Analysis

  • max time kernel
    100s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2023 19:29

General

  • Target

    compat0_htc_831c.xml

  • Size

    2KB

  • MD5

    657be39eb945071c8110ee2f8f28732b

  • SHA1

    6d7e5be5f992ea02a570e40949811c1d9a2a8a04

  • SHA256

    74534eb7430c02226f8a730058d354a622afce5e760f14530f9541a278ccded6

  • SHA512

    997ac2e79974ec38d523628e9979ab4fb9d8b2b5f06f11f731d2c9677c5ebf2a2cc4eb3b9028bdf20c0b777e9a7ab0a6a5f475df75ad221bac9ebc766e5a5046

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\compat0_htc_831c.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4d98023ebf6ac7b08124a4c3ee9f02c

    SHA1

    70113c0953e6d9c9f190f0e8c7203f52e84473ac

    SHA256

    ff2af7b58f1c8ea101883de1601e466f8477f234ce6ccc072ff049045412a465

    SHA512

    6edc8518b188df7fc15ce1a662cd52782164e8f3fbd084447333c5b8a4a8e734e21c57486fa5e18a1348cfdb13aa2b151a2bbf8997d71e3fdb6d4e17026b3317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96adcf584657e3102cd45c3f807e4db4

    SHA1

    a54fa4a66f6558c9caf99b1be45a26cae7922837

    SHA256

    645f60f429119b2dc372d06c3b5903b4a8312d1d1694fa9999189f73c035f3ae

    SHA512

    17ca92efc5cab86033914b168bc7e13a18b7d265c6d5ac1b27e747e42a10ad4cb67887d680a91c941065955c10ca78205a4dd4e6ba5752f5cec80c29c767a805

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    246976d55249a6df158fee4047fb9a11

    SHA1

    371d823dc4ace1750eda57aeed921dcf561ed8d2

    SHA256

    a47bc66075482ac5f2182b3d30e0d812f4b4bafbe515ad96dc849f2d3197a171

    SHA512

    ba26949aef6cf71cd7f05d9b864e84222907fd535863f4bd41bad3b422429a56b0e6bd1d4fe5e967d3f343361da5f87b921584519c2d4aced96f2766a9ae6239

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2dba6ca085502c11f1cc7b184febbec

    SHA1

    361cc0fb4b0ab90799d1925cd409876fb71ff676

    SHA256

    f579e27d0644a58a68b8f3362f825f1e7434d117d3bc76ed52b76cc2de6869f9

    SHA512

    dd7b088437ea18473521ab20957d135a5416863c2b20bc57e00014c8893b69b1365274ad6745de2c390de91e97ee086f93d6838302e54f1ad32a0cf60c8c2e6d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KX3UJNA9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab70EF.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar72E6.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S7AO980O.txt

    Filesize

    607B

    MD5

    0fb8d1bb0ed28a1120608d246aa2d8eb

    SHA1

    c48eddb60c2d7551aaf5e462b630e568e5484c59

    SHA256

    6f5f6a13f673b3420ac9cdbadd6ffbf0bcfd6121842aafa77bed0ac670d5e9d7

    SHA512

    cb9568bfc80e4f58a2be95788e2b6267ea8a92f5ed7b6e6d4d2a3f02933153abc4c6a03bb26c546dedce22fb25e8145f6df155cab59f7fb1203eae453e47cf63