Analysis

  • max time kernel
    162s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2023 14:21

General

  • Target

    rev_3286/WinCal.xml

  • Size

    1KB

  • MD5

    bede56a7aef6b3db49ab7d2eb3f2870a

  • SHA1

    bc18289b953a8ac6c0c8e519f72e6adee933ff98

  • SHA256

    1fc29fc668043aa03ffeb2d61868d3369479c3cef2c4725d162cf5344dcbdcfa

  • SHA512

    2bde0a5f1983b08379c262f86aadf8635834674981faf7feb3ebc39b12ece95b21203be82fde2fe88f6a662836374a7ac3d6fb8057d5273923259b3af206a3a6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\rev_3286\WinCal.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc75b5ce07dd90f96372bd7540abbd05

    SHA1

    988d81b86122ab225125e8439f23dda3d5cb2dd2

    SHA256

    70feae3f51a095360a6016061295a510db728f219af3694f69ad8e301d9fe9ff

    SHA512

    51d3c715849dca5a6763da2bc979d64558e48b9eef0c4b179707b132dc19f1b6f5f8f93ed30ed6a65703a70719b7466ad770ba385845b93f6a6b83e5f167d91a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d44e514a28470fcd1cc317aa93c440ca

    SHA1

    f35ab15aff1882cba8ec3077ca8ca17581ba1887

    SHA256

    51f33be0c21f7c5efb4c47db8091676890fc886d185c998c76fe2b1129ef766a

    SHA512

    d3b46f7ae5f98051c26f2b13a2eb2837e0a1c39008bcbce2d550f242f84b19083447fa1695c3698f8775f5ca93b69959946ce13c9b08e0f4ac168d0886d5dd1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    239f71cd2ecf1237a50504b84cd6ba0b

    SHA1

    c3b5562c7ebbc8cb1c6d0500ec66a39cc88a9b0a

    SHA256

    a7d2733f87fe0ff980c783e27edc63ca70554532f90161aeac5a0a39a118beda

    SHA512

    512e1a51641ebd5756ce6e2a6d42175a7d3305b8ceed9d591efd45f67c3cdd5ad189e40ccfbf166e6519be147b9fb66661a2dd6ffbff7e9622c709d3c147639c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e446f4ef6277cfb10c4675dfe5f1752

    SHA1

    cd3a0e9f291673b4cdcfb5f6e083024c4a49a001

    SHA256

    154534b1027ad19c55a8c68cf66d510b26cf4bc5698380078ec220a515b36a8a

    SHA512

    261025ee72dca55c29291b0c2f4c0d0cdfe8b7dbeb6224d4cc4e0c148e642c42005232bfe5f24cd3cec4dc104420271ef47e3d9ed10cabad778ac8d2928f20c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    152b1bdc0c84ccd570a2e8e5aacb3dff

    SHA1

    6c7a01363210090e2e2c3a178f0cae9eae997c49

    SHA256

    d282bc738714993541e6e0cba2922961c6c840cfe8f7d5b14efd5b8b501ae81a

    SHA512

    d1f971be720b8ae4fac245744fb06f1d29246150e77fa40ded0d134eebc98a6f21c0b8137bedba04530a0dc264e75991f1f712ac446b3c9a286abc3da1398460

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01c095334d763b7c9c13cae036dd3185

    SHA1

    0892f527a8f241a015c2df677796c12d54e60f1a

    SHA256

    04c56559f4ebd50c27a0c4b8211b732b32a1ff7da3bbcc76be4c0451e3e03e4f

    SHA512

    7189a28985db9c123108d1db3f3fda49c527a5d090dc669e6e602d6313f601f989254596c2dcf3a4c6ecaf71c0d94bb8d7bd366a8ebf772b6abb1e678bf838f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c299af79a7c708c56254876f0b00b16e

    SHA1

    1fcc432a5a0366fdaccfb5712242ea4794b1dd35

    SHA256

    a5f0781e065e01faf99b41cb5e5767f6a4bd70c91ef77a1781fb19d0e9e60ab8

    SHA512

    641a660d54ef3bd81a536de3c73fbbef9ba3f392010fb3e71c1b5d486b05e83a646168d668889ecee36d6096c5e23fe43851e067b27f06095ad1a70573c5851f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68ae28b75b0e07aab1078b0764a62c14

    SHA1

    96380c0bba16e54558a95ec0c7c5dccee5e5572d

    SHA256

    921d4c3a88dccdfe61da666436e134de43742cd905120bdd538d28a2c2f3fd6a

    SHA512

    5e08b95284c9b6fb59546c68c1b32cb846a8e62ed5447451100971f60c611ecf7053e6fbbfab010f5c37c7ba224064bce3db046e19bf510192b0b3bfbfee83c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d08447f04ae4994fb3ddf1fa174f2232

    SHA1

    5d937fc5d9f45d1da0d12848df42b87a3cdba095

    SHA256

    25f9519dc799b74189c9f5ca28923c0d68c452075a07693f804dfd63739900f9

    SHA512

    85bce1c7d35ccb7816f1dd0cc366061e28a122e1c2199b482a62f21c780a53802ca9c608bbae0544e9dc68e71b5706ff097ef8efb6b92fdc9489bfedd94760e6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ULULORKV\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabA056.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAE7E.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QK8YU2CQ.txt

    Filesize

    601B

    MD5

    e6332f49987227395d5b960398c14867

    SHA1

    381e04a4e1910236c43d287299325b4c8523a5e8

    SHA256

    6cc478c83eb8b7ebc46478b52bf013a6790a4674669bf57f22a624e3a4ad222e

    SHA512

    dd5e129610b9065be11e5e417c35682aaf9873ec02007ecf78ea3f5866cccd6f00eade0d4aab2d34f64c773ccd1c44678715eab8f4848531698fdf69cdcd47b6