Resubmissions

21-07-2023 03:28

230721-d1cpwace2v 6

19-07-2023 10:57

230719-m188hsdd6y 3

Analysis

  • max time kernel
    135s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2023 10:57

General

  • Target

    configuration_filter_beauty.xml

  • Size

    3KB

  • MD5

    fa59d18bccc7555afa1914dbb6e46530

  • SHA1

    5d26f679b5308d46ca6f16464fb86e16df151dc0

  • SHA256

    f593d5b845fc1d321e13b77475423c5f275dbe771c4d743dbc2f8cf6378545ba

  • SHA512

    0a33bf3a412a27b35a29e18f62a037af56a0c100e7ff2ed20b5e893afba29bf32716fe4d06a85c2d2e947539d28c2609262fdb80627152d2ac0646606508dc48

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\configuration_filter_beauty.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5479150f67157f373fe593320bbec7c

    SHA1

    566482d32bf9eb8a6fb255951e453c40fbdef070

    SHA256

    6eadb448b3379300908ead04ce2e831efe43f27b860c162efa8976c12b19c550

    SHA512

    ca65468e260b38dce445784a7f8cf61322aa2afd95b77cbbddd29f00019d301e130946cc6ce535e9d656381607b66c332db470057306238cabb1c18dade73a93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3e255d963721aaddcf569f7819fc546

    SHA1

    de26e762796e5ef96f649bb3f8a07a620149f75b

    SHA256

    4d90bdc72887cf77987cf13e6adb6842a7e0beee40647dc290dc7478df03f205

    SHA512

    67992f0dedd8375aafead02276e6c2cb80928e0310dc65cfb9e6633ce65aa3288cb71e704c9b9d35011fc7ef5c80ee2bfb1b5bf70d316ca3ea7e6a61cadd9105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ed71aa3d6901732ff46bcf0e38f4270

    SHA1

    0fdcb31157a24f9de5cc088136e4acffc68ee688

    SHA256

    c97b194c1fbf5832de901b3e466625ca8a7a15030938394036f547faede78a52

    SHA512

    5e446b446796e13289f3328edd83b0e970efcd04e26e220ada040db2ccfdba8e977715b372a16bb5d3e1222a856b6816dab76e3901f343b090c49e1a970df2fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10b1cef09b599c98fab42d80f89cea03

    SHA1

    f298f9e3f2187cad11c2840a5425b5a8652aadfa

    SHA256

    0ad3b290b225c083e201a224e221371b09aa317346d509cf5af8831ccd44a4a9

    SHA512

    c1491d67bd8786ed27ae2a564b942732ad5ab8717e9feb6d397afaa86ef19851a8d30b98d96e6d8ca2aeab8a7cfc5cf624caf3df86ea6e5657f7728d14a3a826

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d43bf0e58cc54816e9be1623c338572

    SHA1

    79aa7d293bde1942f0650f5b7417ba77e590ebf5

    SHA256

    633b1b9ff9a903d65ba323c92188ca0859accd5063862affa24699665d349ce3

    SHA512

    6dd08a07e2a54c2b2b78a1dee2410bb17ffe1ae1bb9164e0fe5da4b89a20022b2023bd66a40cec5ed70f06f75cb802064a1d9b38310a189f437139f2285ea1f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59353f47949928780902875966c84349

    SHA1

    78704f636d15d7c9f30faf5113b04b0fd186b032

    SHA256

    b2e43a1e013df508935896b171e365f6920d1b212aa0c0a7a40ea86f002f915f

    SHA512

    271c2632c9c60539bc6bb6857c32efb825212e6ef69abb60d23f5cfb12ef4d3f1f182a68985d51068642508d00fbaed1a60a39b736df56c9f7007b537bef8fd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b68f4a44288504d33d4fe4510e335da

    SHA1

    2815f44f73f698a41c84768619edd8ee9f95518b

    SHA256

    1881e5066259fcfbcc8b366a9664c9a4c7fcef87ba4d2f93fa875235a30c9770

    SHA512

    579193ba2b248639bc62664b458511c40446f081e96f2f57f99d4e0eda11701847e16f56b3b4a135ebe3dc341da9a79c830a680922c4e9f3382aa63b5f1cab16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57c8f91b327dbf1c4e212434819f894c

    SHA1

    e1bf6366b2cc92db18b336ca1147b2da6fb8e736

    SHA256

    60dc58a1b321db10c4e28d90c3af741cadd8b7d2778bbf5a02faa89d5e7ecf1d

    SHA512

    b5b335d23a9df58ea2a2abac9d777de41da70e95cc7af19bd0780784b41a30d545b16ebcce008078676126b36ead70ef7ebccdbf512c13a86699a90bea0e8749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4fec7a1574ed34cef723e61a8aae8df

    SHA1

    55237e0cbbb511acb9e513a9f73ffa3ee56473c6

    SHA256

    6ae86cd874b7d942f8c295422f91e2d72e693dc782482e1f8aed06463e024657

    SHA512

    cb85e4c90de6ecdffa48a8a7b2331d1702d4cb06571cb5ac8a7df613142d3ffba766005902ce4f12e5977f3e2040e269310c2214771e8e80fc42d97e102d1751

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ULULORKV\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab94F0.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar963D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\57F6XID9.txt

    Filesize

    606B

    MD5

    774763063d191cbc86f98c44fb9ca3cd

    SHA1

    a82cea54b7f81a123c8a71cc2899392dd18cd059

    SHA256

    062a09997d0025b5d7787e560642e15fe83087def42bd915993e794b350b41b3

    SHA512

    558a55512ea32642e207411d305eb0baa9e56ede7cf6138fbbde8961ac69dcb0ee96bac4239f4de28abdc233bfe7b374b45c6885f36c75fa78c9d7b1bc52102b