Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/07/2023, 15:58

General

  • Target

    diamond.xml

  • Size

    420B

  • MD5

    2effe63f1f3ed1de34c13964e0ddc618

  • SHA1

    052b64d10a4703f3ef9617221834bac8ee954582

  • SHA256

    cd623d8f84a9bad0a1fe67dfbde5b602a0c01a796c165ed4b2baedc7a47ba575

  • SHA512

    88e71dd54c43b2b4b482764084637d251ab4ed7a65e74b53c765d59928a146bfdcd7a23ce4ec20421b449dc890b8b11baa430ec30f96574bc588a48c9f5f40ac

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\diamond.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2452

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4d0becbf774ca733bdf17ed6986d801f

          SHA1

          3b66757139a2ee117341a3d32bb4fa496af8ed87

          SHA256

          30c9ce9082a9b0432bcd19ecae291022b555f36b5df242c424ae02e40c61f85b

          SHA512

          c2075a1a1b03d1764da3c05f6d8b1803c77e945cac61cdb876db2ba454e67c6b60c81de80ce3d324f8daa3d78f53014460b1ee7046e4b37e252908b29355e42f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fe1aff7d23ffe96362b6462d125156d9

          SHA1

          c2f421a8953632f42c8f7caf75c1369b6635d59c

          SHA256

          02c9afcf3457423cd501bdcd78f4a02c640d2740e741e202a91e9977f905da2b

          SHA512

          7323bb4b8059e58a57f8abf1626809e44d8e0c50526459089b451bbb55d6235f64ed14f586432d7eeeb842cf4330b0eb8864bcd53e7ce537d0b6818e79f37c26

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3580b9b4f76e975a97373d523d991f9d

          SHA1

          1d1bc9cec4d53afaef34250169c029b6858f7b88

          SHA256

          203ea6e6de7f014aec0bded3c7ec3be382bf5e2331c599b1fac843ebb8588820

          SHA512

          453f71bc40c390443df16ff9509a3cac6c31b353e384d425cf7347f73bcd6513178c18632abfdb11cf32fa15492c84af5d25e52117d2e999fd138aa091269a57

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          68291089719571efd4dce82623818fbe

          SHA1

          dbd59eb732485e87cd69f4fdb75c92488508ab93

          SHA256

          67ccbf0e0b8d3a0e46d1a325c95bc10176665167b022ea466ad8afdcd6987c0f

          SHA512

          ca68184f182b44da9acc999f614b649b0854e5521fa729dda28681bb40fe978c3bc3b677d578d35dfa5ca9b79864de1cbdee4e3332c345a279e4aabf7f27d709

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          23d3d7ce0b7109a84c245612b451e1c5

          SHA1

          36697e27e52f34a6a1920d731a864a65ca109e94

          SHA256

          9c418572ea0c9b7b0a0633058c16943faae9b89c8a93222ef8bae18e45a98a1d

          SHA512

          aa77b1346c2554b4b2fb3515698207f1b374bf8332e01360cbd11585a8da9923c60decd129a0d6180168c0b0464276f8bef2111e45c711e65a8c33016ef9cb5a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e4637a4e3d8a0dea47fc8c661c1c3a40

          SHA1

          7ee59953312f9288d7283af96547cd23eff1a9ea

          SHA256

          0ce1d96aaabf6357a4bababd2c093999775a6cd40e0b829f02c3ab874d7726f7

          SHA512

          c2d1bcee5e5576fddbb3f5c6e38156fbb4bef6bcbca0c1dd61a5a02f5621f6e9e67b289e47ab0240ada88bb463d5d4571d92601cf4a9474e85e2a486d008feb2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          69fe461dba830dd8e89091e6b0640e9c

          SHA1

          451baaa6afcb8439919c4cda8cc8390f5dde7ef0

          SHA256

          07e5d05018de37d08ec8b078677087431e9b510d2bb84c8902986f19969ede9e

          SHA512

          5c797ec9db7f1bc69073084c913dae1e61a82e42949140787b214620983217c8670155c9791346721582ddb672689df78d6d04b3c12af6f75d9105737f0cfc54

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6d613965a8ca8d519e0db394d5bc3195

          SHA1

          e9ece08b09843bc2238f77ab9ed504cbed2fbff9

          SHA256

          53b92a0b57686c7cbe7ad4d15e538e8f189d8730a9d5efe7057eaafbed93f246

          SHA512

          0ea4724dcc2738a165a5d9a16dccff620913f384ad521af3a880e1e68734762a643d892ad8b227ae953f6fc4b496152eee029af1789026261fe7194aca8a23cc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          535c2e2f9a68b97a915542b41a80fbf0

          SHA1

          195e1c4ac98402ad5052e57f2c96e1df375f46a9

          SHA256

          5b14632bee6d855dbe0b2a627f5e58c4413b079bf87eb3a56176dfa9845d48c1

          SHA512

          2d2013f5334431a0db749e79bd2e92fbf70c47621288d7639f185f3990dfb0a4e608eac2401f50eda198758675e70d6c54e356e628269f46012e7827a3ff06e0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O5N1CMJ9\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\Cab9129.tmp

          Filesize

          62KB

          MD5

          3ac860860707baaf32469fa7cc7c0192

          SHA1

          c33c2acdaba0e6fa41fd2f00f186804722477639

          SHA256

          d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

          SHA512

          d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

        • C:\Users\Admin\AppData\Local\Temp\Tar91DA.tmp

          Filesize

          164KB

          MD5

          4ff65ad929cd9a367680e0e5b1c08166

          SHA1

          c0af0d4396bd1f15c45f39d3b849ba444233b3a2

          SHA256

          c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

          SHA512

          f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\60WABNJ1.txt

          Filesize

          608B

          MD5

          414c96f8fddf0a8d03e24588d02eefb3

          SHA1

          f2da0bbafc486dfad62b15d5b4b12329afe27c25

          SHA256

          b4b21cb289c54ced52944f01903c913a441cceb95cb2f2e06746f3b946053299

          SHA512

          64f00ab93a1f5c43e29f216fb3f9c67553f766f5c09376373929db64154c85558e159ce31ecc567001415cfab556025051c1026ac815e8fc1357fb75d78b519a