Resubmissions

06-07-2023 13:22

230706-ql86rabe24 10

23-05-2023 17:55

230523-whe2dshc81 10

Analysis

  • max time kernel
    100s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 13:22

General

  • Target

    shape_18.xml

  • Size

    818B

  • MD5

    a9146c399e0bf45c006eef5326d5e2b7

  • SHA1

    f7a9111db0c8aae6632d9bd80f07b1669bf12389

  • SHA256

    ee03c61de487becbb8c3288728e4a35fce048b1f8aec4ba3bb65dd61e92693b6

  • SHA512

    ab12870b53f66af028fb71b234274c924aabc0349637bcb5c37681a3d8dcb06ff8aec627650cf1671b7e808d11987107832a5b3fda19d46ab8a2d9459c2351f4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_18.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56797b7ade7339e14e0bd4d54cae6b55

    SHA1

    bd895ee39c4d79d827ce8d02463ec2c998a40a27

    SHA256

    3e4871eaa519c8b2474646e7daaf292397d42dc2fa5b9df0c4afdf66b366b4f3

    SHA512

    1ed04ff98c1f091364480651f671df61da54ca5b713c444bddb3edb047277b8723114b424c91cb17e912cbe8c8153f2ee0e23d2288ce6c4d8de9cee8f4896969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d7fe2942d33921dc892237c4514bd74

    SHA1

    8edccdc62f51532984d9c38c38db4efa33094e8d

    SHA256

    3a31bd9c6b08d96125c584e6ab839cd9273b6483f98c5f2c9d5ff7cb982b5147

    SHA512

    e8b77f1befebea273fa7d47cc9f75dbf602321e2791682b0f4c2bcf3249fa22e79415d9581b29ed3612cbb4c7447ce9074995249014103288c5e6870f6ea0a86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ef23b45f0393f6607901b2a7fa36d26

    SHA1

    8f1656cd6480c7b55d3d50741bb0b7369142fbe3

    SHA256

    7587c7302f7aa0e0a8dbb74849264d378a58b0b0cbc4b1606af0a696fe7e7968

    SHA512

    18b7662c3e93a2d5a725386d3c711b1d6d7072ce576e9249223865f48e608de842079d029b4a8883654a81ec4c28776ae1318d81d72f0c57001c8d4f8cc48483

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce3c086ae58d7a316034e1658cd960e4

    SHA1

    d441ccf833554863d19502855d57927df6765cbc

    SHA256

    f1255791c707252752790106dfc7daf4b505174ca6f6d16905e6ff77c0a28911

    SHA512

    d7d83db004afe0b3a50f9bae9a15846c17ea7a1cafcaba62b82b763f268874f63d12df9397801b329361933d2f80ab1cdf2618b939dc798fa53407aa17f4fa4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5dbb446882e85c9383cb28842fd2d8cb

    SHA1

    82753791a296637bf161e94eb2b21981daccf8a1

    SHA256

    afca3663e2d5d53bc1b5d7d6033e7b37cb7d718c35bacbe379410db774214503

    SHA512

    bd8ba0e8c6da45b02a14aebc802860827a2972118084d9ab99bf127442d5f8eab19d9a2a4c0e370e2b051d8d6d4689f5bc00325c8af538834fc9892ed1c08fc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7cb1e07975ae918833b76784e8f97529

    SHA1

    bd45216ff475fc6bed0e263bf5c64aa67c38e1d1

    SHA256

    cbd5e1b6014377ccf8aa830c26f8bcd6207c20d42c83f105f2a0af600f5d1242

    SHA512

    64c788487b8d206169c47dbc7f457a3e36804b145c055d1e88681ae2726f4a46a9c7767c9012111fa0e967fe005c4b0860920e2cb8eaf984af1be06bcf54ed1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75b7b5cd1a853993e2e546e06930d84b

    SHA1

    67001e1a66f26b18cc25d54b46056542feb30cd4

    SHA256

    4d4d1b7017579fea1ef3f2c345744ec1d5afb4375a30f4bde836187ac981c8f5

    SHA512

    7eb96915672679e940f52bce21eb12a533fd7f3c11bfa6b4f83e65b89ee8c049a38a1fb8f8007674ae490675f87a9654bf7b302c6ac8d8d6ea569d94165db454

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    482caddc8dea06164e375c8c267e3040

    SHA1

    9f168d94f3b4f42574e8c4f56047a8725e0e567c

    SHA256

    3f564caeec39113b97c7825f2767b6176f1c3eb121f1fa22922492ffa0f35039

    SHA512

    2c5c3927e4afacd8c3d4d3d59ee89603567305d7fc554a208b0f1b88d821632653cd7ead5f2c670f0a6d9efb76b2d7708c85c486c54a8804f1354e98678af027

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cfac74a3cc5a941f3ae232ce3a75fa5c

    SHA1

    fadf22a589c624a97102bc5c2257f5a17ba65211

    SHA256

    e067dda69a007fc71ce673ca5a2baf99a1afc39d2737f29863964c6a39fff7e3

    SHA512

    feb6c510280dc3bbd985b342a1530ffe35d093c11baea9793a2c317de962058a1af12193f81f65437faf19d284e5c03c8329abc8fc909095e00a1ce5e46f7697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e13571944a6421ae11555e04e747265a

    SHA1

    924ab9488c94a26cb7f5264fd0bc7fcd187d7271

    SHA256

    699d71dea960a4b25d3ab72af08c0f3a3008adb634738a0993476030b47dc029

    SHA512

    6924ea47e1055bf6319d199e12629897a6718ca1d90591eab59d99b3e2b2f6edd2c4c9fe0b7de9b5f26b1cef6d9ffbf09b885f831e1c08d5c3ebbe6af0712dc8

  • C:\Users\Admin\AppData\Local\Temp\Cab5A42.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar5CB7.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TIJ8ZTTA.txt

    Filesize

    603B

    MD5

    a11b65a5539ecc417cbacfa4b8437aa4

    SHA1

    c4cb020ae0759c498a467d4eaf5f80822178aa44

    SHA256

    fb899d22fe46653cf02035a4e5c908ef269ad94feed832af8a27a1bbceb1d783

    SHA512

    847fd1a563f9e930e5e21d7e2e7a6dc7414b954357ae43d397d95e1ad86449a1f5fdda15eed5b8e55a86ea881081a8a35766eca15ef13701f5685f816c890de9