Resubmissions

06-07-2023 18:35

230706-w8fqlsdg43 7

06-07-2023 18:32

230706-w6mfdadg35 7

06-07-2023 18:27

230706-w34kgsdg32 7

05-07-2023 09:21

230705-lbqjfabd66 7

05-07-2023 08:59

230705-kxxdfach7v 7

05-07-2023 08:41

230705-klwmrscg9y 7

05-07-2023 07:15

230705-h3aqhscf6z 7

05-07-2023 07:13

230705-h2e9lsba95 7

05-07-2023 06:50

230705-hl6fvscf2t 7

Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2023 06:50

General

  • Target

    clockDarkTheme.xml

  • Size

    1KB

  • MD5

    663e33bfbbb0d14830694114d49c457d

  • SHA1

    3231baf54a3c1f336f1b11d9a7011bc5502a9d4a

  • SHA256

    43b0cd84c7344f57b2656d66d5bf215a4f1d1713a8117e0ecf92226b8ce1a200

  • SHA512

    c116ffaf6c1f8ad9bd6a1d85de318c9ca2c3b6d4931a1aa165dc7ef7351c80fbddc7ca1371c81dee35b3e12720fee2d3146d7a510b54026c3aba9202dee5f1b8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\clockDarkTheme.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    327fb0c0fe6ff4e310bfb15e1125929e

    SHA1

    b039362ab670be3b812b74abd060634c1ee729ab

    SHA256

    48d55fa52baf11d2305ea42760ff0a2381a2e2205ea36a9a5c1ea9389b8766f1

    SHA512

    98ed76bdef15385a174cb7b4db8ce8550842adae821a534a64c16dc92520a8c77e4bbd2486560ada6c038fa044a11c882680b6d1e26c7dbe826f590ee7f81b66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bbd9e9793356069e4f1d310bc393c72

    SHA1

    55c5e51e9027469ac5053d925c151f25235c0a83

    SHA256

    48f4621c3874c852caf42de841e05be3c2239f4b537ad831151ceb75aa874b16

    SHA512

    a59d364cd7dc2658ea0976bc0225ad4ba09b1fdfac3f98700e3efd7909e27e64fd90583a3462e144a2fb2cac49441b721424fd45a9f972c12d72398ba5781308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2a68628bb69ff3758d49be9c0bc8ef2

    SHA1

    7252c3f597853d2d9a82042e5fc9062d1e5b4e91

    SHA256

    79a27e95f606818ca3d46af99b5be353dfe8784503bfca4adf66c5bf6e9698ae

    SHA512

    8c6518fd110f7b7440b1a93f8cf651b717e31d05f48480d38662c96175bd17fd76b8bd3742547511b4cf716a978647c23746d2bb3c6fdd695f4c6e80fa03927e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbeeab2f4c26b323f8a6e81a772fef7a

    SHA1

    e64ff84be459d80a7052b56bf5d37b761bd247c0

    SHA256

    b092c35bd5b05b6df39545c2e18199f9258534a8f2c3c4a9a007ba0f3ccbadb8

    SHA512

    dfae3a1a65ada36f83123ed0af588a709aebd2a95a2939ec50e3b482d81303cfdf5077f411a7fd82e080d3c45448ab8b8e038cc802de7d8092c62e9cb1a41f28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0099e7db64a742e3d033b72d75b0789

    SHA1

    b4362c0a9245fca4b47e8d01f98969af183bc4ca

    SHA256

    9631007403af5c4686504a5e195ec5747cb3cd30844f4bae5101f33bd3b512ff

    SHA512

    3810b4648cd29359dc0e800191b133ed437b5e763173cc8fe7cc9eb327758abadd993a79cb841a004d3d9badef10408cfb604e63fc715c5bd83896514baab5f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8c14cdddf2f52bead2caf97f0a756b0

    SHA1

    3e8b1dcfbcea585da3e0e5a034dcf561bdfea972

    SHA256

    00a0811b66536c47412463363866c5b5bf77ec5726f0185d8a1e887400a8ee62

    SHA512

    45b3a1c24b5b17e03abb2b01928ab78fc2aeb0d8443df860bde8aa7c5a896b900b7531eb39badd24fe729c5ab14d0c1479a4c7eedfdb667e2b3ffce9dbd87df6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70d51b19a309e0260cae5c42b3cf669a

    SHA1

    df6f0f437432d573fbc57bc3a0891ef0c5d94f36

    SHA256

    e55667a50e01d74815cf49e4246ea5f17650cd232dab7433339b7baf5de6a48e

    SHA512

    b08a5921a5a3ee6e4bf5de59540941148181c2de4fd5a9a1e7ea189fe89e4c33040d8c0bb8cd7bf70df6f900e7c39ddf2979bf32fb3d23f83ce8a9140598f97c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f09eb975c819fce1d4128696f8120568

    SHA1

    6cfbfd85b68554e39102c778264a16491d7eb84c

    SHA256

    2d7c9c77587da33362a8dade579993e89a74d62b7d9213d0cc912b0031844e33

    SHA512

    f1ce91951f85f5e52aa87d4d4e1cc80e096bb1225003a14f52146a4a1656791084af0c29610c6118e8cf3ab69f584ffeee3b8389fe74e22b74d6b113446a6a71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7d0a75cdf05ecfce4a9d3d3063b232f

    SHA1

    bbc1060eb999274ba00ce32c4fcee15aa30f26f6

    SHA256

    80b19614a87bf2aad6b959fd14367e762e6fbf9e465221608d2c86795204a4ba

    SHA512

    e94fc89b7cb5f110d54462c3ece466ee817baee494060569fd11ac43dfdb408d86273c0e15ec7fb67a9b9383a1eb85f01ff66db7dc9a8fbccdf3196e872a01c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f0dfd74686f2ff1e8043cd45ae844f0

    SHA1

    c6ac3142a82c6c0bb6ed8026f1756eff790cb1dc

    SHA256

    cf706ace918248f21954c18e7f426bdb2b795e9abb2dab7bcceab70a174d51b7

    SHA512

    aed1e2b1e1ace9d38b6f8360f309c30b9356c5a7a4e82e5258f1620535bbd6f7c1768c80c39648ef45853f7c8afe51918284ff0dc3714d7f4b18ff276648c93a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IXTVO3I9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab7DAA.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar7E5B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NCLYUY2Y.txt

    Filesize

    606B

    MD5

    2678266133b861fb49465c6b946b2288

    SHA1

    206bf6f2789815f1ef547e00e215a3ed85b40d25

    SHA256

    05d67dec764b65fdbb80774f8fa4e5dbc7a2d873250d9b9afcb145e4a1fb2cc3

    SHA512

    e101bc547b885a568640f404d038c2bc45f4d3e995f9ec8bda915c304f0a15e9721db0e59e531e0b17fbcc30cb5a0aff62ffd6ff96a465f4bf8001472ed7ecf4