Analysis

  • max time kernel
    121s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2023 14:21

General

  • Target

    rev_3286/ExternalBoot.xml

  • Size

    2KB

  • MD5

    ada14c9e12ebb088628c86ada31184e6

  • SHA1

    a2578366538e3de9ea2c047372217a3ff3ff25fb

  • SHA256

    4bd2d8e664271482adfdb53411298577d2bb7c5cf18a6fff30fd8f40abb17ff4

  • SHA512

    147a0d77b2c8e66a97d22e62d15248fc93c0a82d8529628a9612c7aac7dc48ccb3ca8fda317ccc0372e0c9001e8cdf8fa8d12e47d84412df3ddee0b1bebbd93f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\rev_3286\ExternalBoot.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    017a4c15a377358ba241b5ef70dfbabc

    SHA1

    3a6fa6defd63652c4eaf1b4bbe4f4c389465c387

    SHA256

    cced3ba282561bc36443895156573433f7df98151a3b8a77356e341188581ef6

    SHA512

    37ef2d77ba2b2b990087e3e7631bbefad78033ca22c7ab1fbdfab4d3ac70d61f515b3e135c3fd21c55f58bbcb06dc10ac186003582a84bcdea835e24d0ad6f09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6451e67a8093768a22949ffbe7beb725

    SHA1

    1e3ffed54f0c466a908b27993d4ebf442a63c75f

    SHA256

    5e55b6e9a374b928bf94fa5d89eec96d7509f9ebf7bf6fdfb22810af0bb3b478

    SHA512

    7c8429061d4c1a7d3575d102a9865d877464d827d43804b1ab62cf1be164d7699fbb18769d6125fa2ba85704b8e1d121dc73fa806979bd5221f46159ffe951cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50d981614eccfa18372ee174b4cc5a43

    SHA1

    c39c89c76d6fff0607e5fadb34506a945d053c05

    SHA256

    99f37a8bf7803dd230edadd55f405365342eceec3ec6790fe7cf9ab6ee499802

    SHA512

    af382a9c09df1c511ff071878caf5e7f9b610e99ed61db3969386dde0ceb01f36014bde1edbf1d4519f613b87de782a212ada6b4960ef20e645f64f4e1d47950

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39dce87d97c094b10b4fd0a183c739fe

    SHA1

    5d864ed0122bbcd709abf61197cce6383c51b6a9

    SHA256

    aae333ffdbfdb3ff075aef4ca9d7bbfff7c5a54954eb533e1f9d875642a875bc

    SHA512

    40f2c0a45e684fd0c7d85af83c1a1a297f1607cf4d57d246c137a0a30e05ea623d70427f79eb7ad52e8f2a6107289569baa0eb66c0c73eb5f3cda9a507efeb92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64a3543ab3266642a54ebcb3c08d9649

    SHA1

    fca90f47154393e12259be4044fc5f965f43ed36

    SHA256

    6f75b882a8b3d1ca313a3d92904a55c56530ed19bfa029fb3e719b525c89acfa

    SHA512

    b7663fd401a71e763118d05ca01a4db79d1d6bc79d3bdd9890727511cfa06c4aab215694f901775be3ac0c108bf10e3ed590e2a44f0d5e3ce08b0d4e5c27e1a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    440fb12370cefee5bd79217eaf91d729

    SHA1

    815bb649e7ca2949c561837f70838519fc44dae8

    SHA256

    cf8852ebc298aa421ba8ab66ff985320688c9fdb124f023f52317f21983f04d5

    SHA512

    70fe59b9b6a926009f4356404bf7cd0f325f777e5e6d9f5d9d8250ceb8befbfe40bc6e8b35563e97aaf94c5e4c4ba13abb6dee324fe3b073cb9392427b34aa91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aea51ae8f6be681fc7c170550f64d41b

    SHA1

    40a06f03b7bfd4c855a78838b02d4ba691eebe1a

    SHA256

    a6d5fcfb36a2a720bfcca6105cf11a33622d62090f16e975bd2ddd25c00d23cd

    SHA512

    5551ff0e1bcd8a0d23c81bc3f2767d267f6aa768ec7a983e3999ca6db5bad7f8f2d39ab840f68149d5c1853869bd6154334d8c0e8d90facaf86b81cf45290103

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84f79bec66114883e52b46f8b54aa857

    SHA1

    374c152f1d6a453ac11b39d25057892aa8fe27c8

    SHA256

    8cbf384cac45bb9eea8918622feb685a5f172f24c0e8337de6a71947bc25231b

    SHA512

    d6f78009d0ff9fd11c7179ab5b508fb3ccc44a9fe8d21d2d0581a6657e7688a8be927d1fe91b127ef7d1a2cf62ccb6893817a08051239f4967cba44b71fd25b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc9a579ea7bcb543501966517b0e85f0

    SHA1

    59447e7e825e663ea3c71f854889f0a0cc926baa

    SHA256

    8c6221374022bc4e91b01afafd49668d7b5851ea9cac70132ccec12f0f4f4b53

    SHA512

    d41c941de8717bdb2f487f2ddbd086f0c91d1c985c46470c60d80ac71d7fa256083fba588b49cb303f7f2b88b92d5c4d10a7fe1d78826ee2ddbe4161b6c39d0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b20b48dcc004576d40f414192e307f12

    SHA1

    d388b9e9b91db0675a3becc715d96b5a17c01c3f

    SHA256

    65ab4f273ecc2c5d512a830dc59d021100b631b38df3a42b392ef22e1e52adf1

    SHA512

    e5266e46a3c73c153125d6b871fdad4f2b6063183297ab269bf9722d4eefb42013ab7899a1cabb38c76350069b9449c976d999706a1e16a804fa2b0c8353a9bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb0a7da9c403c63a2172b104076ee8c2

    SHA1

    e51ec67d8f98ff282feaa99b3b62e394d99e0552

    SHA256

    0d7e3cf2e480e5808a05144be23cdec8f2f4913ffccdeb2177d4168d8da34209

    SHA512

    f6f336760870e348b69231c8695f5078b963db27c30b2889fc4f02ae27fad5a9330722089985fd6a322db4d3c8f2a644b79dd47634cb8152b47af5e9287c4f7b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9EM1SEHQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab214.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar342.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QLW8VKFZ.txt

    Filesize

    606B

    MD5

    c504ee1e7128fd772c18d10aab1b59dc

    SHA1

    2ccf767b3321b4b560ed70d3406a75ffbbf39025

    SHA256

    f1680ec848962ed6409e998e6bb0e64b712b39da23db0447d92a0fdefd8a661f

    SHA512

    07e0b85abae3d8bb344da5326e2053b367d45b688a7b0d7281308ea6b6fca136176b967ed559b6a03a9aa18b4282d3b31816f8914786185f67af97ede6e4306f