Resubmissions

06-07-2023 18:35

230706-w8fqlsdg43 7

06-07-2023 18:32

230706-w6mfdadg35 7

06-07-2023 18:27

230706-w34kgsdg32 7

05-07-2023 09:21

230705-lbqjfabd66 7

05-07-2023 08:59

230705-kxxdfach7v 7

05-07-2023 08:41

230705-klwmrscg9y 7

05-07-2023 07:15

230705-h3aqhscf6z 7

05-07-2023 07:13

230705-h2e9lsba95 7

05-07-2023 06:50

230705-hl6fvscf2t 7

Analysis

  • max time kernel
    103s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 18:27

General

  • Target

    clockDarkTheme.xml

  • Size

    1KB

  • MD5

    663e33bfbbb0d14830694114d49c457d

  • SHA1

    3231baf54a3c1f336f1b11d9a7011bc5502a9d4a

  • SHA256

    43b0cd84c7344f57b2656d66d5bf215a4f1d1713a8117e0ecf92226b8ce1a200

  • SHA512

    c116ffaf6c1f8ad9bd6a1d85de318c9ca2c3b6d4931a1aa165dc7ef7351c80fbddc7ca1371c81dee35b3e12720fee2d3146d7a510b54026c3aba9202dee5f1b8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\clockDarkTheme.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea02c36a3e106facd6fdb62008f70ac5

    SHA1

    93a1ee62e3651476666fb04ad4ba3bdbe8f93c56

    SHA256

    77a2069f0d3dcd73929e04891054d0e03050255e38046b94860a6a936a99fa4e

    SHA512

    1c31dba417ae7d169b219fc7fad832754d8b3900031966d475615d8c3bbc199e004ae4a4886a01e82f4a49ba30a0eb79b7f7e5f91e25535dfb76b3abc9a08a71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6708f56958f8a32371435413f288fc17

    SHA1

    12b647be1621915527a85e4e72e7db9adf827122

    SHA256

    d184c67c48ef9f5e54e7a4c56a2405bde9415494b0e08edcf7428fbc796418e6

    SHA512

    71b080c92bc595c18f5d1eca5f93f717e1da67f9cb7d589014e3760868ca319a94911accc18d858848677f79da10c8a3d216e6571219e826dc97dd407cfbc95e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33c73c9ba5fa9086339ffc9d291b15f9

    SHA1

    b688b7784a98644e656bd1ac431bfc2ae6323742

    SHA256

    efe57fb7ddc636e5c5fcd729b74395c46de50728c07f628e8c1322873e84ef05

    SHA512

    bb4c33c07aabd41f46ea9ea7e2c9350878c204df75bd6806b791f8e2e865572328e61b0fc9f1ed4715dbbcf472bab95350e5086c5077fd582818036a3583433d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4302fafe9f57ceb18d9f28401c8fb76

    SHA1

    c49bc90aed1b2c5b6dbb1b6e21e717a8cdba8cab

    SHA256

    0800385e0291a7f593c411ec92a1d4d77861672f79609b80f349fcaef708a5db

    SHA512

    c08487752021a2247fd5f6b85ddbc9a6db64afd1a2fa48c8fe851b92a16cf02d120f1cb189024931f5d0997fb5f6aa23d6fc2203af5710592f8f4af4f547f288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1534c62c5f1731e0a72e49127d09652

    SHA1

    d3a2eec28a8aa24d96cceded37064fc4bfc00efc

    SHA256

    b54f327a815d3c6e96d9fa30b794c153b8a86976dc606987980d588fc451808c

    SHA512

    78b7850746a4283d45eef1d5853858e0043b7b838f42f2ae07426b14bce7f0910714364e9d44a0c35141dbbd147952b3ce8d3e3222fcc230c411b3f097dd54eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d28f5cfa417383104fe02d76060c4aa4

    SHA1

    01e3aca822341ed7da709d656b8a2e1ad4dbd674

    SHA256

    701ea85f828d00cc74e8dac9c09678f49e6e9ab1cc29be1b8319c371cc58cb8b

    SHA512

    5ed215354a3f84203f5bdf607b9f9541dda10cf0538468c448752d4d1b450833b4223b7fe8220af15613511c072537759723921ea785c39c6d1c8d67f325da5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86b5e5f10808aeefbff2f502a6aea800

    SHA1

    e0b95626d348f6134fca18d80a48e11101a157fb

    SHA256

    ec7df7153aa96dfc6a240d3d11fad8bd7030c3fe99ca7212ef1daa6879d23248

    SHA512

    6c3d09a2fddade48e3201a66d54e61bb68ec5830e0c5ed8e0a549e25968af824beec752f6a85bd532a3cc05030eac31e733177e3240fb27b35474aaa93c87190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4dc7f087e29a74e69db1e2882771f52

    SHA1

    a487920690eba8162bb62cdf12c0fc946c00dfd8

    SHA256

    970e2ba8e7a41a7c611b8e3f8ccb94cc107ac4cdbd1c51ffb083087af4de00fa

    SHA512

    f63aab4049a2d5824e2e26f71126ffa4784a3cc09cc049176687841c92ae21853696feff0c895394ca10fa151ed36de2ad902845b9d24bf25818eef674d5830b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00aaffec55c2d3173bc7a61b981c2937

    SHA1

    60aa9e4bb4147988842afb0fc68f6e079d3e1b3a

    SHA256

    4b18d88da1a72d836072de18799d54451f03d6dbb9324d600ac6a08cd911c8f6

    SHA512

    aab1522ed4bed574657bdc5ade78b3d7598e209703ff80faba87e5936668756d87da6d888edd6d6d7ab62870f7fe3b0edfb18fdd03657117ee7531970bd35283

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ANFZKI5S\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab346D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar3673.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YTLQ5VG2.txt

    Filesize

    606B

    MD5

    366b1cbb6754e37b93c88d6c62867183

    SHA1

    bbba2fdf57de2bc184a4151f2972c26350359d03

    SHA256

    43b8a828986e3a0c99725ecfd6a3f809a311635e83aa32fb69eab261d76534b3

    SHA512

    47fe3a37868097ecffa4e182d20bc6a576dadbad1163488363350af2db5f0a7163bbde24fbaf4a1e46f016c18fa2f544194599ee286f87028782da11d6fecbb9