Analysis

  • max time kernel
    141s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2023 15:58

General

  • Target

    default_shape_star.xml

  • Size

    617B

  • MD5

    5408b4ac66d1730f81e48c2ac3ec27ca

  • SHA1

    41bd30ec87e98f20f6501502dc454659f60fee12

  • SHA256

    d61c5552c72ed7b1307753d1fead5f2a423d22a8342ec389285fae9a35834775

  • SHA512

    7a60f4597328c41d43c3fe73a7ab0856fc84d2fc6e6e6c13850b497a9bc67f27485eb1be6861afab476713d39480830e299373b4c4f835bbc2358b18806e47f5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\default_shape_star.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2fdc55279c5e006852b95894528ff28

    SHA1

    c741d7995ee477980ee593deccc54cae50682113

    SHA256

    9ba28e913ff26fa49c8e5a13a4f477973df9208db37ec427746fb72e8a5f3b27

    SHA512

    234cfa0e57718c75036f0aa22abf1a0589a9b9494fb476adbcb87b3ac275d3bd7dd269a13e43f79dd682e9243f4d4ea224d71d294bea07e6319087a2691aedef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8195fa7308d42b7ace6667f66057629

    SHA1

    2166f4a3271a2a11cb4c2c6294fed742ec95fea5

    SHA256

    14b8349e7774ca3deee95bd4ce7413f408d7e2cb5fd5a3c805a0ac7cd2aa28da

    SHA512

    e486c27dab53c17f42cf0d430cd6da5dcbd3ebd8ac26c2920cd6b3bbdf50963a7a454cd357062f1ab864a3ad64290d298aa1db7a2b11cb45638309fba713a6ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28bd5046bf63e52136ebb4bd8929a605

    SHA1

    3c2e126d0de5f2c5e1499e714cc15f76ef2f125e

    SHA256

    9764f8623397259cf17507a438c95ace2515fbafff347f5c654ff7e422548b29

    SHA512

    483a4d15d733947353bf43e1ac445d41427268b55099f7ed26cdc47b409f7bedc688d78b611b11fe21cfd624ca70a156e259db41107c96f21869e894e432e7a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f30692a410d7ae7ae4f1c43e57c85a3c

    SHA1

    f1008686da3cc518ffaadf0dbf98154c74002da1

    SHA256

    c5af3507f103a8b8c1372ea69c6659d6ea3ea7b5be88df35a040a482c77aa151

    SHA512

    d3491b3c872d3ff84fd122ac90a9aa70d655342abe6e1f7f727ce9b6f441411f7419a512d5f5fcba16281a0024238fe1ad142da1f69de3604048def252fe14c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    241820b3ca8227b5bc9e0550c1978ecf

    SHA1

    ebff9281a7e7e7615fe9d2249b3f08cbf3c92277

    SHA256

    51a1176eb1713d3fc4016fd7e252fdc065d69a4d7067c60db2b352edece7c4a2

    SHA512

    d5dedc4c69a10f44ba758796411aaa828b8cd31570e01bb8867da4be1ee68046acd6cc634edfe55db0c880ff2269616bf5d1b11bd73be7a1cfa1e7b9c6bf751d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    622073c8a9a1bdb1b8d93378dc687d18

    SHA1

    84a0a05b07bbe136d4045b487c4888515f5975e8

    SHA256

    93198e797d386efbe06bfa1c2f03cc3be9f33aa5b8f43c6fbb33a719ec6c0979

    SHA512

    60c1a73a17d789104a2d5e73ef39a6a6ee073fb5194899285b9dcd847273efed01748fcc7d810f00225a555450073a560a3548392c6ba2e6f3b4b02f4812831b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9f87f835a354729b6e70da7fd08d645

    SHA1

    dd93909741a499ba5981719d9c18ffe6872a9326

    SHA256

    5b78b8a8b27c7c7dd398b9efce9c2c6739f3a0d07e194d660d199920c00d84b4

    SHA512

    b4628145448b8d5a50c1b21c2312064ccc9c9a622c87659a134b9a6155d85b1777abc0afcf0b9c96981752590c9ae4abd51175b793d11d965eb4c26b3f07381f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TGCFYHZ3\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabEAED.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarEC0A.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6IK3I5EM.txt

    Filesize

    606B

    MD5

    eda4592d763a941b67c775f85e3601fc

    SHA1

    a0accfe438f1aeac07220e7b4494db2cd692688c

    SHA256

    9b1fc71b15468c95ce45b5412308ecdda07fa51e40272f2c2824e10febcf7813

    SHA512

    9db70dff0871ac43ca8f6196f005b3ae89816b2414d14c91d45f269bb6b502c4ecc0c1d96d282e18a63159f8f78a4d32c6c3cd334a4fe716b3cfa046fb13d2a9