Resubmissions

06-07-2023 18:35

230706-w8fqlsdg43 7

06-07-2023 18:32

230706-w6mfdadg35 7

06-07-2023 18:27

230706-w34kgsdg32 7

05-07-2023 09:21

230705-lbqjfabd66 7

05-07-2023 08:59

230705-kxxdfach7v 7

05-07-2023 08:41

230705-klwmrscg9y 7

05-07-2023 07:15

230705-h3aqhscf6z 7

05-07-2023 07:13

230705-h2e9lsba95 7

05-07-2023 06:50

230705-hl6fvscf2t 7

Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 18:27

General

  • Target

    clockLightTheme.xml

  • Size

    3KB

  • MD5

    2235609a58ada82f2110d941341a720d

  • SHA1

    d3b06251eb8f131034ba1ea3b0db982cb31bd813

  • SHA256

    d89ab1d4bc636a73d64ef1d8976d517f13449a11af28d70e88ca3d0c40e114a7

  • SHA512

    ff7543b27941add4a92579f1a55f3b40a16cd8ec8cc43b678b229be38a3878267fcdbb80b040e91132fd938082c47e6e237f62ac3903422ad9499cf7164228d5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\clockLightTheme.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0ba65d86598a216d89cac0b6a97a7f6

    SHA1

    73a063ddc0d7b1b05231e19add9dbe7995fad9c9

    SHA256

    49c7e968f84d32d24ce81d324c6575c0bdfaf341f58d9306417be0cf04b28d45

    SHA512

    516b1869a68d145c88cad61c8baefbf3f9eabefe209aa43e092864f987c2dda9a8760ea9f6a4d811c66422e8b41d9323b85d239afd3e3e776196228b6c76f5aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    603ed12dd27923e009cdf18396530a33

    SHA1

    92c1db14c998686636972921d34b77ef67716d43

    SHA256

    1b69bc6f0d912c55384e3c4b09d1b340d185488cbb26c3839ba38bfa5bd6347b

    SHA512

    c5b0cb90c477e61feaa59ed10d12741ebccc7e122f3dcb03b5a4e8f0cd40f64a8b186573027dddce54aab9829a891315fd20a17f764306a19158944ad40a288e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d51c7616e338b552470703e870e4e303

    SHA1

    7ea79e7a71dc0bde4b297d3f2da97f4a8b8adad8

    SHA256

    90a8d06e39f22eada5a1a23d9333e07f09030b91552ff3a1c536ec332012f95a

    SHA512

    49335350d8b7868cd07517fafcc3f894236ec8dbe2f752d1f991d2c88e968e46f961cbd595dd93624e16e98dcec37659597cf7d492090ad27e73172f36567842

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e499772ebb7cd3135f0dd615970289a

    SHA1

    a63bd2674fa7bdc9d651f46c1b2eb73169c2004c

    SHA256

    8ec6af03a7c3543d8311fdacb0ea36a1748e5cace1032479dd7ea114cba7a84b

    SHA512

    4f80166014304266caa89f8d20b3ba9c256bbe2ebf2fc3bf9676f22a121fe10dc1519db9e2cacb07a1d790654c79873b5e15e16dc4d1d4b52810b952bd2bf1ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8adfb1de14c1b188c0916ff188154a2d

    SHA1

    a270424a04a7b48119408b0fce23afe0e97e59fa

    SHA256

    31be0fa38311b0e7785a9c358e465fea49fd64b8222bd1f137a32a80f74ee14a

    SHA512

    4490b9322223956a89e72c559ba2f5717e477daf49b67c67c90685d2f0653feb7f6fe8ff787af22fb9cecd101606b0eb899ed605a32f62b300600a67932a0f08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    017a7589c22b7a211407af9a73a3c007

    SHA1

    c25901b1829dc6889343172007b464e08a7a0380

    SHA256

    4743c5fce1a761cba7cf62b48581c16cd8f20af123c4efd98fcffa454bfb354c

    SHA512

    2655c602aeb538ee8bb65029e580bec9ac19b0320d02f6e7db6a9b98f8d3fc5f6dc0a594184f429bf5cc7f8f91ba4350eb0ce3d724c7d7bb386322d381d141cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b920da72ff5087aef9a6a805228677ae

    SHA1

    add0ce0bee89353195f7bd48c194293a7a32f67d

    SHA256

    6e15ad1ee7178ed7025d618d6ef4ea988659034e4ac34ff1af3c0bbdb2356f0e

    SHA512

    a20fdcf50b0e1808bdfb8c5df5ac829715f0c46889450d7b74997af596d7db7d662f43e8724b3c4b418c43c341c72be30189110bec53f2c90bdca705e09b279f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02f848311bb219c14c8781c9aa048a8f

    SHA1

    3df8f2725f174a2c748f85f495745b0a3c907413

    SHA256

    08257f07a7f4733547c5b3afca88e564aae4201330560cabe27fb8ee0319d18e

    SHA512

    b5bbb6aae27497dbeb372ba9902de082e8e1942d52c258c180dfd62c13ce078532ae844f2fb89d2540ec394ded5dadaf9cfbad7b2cac3df54911f9a148016862

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab7D00.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar7D9F.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6X5YW40L.txt

    Filesize

    606B

    MD5

    42dbb06ebcec01acc8887ea233aaaa52

    SHA1

    9964a1bda9525ef3e72ce69405c1e3885a840fc8

    SHA256

    af80742412bf220faa21418c401875ad72a0cf63c8b1a42c6c2a964359b9ea01

    SHA512

    dbb8445245fd1eb53439d4210fb70c94b1f2438563dcf9092521eb53536efd9fab0cd81f566307a5b56116afdf7caf61ce5bfcc1ea4c940f6c2a359d219ad817