Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 06:55

General

  • Target

    arrow.xml

  • Size

    407B

  • MD5

    307d6a9e22b99a773d19844db37d9b53

  • SHA1

    eff273c09417599dd35a4d89b48141355a85eda5

  • SHA256

    4b20ca0905f62f5f33380063a9d569286aea83fe8e6a2d8584d5c0d4b6e03f87

  • SHA512

    3cb2e0dd467bb5c4b7eb049b62c5fec2547eac119d2c3756fb225ddf2057c5b1930142714d8a4c0ddb657f3e6c06e937e6ddaa245d6a8e5ddb62e5e6554110ee

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\arrow.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3d3d24b88e5f43ca8af2f6b99b83e0b

    SHA1

    0379a6c2785abe4032945fa102b7cd20ccd96e4a

    SHA256

    4feb6e0cf54a875a53aa3a014203eed8b92cfa2229ad7be9f09309205e361814

    SHA512

    43061fd5150e3d82ab977f7cb3b26563a3348e95cb0d77928cef03e2ce744345d5be19534214e014b24f159c6945c5bd106a5ac81a1f35b57425dce4044c0e43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f789cc230808da03a3d3d636d4d7cc2d

    SHA1

    b706cb5a791f006bf5445e2f7b80fbd04a942a8b

    SHA256

    3d0f18e5c5e123723b435d453f4db3cc3f54d876805ae2439866b1d6ed725e8e

    SHA512

    b2d32f7dcd323e07d82faa05d7fcd1c984c66cecae5adac9cf8695e81db2f71758878e23153038f15e28bf4692ff62ae133ca50951781dad69a5aaa6ec4fe096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b979ec7b283a13097f57de72f92864b1

    SHA1

    2c6e4801596da8bff7699c45e5650e375fa48a5e

    SHA256

    724d379a38d4da01f8ff6bf9e45f7e7702edf6dd45aa1fee5c7158cc446b37a0

    SHA512

    09d21a9652970b20f85b778d135f917627750b61d0e36bbdb1c4befda6df4fda79662be1596e2b6c00d0939748a3b85a2dd9a73b723c657d1f4930650fc31cbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a27780756fd6cb4f064d33601003bf8

    SHA1

    bceb9b7518ee125c3ee57e476a1c792f0691d86a

    SHA256

    3c5b3042045a42c0e5514988bde351d4660cf792d3ea23d69ae2455ad2398c90

    SHA512

    fe4ac4490fd20a2c600c911ef721ea560f171059fddaadae5d4d6b59dfb15892222cc00ad320c79190c9d48c32cf75e68d151fbc21cfa1365692b4349b76a95f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af9f4f6f49d39b268741a15c49021e09

    SHA1

    b65e2cfb74b54573b62325d1754984d5075f6d9e

    SHA256

    69d49d87efa835e749322f3613b75c2c9b5b1c58a7d9848ec86d83e2c0a07fb6

    SHA512

    09235b9391bb1d393ce2f1ab64e51da32dfb0c0238188530600ca5ae4ff9b1e8e7b5b25e9c34e61469820f793c431744561f1db5910601c348bde062f16a4685

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3ca59b1e07c1688c3da97f8062873e7

    SHA1

    ce6edc9d366b19e4576416557f43dec0601e5842

    SHA256

    748e121e9f84db988a4646fc8e1f084eb5fcc65b6454eea87a3bcc7b4df7d1a4

    SHA512

    bfa0a4e3cadd3aa96887cfc55ed381fe3f227c6ec1f185ba5fe6661778828691d32846c67c75943bdee76d8339905280099ba4b16fdac8ee6a75a9a2c42f07a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f3caa28986407f827aab742bb7bb0db

    SHA1

    039f0bbbb44b8d4fbdb04e4a1a41e7a7f1fdf463

    SHA256

    359e20b0ae63809889b91be3eac84df3c4e4ceaa4df4ab715f9341f34494ba73

    SHA512

    b488ae9bde6a9f1565fe8859cd09d448ed42dd9b1764e61f8df2179cad71a765ecdf972510aa0e6ad447791daccb17ac224f6bcbd222f8046c542f037d0fba02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf7acc52687b5c4e510b71bb890986ee

    SHA1

    110faa152278dd90bd22f17749b6fdd102b2cb85

    SHA256

    6101b2b6935a4314cbdf6e24c127d535fa2554eb40ed99d8c4698176762bacca

    SHA512

    a77bc46366fd8bc65f9f98580254417ac7affe0f959031908b0fba9ef519b476eb157e9c648eb6a212ae16d3f61160ad7b7d39d180c77d141373fbc6ccdf797a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M90WC9I6\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab5812.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar58C1.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SUO8IJ4T.txt

    Filesize

    606B

    MD5

    55bfa772b263006c454f4db7f1653277

    SHA1

    d3c9f59f13df6be8e93b4979686ba3cd749fcfc7

    SHA256

    5929a9ac7d596400fb1aa922014535cf83f8272538e5d631591c7aebda736e59

    SHA512

    e33b214a0312d6b2698997a977076f582b30a21962e04b81153e0848c9fb44746ecff87bc0ba8fcde5cb6cef3beac0833d48cbebb53332f1ffa2650949063754