Resubmissions

19-07-2023 21:16

230719-z4frlabb95 4

19-07-2023 21:13

230719-z2sndabb89 5

11-11-2022 04:56

221111-fkt1bsbcbk 5

Analysis

  • max time kernel
    135s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2023 21:13

General

  • Target

    var www html kemhan/wp-content/themes/menhan/fonts/fontawesome-webfont93e3.xml

  • Size

    347KB

  • MD5

    76a4f23c6be74fd309e0d0fd2c27a5de

  • SHA1

    2b3c8ba7008cc014d8fb37abc6f9f49aeda83824

  • SHA256

    7414288c272f6cc10304aa18e89bf24fb30f40afd644623f425c2c3d71fbe06a

  • SHA512

    b0bde727e026bef3051ed0c98d3b315a7d72a421036628490b3a11c56276bc9d4c8c8c8d608463609550bb94eab7cb5f3216d93682053657abe1f7e01b287f3e

  • SSDEEP

    3072:Unw+ubvqCDOzA5vK+jRwXxSbs3cMrNKyOATzr3Omq2OE+unSGwd:VNlFyGL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\var www html kemhan\wp-content\themes\menhan\fonts\fontawesome-webfont93e3.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9f73a1560b3ef442d6c9609adcfe260

    SHA1

    87b4b8aa7ae44e0996b279df7ca7884d581f1a3b

    SHA256

    32155714bab5ea373aabeaaba0cf3df77ea3b3fab0824286eb1165763abda8dd

    SHA512

    c8bcd8be52ef1864eb30c278eee42d722d423ed6b2ada45e8540d78e6e32450f160e5e3b278a6fd8556b8afeaba416df942077dec258014146e572e0bb6f6beb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    199200b2a4c13b3052479925cffbc680

    SHA1

    a146bcdd949355ed715408e1e7eff0a0871b8d24

    SHA256

    8cf542f7fdfdee9397515d1e159f006cb9cca96ecbc9c4e18978bb614bd2485b

    SHA512

    ef516010481a8cbe4c7c2220ef4ea0fde9f0266c7651219517485436368bee466b9e8c03cffc16c4b09625970b656e6a326b0eb646abd8918360d8b11d1a5901

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4eb6f7ac6a66f51c3d2c654c04b9d464

    SHA1

    ddcbc0f25407ac00c292fcf3001a6d89a35ef5e9

    SHA256

    907fc336940a178b9243cc21ad6bf828a262196999022cc29926358307d4ece8

    SHA512

    6411c3e30d3c4ae023da32dd890c238c0341b3af63fb43ef1ff12b248f090a205a94e18953ebbef79efc483c9e0c03f0d578eac17bbbb9d0f67dbcea50f418f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23613fd3050420881c6c90a764932651

    SHA1

    7149254f055b256465efc7c036bdf489516d6246

    SHA256

    0685731c756e6f062b7e86fcd85521087eb39c3c301fe442aaa902e5a027677f

    SHA512

    d833aec874ebc20a2acca6d00d53e323f27989b5a4bf5b6dbb9c24ddcdf469fc8686c078e302acec530f46b5847d022356337a555831af62a103d1fd55f7660c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    891c15ba68ac039a8ed5bfb4e45e1652

    SHA1

    8acd051a38cdd37dc5385777b50124a0cacf1a88

    SHA256

    b0d84885de29f808a5ea7171789ca68596093703b72f88c68bf31c40a86d5174

    SHA512

    287eb3df3192c45f2945f00103035d5b426453ceae23d02839fd68e66ce93adb51edfe621c5dbc034498476c620e26eec4ca0261952f8c1950abbe8b9a4343a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6b7868239a5bd168d38e558cdb9ab38

    SHA1

    5fa3e7cc5e3395abc427cac08f619836947c625d

    SHA256

    6f7634a177973de1612018134c3fa45bf379eeb2ab80508a487f52a8ee0e154b

    SHA512

    f9d75648cb2c2ab2631a4a2f51c8b0e18bdf3147f55ff0bdea0af9d0b87bcbacfe2ff7a98eaf73bd2f90871ea058a3dac9b3cbc7e053c20d7929335f1d6decf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9dcb76ff51adca3eb852ec02ebd3e092

    SHA1

    d5065f758744056ef364570f24b48a63aca4aa0c

    SHA256

    dc90f586df024f68a74ff694bed136f8fe4cc19766524abab0a12631b36a490d

    SHA512

    ce1de78079248ef5aeed85d7f3f18f19f6641640cad14b048486f154477372bcb3ccfa5452d6fe9e2a5bef9ab1dfb1fd1b284a94b59c9e5cf9e616498075f4e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57ff3640055351d816b3942b8958f01e

    SHA1

    3af61d60acf731b33c2e9849d24c9621715fbca5

    SHA256

    7ed918992ba97ffddb135fe77255155a0855f6367089fa6fa5d379da5c06c5c3

    SHA512

    00058bf304db28cc362f8a7e63dc89dd609cbc0ebada9504580c656f76babc76531de8e087d9e65d253a4c8bb4c16b14212e2ed07203caf6067f5ae40e401ea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6f47cdc0dc75a55440430afc1a555c0

    SHA1

    504f6738dc655e8b060aad639d1591e4e14aaeac

    SHA256

    290f68d020703179ee18f32da14685085b2f3b2e70e7e261a032559f75fb2f1b

    SHA512

    81ef716ea83dc4faac762cb8086b4df5efdfe6f1708de74857d0ce5661cbce28bb3a8c86b90cd7af02ee49fa5ebf7ebc212152ed7df6e461996397deb363deb2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O5N1CMJ9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabAC97.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAD46.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0NNG520V.txt

    Filesize

    603B

    MD5

    22f52f7281c0a36abfd4479e9a450c71

    SHA1

    7270ff93d3c4f9f5ff45a68644bd6477cec1eb1d

    SHA256

    3b98acff83ebfb5a412b94fb70b5ff607f4b26b4abcce535829abe558980dacf

    SHA512

    2bb9d1ca0f1f638a73abf1f628cfacdf1bdaabdc9f1be219afd92042e5207bad53f3d3f6cc1b13542064d36bb5e3f3274c349695d2636b4bcde600ff4280855c