3

    SHA512

    2c22f84c7f9c00e11a51ffc5a5ce0fa0056db3035388211881e8f97add5d0cc4a6c035d41043b9a49ecd7719557ddbb6cd358095e90e2e4cc7e9701b81cc1936

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RPQI3YTS\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabCB9D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarCC4B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8XXPO1RZ.txt

    Filesize

    606B

    MD5

    613ef013a9c58e12c67c8275c27fe46f

    SHA1

    3156953da644edb16c7169869f1b1408ea3d45bc

    SHA256

    8fcae465655e267782f86f822294c98dc3e486f0bc501017717310759aa3f0cc

    SHA512

    167b325e42ccd707953d41a55f60e62c953e4bf9eede216e4043b642dc00b34821da8fb705e64da5a28d38fda2733da00a6889c603f813c1e385404a23d311a1