Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/07/2023, 14:20

General

  • Target

    web.xml

  • Size

    18KB

  • MD5

    08101241b15b53ef0ab908f6d388881f

  • SHA1

    ea3e2ad6d71d483c54b12852dcbdcd0baa569988

  • SHA256

    15a2c7a9242bf54d3ccb3e07fa6d8f84ba8b303d8877243787a1103009941bdb

  • SHA512

    a1ee7f17bb069ac42483d1f98ca839ff1bd06f3fc15cd379dff4aca3732a5dac24dc17e15acc8f8fa39e60e186219f4fd70664f9ea284002274a4ff8609791ed

  • SSDEEP

    384:lJJuAr8F1mJ1ayCk5+HK5YaW41DBWTwa6st/tlLvSqwwU4FVXaS7L3nHIXYFXc//:jbpJi91Xbi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\web.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c5a56c9722886dbea7baa53393ea74f

    SHA1

    5d6bc8ffc13d00dd554fe048bd2c42c456a22589

    SHA256

    25c9aadbb3ff08683abd3e785b923a60631f47c0610cdd8931ba676e246e5ea8

    SHA512

    8b9e058c3251931319f2a23e1d0db6d99abac8bd26c9e11f8376919e5b508cc29f052877b95d2181dae923a47cbcd02a347123485387d4dc4737a8453496bc00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b23ad3a0a5e218c40afdfbd786cf956

    SHA1

    c17353643a4a97fa772e6b8786a4175123c60e8c

    SHA256

    a5105965f3e00cceae24adb9e6aa41ff9db9a2d45c67e582774c71ed883a4520

    SHA512

    ec2c87a4527581e0e834a75110cb36379c4b0e1cfc733c54a3dba12ed10ff1c6c5b641cca6955c4a7b54faf35b2176055864d41dcf64adf1708694588c916f19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86ecd4f563bdee7203729a4114fb922c

    SHA1

    1aa5c6a576aaf84f80de3227e1c2a8e14774f61f

    SHA256

    977765709e0504d9f1a3ff6632a1d1e098427ad3418fa252557f17140f15a0b7

    SHA512

    17b2b0e7e495bde3d403df1d5eaf5150cea8153785e9df1c1197a403ba7ef5557715539a246be07eecb93d4d3abbe073e7de9e8fe3694b9470161fd6e677f6e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    415771d96eb0a8e43e31ab2c8316cb50

    SHA1

    005303b12d11ff94c09e7c599a69d6550f49e242

    SHA256

    5097b37e97700ea0be384464aafc6edb9cdf23718ebd38a7dde585325de10932

    SHA512

    84ea876993b33195e3045f49f3e2f9a18d81b96a9eee357cdf5f0d3b3f8a2b6fac0b0393137a2cb33b01e2b85bc7820027b3c7bfd3707a4840806e4fd503e0a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2d0052ba9306662c9262f01ec37c954

    SHA1

    57e501e33093300866e8d261fc154eb0d4f51263

    SHA256

    1fb7490b146d84dc30ca7838ffb569316818d6baea8c42d89168b78cfeba1a99

    SHA512

    a0ea9e94080110ebddfcf2a3e149bd116edf32002e47cfff9e7533507b7b88240c24e5fef277168e01a7e7eb4c5a2158815b8b6725982c7088280eaee8eb4b51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a4cb57e15a0297412ac9c63f032d91e

    SHA1

    554a265278be07c3ce7bc274d07b548b76802433

    SHA256

    e0486fb79a9e1f7e81e288a15535d430f2331c75d1ac85e601dce102292054c4

    SHA512

    90d8b44a27e25fe56d21a4c9e5f6e8834eb17f1fc36017f1aad6909da8eb20c00d87a14b299428c67e8761c26c323d3586f044ca6d8cd286ec2e60fddaf7e94f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e12dc40be8665532a5da19e1bd23a319

    SHA1

    42a357b010e5c53b8e9d37b2a08da542493f4b25

    SHA256

    d4a13949ec077927386af4e59e643f6d76aaf20eff962ec3572c5361d94b0a8e

    SHA512

    e07d8fcaf93b644fc921992dce7814171280169152c19856e3dc290d835b2298367061fb4e6ceba2f82a9c36baea4d454940ccfa6799f041995a4c44ea66b3bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bd17e831b92748700c5631784db08f2

    SHA1

    b13e4c44d9e6c02e008e663d6da7a855a68d875d

    SHA256

    29f9ce8852b3dc56562e69a7f0b49347f3ba6b55d17e6702a4d4d76910ab3e7b

    SHA512

    f069fd7ad9652878b0e7ef69a19fdb01f2e5048f324fabfc47fda59ceb897d19fde2e7ff70f2b05ec3da0990b7b06562b99bc9be5f9a9716b62b7aa7fbcfbe5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77f0d520ba30213afb7cebbd0ef46dbd

    SHA1

    8fbc8f55663f884fb117c2d833fb9629efc50cda

    SHA256

    6ca7514014031b14263e1947d6eedd8227e725be8a95c3d0e2ec1c43a26e1975

    SHA512

    3f0fafbad0310245363ba840ad4b0c501440b8eea719c084d18cb3296d05ad5c0dcffb2c0b1ebc310c95f03e60d6ced085ac1271e583a65d813d1d6543be5069

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9EM1SEHQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab9280.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9302.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8BRCHZ3E.txt

    Filesize

    601B

    MD5

    fe090a25cae211cf6758eec58a473625

    SHA1

    4aceb9f6d6809aad597cc7ad300f543a1864c85f

    SHA256

    c445d5755d5f7b6517dff7394a92a1da7e13f38efc95543898de4b08bc35dd0f

    SHA512

    c46baf6607ce7d0e1a8417f54b9c97322eaeece15752f46d7015b6126a18bd96234ba20172c11d2e8d21aea33a22359c853a70601321320c58e8e2a80bf02da9