Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2023 11:29

General

  • Target

    configuration_filter_beauty.xml

  • Size

    3KB

  • MD5

    fa59d18bccc7555afa1914dbb6e46530

  • SHA1

    5d26f679b5308d46ca6f16464fb86e16df151dc0

  • SHA256

    f593d5b845fc1d321e13b77475423c5f275dbe771c4d743dbc2f8cf6378545ba

  • SHA512

    0a33bf3a412a27b35a29e18f62a037af56a0c100e7ff2ed20b5e893afba29bf32716fe4d06a85c2d2e947539d28c2609262fdb80627152d2ac0646606508dc48

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\configuration_filter_beauty.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dfcee694c179e460a1b83f4a532f90db

    SHA1

    58b07740c0c73acb2963153f5ce3a74950d9eacc

    SHA256

    f789b696e2f23b9acd542831d04e47af6b9e481107a72310b44108848dfadb71

    SHA512

    c44596fafeac4d8b1e198e5091e2cec0e48c69b55cf565354b928f0f4adae271a50e943fe49ada7e562a34ab84f2db4dd44349881ee51b3af870129d8d1cfbdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e758c1ffedf411bd203894a6c1830833

    SHA1

    34b2320b1ac94f66883d9b81c9ca321db8a8c64e

    SHA256

    009858c4f67cd366497aa360397ba73d30db81933a274e7e51dfd74a62ebbb3a

    SHA512

    ba5446ffae1b2c984e510ae8d2bce72cf2386b73a25e6800361483faa05a138e2ce39d1fc3f1da5ef532fbcdb0ecb0df6eead02a51b7406e279dae19f5b16278

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23f4939a8854d2cd61b403178c14594b

    SHA1

    2273157e67ef6876d9dc246523e92c2630f805c0

    SHA256

    a5812fe8a547b014bd87075ed504470256e6e4196c8cb94020e35366bc735c4e

    SHA512

    db8f844a316ac06f307241a3089d4b3e69a66fa7163f31ed9a03777564b50fe9af60d718620bb1155025a1b948aebf381c2ddef2d2582ed3548ffd6e820fb0f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59f19b8242376fd654ce9f1736c86175

    SHA1

    00622fc317b499148388ae66f4b3b246541c5275

    SHA256

    d25413fe8912bc1131ab8f833e5753e42c28fb8edc209c8aa09df240cb469868

    SHA512

    60446db56dd43e69632b530065f3a28eb0612dd8155347e3bbeff59d2922e3b0b8c2e759caf8256b7a67e6c8690bd42ac766686d8114b9e29bab0237062e2ef9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44074a93c0b29836370468a0f2bd5b0b

    SHA1

    591e656d6d40e1b79d1d6ed0df8798f459c3deaa

    SHA256

    8d901adf9cb77fb5e4c25ac469e0a106af358704f916f5745a034c9b3ddac76d

    SHA512

    713ac35e4923a553ac31a04a3c81de322094155549025d4c9222b4bcbee4e787034acec5665536c414c1b420d4f6be9aff08dd5dac71fc713130ad8638c25ccd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    681082e68fc920261d44a2f339b60b53

    SHA1

    5d676e660c6388b1cfd157308741005ef3234c65

    SHA256

    1cb4ba9706f830e8e126d218c765669c1b7aead4f9aa81fafc1c9f807c0b5c67

    SHA512

    940316a198d0f1f92ba1e06a4f4cc7578d6b62af6aa4586259d9afb91de3b7ad3a7480dddc4901267dec6fd0bdef853ecaba1feedce9fa858ffc9f348c2ebd7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2AKN11NC\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab8F84.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9092.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KKRW6OAM.txt

    Filesize

    606B

    MD5

    5c86caeeaf82637ab58bf87ac1d2621c

    SHA1

    baff1ea8328f6f610ba459104338285951035f49

    SHA256

    ea6f262f7d0f04a34f49047e133556e9cbcb61f67793de9ccb73725717fd58a0

    SHA512

    a8bb0d70e99d7ef6368fe80487f46b2a66710e00cb513f63ef5fa37c950b52bfdb2676f6ca9b946fb714657a6d9764d09000a9cbd80d9f5d1a1c0b397342f1fb