Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/07/2023, 03:13

General

  • Target

    sticker_bow.xml

  • Size

    4KB

  • MD5

    ca4e9c8d83e65fc252166f69aaecc6f7

  • SHA1

    62ce1da98afe20a7860b90b7d14711ef2939fbc2

  • SHA256

    bd2771bd595547bc16d5b3c10396d6215178d150afc68d119595d6239575c126

  • SHA512

    4412c81c257100f5aa73d41f6437146d3256902b309b37524ae3fab56179bec5931b99acdda6996c9e8c8721e3bf9ed3d2f513d531c7fc731bff9f93bd13ec7d

  • SSDEEP

    96:v+PXefIFJaIbH+6M1nkJxBtdL7X7Wvq2RjOVo1BiIiMBm:WXuIFJr+6M1kxjdf7+7wVo1QIi5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\sticker_bow.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4551bdc6ea6aa379cc39d7276d5c83ae

    SHA1

    e85a8d9a3fe518740bbf888f24cc603e9b0f82aa

    SHA256

    f795d3bdaf81b3bc0920b5a81625f13e499462767115f8c0902cecfd4c8b58c3

    SHA512

    9ad6a5284d078147e40ad07dd9624d372f82ed01f8205d4a8d7fd582163fdaae96ab48bd0ff3994261f093268fd588b4e9050b53f1590619b039064fc106de06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    deeb258efa38b45916c2d4a422eb4cb5

    SHA1

    5a229167dd541c55fdf19fcf5ba09b02443c97d6

    SHA256

    9e655e4b71ea8a0aeb31ebeecee8c31eec99dddd528274f58bea1522f106a06d

    SHA512

    0bdfba1982b3ca58be4e18df7ff74e16c29526a75fa153f21ec4fb1788dfafbefb16a96922a9bc4a5e357ae4048f825a75170abef6fe444f3a8ba12ea9b813ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c59d6816bca84aa406eb18c98f7d0ca

    SHA1

    e5c6883d96a569311b90dbfa249e47033152600f

    SHA256

    2dd152153001cabd648b2007145db38baa9c7179efb2d24e131a1d6b0807001d

    SHA512

    3d28a147e2c81e19d18cb931bb6050dd2d216821450bdded6f330dcfb576b2dfad5ecd425fa015b416f84a94361d8343d9f00a759bb596232ee2411ccba15724

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd1d23852caba3ed927d1cfc80177fb6

    SHA1

    3c7ad0da50c8318a1ead7f41ca6a88a7dfd87eb0

    SHA256

    9c6097d6ac6b33dd334a0fd2d853b13591059b53817823f71a86eec4b9f29c66

    SHA512

    57f211df55ada0df23fca472f2eaccc31d937d67583931337ebadd55499b3ab04b06cda0d2957f4d470ace07659cbcff48cceed0fcb550f412f2ae0828ece656

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24b63ba9edd782ad6da47df73f735216

    SHA1

    8397bf98d3bcb6c5be399df2defc569e0465e81d

    SHA256

    b818beea75627c0b422e3b0daa86183cb7ef1aa2b15c6a9a102a3d413a2be5a9

    SHA512

    234f7c8bed79701eaa478a1ae6fbc029b476e52510577dbb4dfca92709084a486a72fdc81d382437dc467793d158b33d222fafc50e59b8070a2471846fb5c5a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ee257378690f7fdc5830229a5e9b983

    SHA1

    d358bc8776bfc9758870bcd031e48691285d2543

    SHA256

    aec114508bdf26374d2a43df524c2eb79b49241dafc8b71250a92568740d4dc2

    SHA512

    1869069c44a7e965fef523a9042cc60592fd9f61cee2f7f4730f54e27caf445bdfedfecfeadcda997a0a457589b14fdb4809013634a8a7d254388750f5bd738e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75ccdb432f6cb8f84eaf8927b3afc0cf

    SHA1

    5557bb01e16dece4b3bc39c520efd8111eb6e44b

    SHA256

    ae9b9069e0c36df6d5c1b03cf86bea4c42cf2c4642842156c208278932742064

    SHA512

    7b24bbb1aa8057a6c8e0497d94c47b06e704a9e24b46e8283deb3b93e182dbb9d205a436f073b3c07ef94470fbde0d73aed262ccf63be17279da2d4e8c2f7283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01dbe14f29e322cf6284aa9a9cd263d2

    SHA1

    4bcf85661ba4aac228d236a51f755bd2fd5fca58

    SHA256

    3397f566ce07e6b343d20d7aa5562b6b850dd34481948eea63d389abc9e7b612

    SHA512

    462f388299d82f9e15256ff4f1ca1f30443935057085a53997436129666ff31a8292150da7cf206025ba983d17fa886d36c6612e6b102414ff23d410d62a4058

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ee6ee3f5c0ac01a1668e9652d538c18

    SHA1

    fedd2f9c68053506271ce556b262afa945ccb196

    SHA256

    d5b9f2df7c832486abc1cebf47d11dc04a6375d18abee6193262069dfe86142f

    SHA512

    d0dd5221f993bc69d5d4aa64b783b80b1dc74afec6a706e92ea55a1943c6ed982a40f2d6b36887cf3886bc06ef462964e4b6d39006c8ee26830613315f80ff50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f565f7dcdb37dad91c1ed0868f58cef9

    SHA1

    cb6b24a73661682545730f127be7ede475f0f5aa

    SHA256

    c7d85cd4116c7028c977ba67015b92eb28662608db52919343f5a9199c9ca527

    SHA512

    da704874508b87399581361d646aad53c8731740a198c88237c8eae8434c3dab2b245925b190e9f0437202c7831b9836c5df57c78ccfc13b56eab759ce332829

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be432a6d2f9dac7797f4831267141e45

    SHA1

    d1eb691e1a371b57a29f8593cb594a9e6aaf6b9f

    SHA256

    544fec4264c5ebb0b725528e95dd7172e5311a9371be52c3c68543a8864e4505

    SHA512

    81fe56d66d018503bfe4cb69beb242399019050699fd2dfb231a1352bf08558af15648b4e9bab37408d0fe1fa30ca981cdb6f4219bb317ee64239790c2393fe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dee97c1de8340c7a5ee4c7daeec7e6f

    SHA1

    5367dc36d35ed27588938023995afb4b1d22f165

    SHA256

    0aff000ba38ac5013ec09054c8a934e88f9669fcc237ff2d1a2135319a2dd773

    SHA512

    a10b366e0182bfe6a0d52e5d76fd715048229e374ee63a1451910908f1c186c624d48f0c5503f1eb02ddf336dda9d19574220c48962656e1dd1c08428d200993

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabA6BC.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA847.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IFTW0V28.txt

    Filesize

    606B

    MD5

    2e13d24a4e995697b9f4811fca1d56ac

    SHA1

    69e10b85042d5d44d8b90f74d64b25cbb4ef756d

    SHA256

    2c61d1e5b3f9c27b1d4db0ac1d394ba8db21f33397efe00f171e5ec01f17f23b

    SHA512

    5e8669ad718442d87400eb405271ca793ac4a706463705b9df4a339bafa2a1d4f09069068158489e5be090486869c5d383caf6dbe4707ab82b6fc54d15abfd8d