Analysis

  • max time kernel
    108s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 06:55

General

  • Target

    FAB2.xml

  • Size

    1KB

  • MD5

    a5024fe1b8259adff02d901bf33dbcf4

  • SHA1

    bc45a9613897ba56d1784045fc7bd8f575602348

  • SHA256

    61093297596e0335d5f4ed34807ad214dbdbe1c15d08cb51c7777707dc66f5b2

  • SHA512

    ea60da36d50118171c78d99dfdb955b4925c13221b45e755c2542bf9e0a60c355fb8e0f6c0a7189ea74c2d1630cb3c0532cec390cc62ca0254dc5e70ecbf227a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FAB2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:268 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59cec5be3efedc117a0f47b7986698af

    SHA1

    5f3230fd7ed080e790e9c31bf586e647d07a5778

    SHA256

    89e6d7b060f6bc95f2a65cb47ea78b3e988fbe434311c5f1ee04e7c3214a3f40

    SHA512

    d994bcb8e897ecc21cec5b23e98e329559784465d1f57ae8dbfb50f3b48e1213726569e63434169d61ac31e512069ec102c6dc9ff59222170ad846dfdfa5edd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4daaea431c63c9e3754455f445ef4e5

    SHA1

    6c6ea33ecef04523d7332b5ac7837629a51106d3

    SHA256

    eef5a0692a39dd3023d1b78b348037c08f863623ac9f4fdb6e4625838d01f5a2

    SHA512

    c927b6fe8177503275dc72a0ab30193e300eeae121c6c3940b6524e22ee27e257af914d49cc546e6a69bf15c925a161f522f3b3445964e977632b8574151feff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    015e2a257dbb3452db2a1a7d53d6065b

    SHA1

    174eaeb30e912704d9aa9c7ef2237a442f172847

    SHA256

    39818aa5b212680c8fdd1a925dc96240fb58dddf9cd13bf59cefd24ec16cf15a

    SHA512

    c60731a772960db274416c6578925b23867f51b1657935d86418ef039bda6cf5b8c87d2d0fd0a034259f3a26c8367f9475def4c7a68b0b524777b12f75ededba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8917fc88fd0e98670c0debd40c574e8a

    SHA1

    8cf9ca6139a95c941552dc8a6afcaf1c079cba72

    SHA256

    62107a44311bfa1204490b617bd7917138edd670596c5ecc05ec94e500fe14b1

    SHA512

    4dbf10b5485fcb4492574dddd45ae3e2f4f5ca44427f8beb35ec411fdaf7884a1f416fad005311e8ee65da29c10b51ded1769107b3daf3183597859d2a08cb92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51b36f473a342dd50a09a65118ae296c

    SHA1

    f438d065b29c6f289de4347c0b05db375b3f52f1

    SHA256

    2be9f2fa6af25e9ada1d4cb6b478eee160b1dc547470ff0541ab501321c7beb2

    SHA512

    c2346692a6151f22b52fbeb7dcac180dce24559e8c4d3b1087c69b7be088ddb69d2025a533369b820282a42819c50f9961535182e398a8afa26ba68d53c0f850

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8a78034b31121e801260da4f6faa439

    SHA1

    99956a1fbae2cf538c59ae315477d007ba5591bd

    SHA256

    c542cc1758ab506070993ca5924bac0fd0ddef2a1744b21ca649c4f1f5df20d9

    SHA512

    ee4447ab7df4339e6fb6092f402c4eba988923448cd46151fc1123d1ec69dd6cd5c447e6b216a291ac92e52f9f7aa675ffb188ed310b3ea724242f00da9c063b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fee099702f9542351fc943f09f7528f

    SHA1

    b35e997b78f5995a0f8c62e1c9c494a714383f04

    SHA256

    a77a9122b4c55d17a4b0fc0dc43810b8242d5ad3b60950c67c300c8ac9fc1395

    SHA512

    42d15d6a4847421dee1d00f9d5f960055340b96ceb6ca5688da9b99b11b69b63783fddee258f681bd33d288c84014f0ef45618dff25e1e60ef16424795ad63ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a1740c89038a38aebed743d75821daf

    SHA1

    58099d8ea7b5db0f8c0165e9527f0e3b4be46707

    SHA256

    371b4097ee9f7f36f2781c55426570a8a4eee5e5b223975efb91b330c074fc3e

    SHA512

    1f227b928d6637ca30e7c91039b3cb1be00b43e40a4413afa35871d16e0ca495de6dab79931b1c98c3aef970382a5b617b103d3149390c267d6da3859be518fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fb99777482e1bc3dfca6ca4a51cd667

    SHA1

    9a3d59b4c12ae4bdb0b93ca32554f6b65f35c303

    SHA256

    beb3d02a73b5a72c9bf3ee433a152c0766ab509474859aa093eae751794a4fa7

    SHA512

    7aaa92e4d0e7712b92d76dcc3943ebaa386421032bfa21cc3dbf77cdd727c00cee771fb1cf1219152d1a05a69fd61844220958a5517e78eea8a0898c275fe28b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\134K02XQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab64AE.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar683C.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J168CU5T.txt

    Filesize

    606B

    MD5

    061e2313c042ba6f59e1554326fb1e5c

    SHA1

    8fdc9a6692b59a02375b4a1e31d806adf8e3a666

    SHA256

    0ae692e444c3231c84b8ed46fb3edf90d7d59d0c82c80d6dbd9b3d44ecd72cbf

    SHA512

    d9021d28c08b0726a0e826193ab71dedb6ed0d56c723caba8608266e244f8137b3ebe440dc280b14f79d5e6371b2e77a567f65106b6f1a4949b9009301d73830