Analysis

  • max time kernel
    141s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/07/2023, 15:58

General

  • Target

    default_shape_star.xml

  • Size

    617B

  • MD5

    5408b4ac66d1730f81e48c2ac3ec27ca

  • SHA1

    41bd30ec87e98f20f6501502dc454659f60fee12

  • SHA256

    d61c5552c72ed7b1307753d1fead5f2a423d22a8342ec389285fae9a35834775

  • SHA512

    7a60f4597328c41d43c3fe73a7ab0856fc84d2fc6e6e6c13850b497a9bc67f27485eb1be6861afab476713d39480830e299373b4c4f835bbc2358b18806e47f5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\default_shape_star.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2340

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b2fdc55279c5e006852b95894528ff28

          SHA1

          c741d7995ee477980ee593deccc54cae50682113

          SHA256

          9ba28e913ff26fa49c8e5a13a4f477973df9208db37ec427746fb72e8a5f3b27

          SHA512

          234cfa0e57718c75036f0aa22abf1a0589a9b9494fb476adbcb87b3ac275d3bd7dd269a13e43f79dd682e9243f4d4ea224d71d294bea07e6319087a2691aedef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a8195fa7308d42b7ace6667f66057629

          SHA1

          2166f4a3271a2a11cb4c2c6294fed742ec95fea5

          SHA256

          14b8349e7774ca3deee95bd4ce7413f408d7e2cb5fd5a3c805a0ac7cd2aa28da

          SHA512

          e486c27dab53c17f42cf0d430cd6da5dcbd3ebd8ac26c2920cd6b3bbdf50963a7a454cd357062f1ab864a3ad64290d298aa1db7a2b11cb45638309fba713a6ae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          28bd5046bf63e52136ebb4bd8929a605

          SHA1

          3c2e126d0de5f2c5e1499e714cc15f76ef2f125e

          SHA256

          9764f8623397259cf17507a438c95ace2515fbafff347f5c654ff7e422548b29

          SHA512

          483a4d15d733947353bf43e1ac445d41427268b55099f7ed26cdc47b409f7bedc688d78b611b11fe21cfd624ca70a156e259db41107c96f21869e894e432e7a3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f30692a410d7ae7ae4f1c43e57c85a3c

          SHA1

          f1008686da3cc518ffaadf0dbf98154c74002da1

          SHA256

          c5af3507f103a8b8c1372ea69c6659d6ea3ea7b5be88df35a040a482c77aa151

          SHA512

          d3491b3c872d3ff84fd122ac90a9aa70d655342abe6e1f7f727ce9b6f441411f7419a512d5f5fcba16281a0024238fe1ad142da1f69de3604048def252fe14c1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          241820b3ca8227b5bc9e0550c1978ecf

          SHA1

          ebff9281a7e7e7615fe9d2249b3f08cbf3c92277

          SHA256

          51a1176eb1713d3fc4016fd7e252fdc065d69a4d7067c60db2b352edece7c4a2

          SHA512

          d5dedc4c69a10f44ba758796411aaa828b8cd31570e01bb8867da4be1ee68046acd6cc634edfe55db0c880ff2269616bf5d1b11bd73be7a1cfa1e7b9c6bf751d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          622073c8a9a1bdb1b8d93378dc687d18

          SHA1

          84a0a05b07bbe136d4045b487c4888515f5975e8

          SHA256

          93198e797d386efbe06bfa1c2f03cc3be9f33aa5b8f43c6fbb33a719ec6c0979

          SHA512

          60c1a73a17d789104a2d5e73ef39a6a6ee073fb5194899285b9dcd847273efed01748fcc7d810f00225a555450073a560a3548392c6ba2e6f3b4b02f4812831b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d9f87f835a354729b6e70da7fd08d645

          SHA1

          dd93909741a499ba5981719d9c18ffe6872a9326

          SHA256

          5b78b8a8b27c7c7dd398b9efce9c2c6739f3a0d07e194d660d199920c00d84b4

          SHA512

          b4628145448b8d5a50c1b21c2312064ccc9c9a622c87659a134b9a6155d85b1777abc0afcf0b9c96981752590c9ae4abd51175b793d11d965eb4c26b3f07381f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TGCFYHZ3\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\CabEAED.tmp

          Filesize

          62KB

          MD5

          3ac860860707baaf32469fa7cc7c0192

          SHA1

          c33c2acdaba0e6fa41fd2f00f186804722477639

          SHA256

          d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

          SHA512

          d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

        • C:\Users\Admin\AppData\Local\Temp\TarEC0A.tmp

          Filesize

          164KB

          MD5

          4ff65ad929cd9a367680e0e5b1c08166

          SHA1

          c0af0d4396bd1f15c45f39d3b849ba444233b3a2

          SHA256

          c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

          SHA512

          f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6IK3I5EM.txt

          Filesize

          606B

          MD5

          eda4592d763a941b67c775f85e3601fc

          SHA1

          a0accfe438f1aeac07220e7b4494db2cd692688c

          SHA256

          9b1fc71b15468c95ce45b5412308ecdda07fa51e40272f2c2824e10febcf7813

          SHA512

          9db70dff0871ac43ca8f6196f005b3ae89816b2414d14c91d45f269bb6b502c4ecc0c1d96d282e18a63159f8f78a4d32c6c3cd334a4fe716b3cfa046fb13d2a9