Analysis

  • max time kernel
    150s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2023, 20:51

General

  • Target

    GD/Resources/CCControlColourPickerSpriteSheet.xml

  • Size

    5KB

  • MD5

    fcb5d49e60350b4e061376d079c78c04

  • SHA1

    86e6da84404f79ed9105b8ed1a84c54f5a8cde2e

  • SHA256

    32ec9e42908a44d99fdcecde2f71f7ca23989c1351f0276275564bdaaf6791af

  • SHA512

    2b28d248db07cbda87ce36c6dc55d73c7fb5e84ea9d725ff0bc6a6bdbdff908eabbef74d20abd402f64406cc173cd251a45670aeb72ce1dc481a3665f888f3d9

  • SSDEEP

    96:/y+VH5/QOhxH+/QOdhHA/QOdpHr/QOdOHN/QOqyHS/QO9LHo/QOqqHO/QOfUHH9l:aQdZM

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GD\Resources\CCControlColourPickerSpriteSheet.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    146b27f1b6754a224316cb4be5964351

    SHA1

    48ffe66583e9b978b5fa7bd7da056cfb33c1b16c

    SHA256

    a726269e4cd5c5e263e6c0d7a36600ee9be9aea01af7e7e6879fb56c0ed6d9aa

    SHA512

    7ad22b731ca329583d57ae08be143b854839219d9b2c915c147675f7f0414eaa3736500165be9395e50ba3fc0fa1a78483e178746cb522d1afb1bbba9144c66e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    931be44658c6f800bcd4c83c0a10ff2d

    SHA1

    5229e6ada0d9d1ed2866fbcfcd563b3e251618bb

    SHA256

    e6f29d22b222714e96b97ff6d9a4e27a55610c68cd3cc9ba2ecec0acfc6e78d3

    SHA512

    f995c73aa0daffb964ae28f47d9ef8d9aabf4c68d6c87612a9cc002e96d4ff2cc2b933ef8e59d18aecca16b1590ea99a804fd70c46edddae85f626bf71186ba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94e4ad127c32a03d35ef579b8b54caab

    SHA1

    3c7fcbc54981aeffe3f1fd09feab9c0ef2e73372

    SHA256

    4425fff67f46aeb373bbd4ca92afeee803e3ba78df3ba10d8dd35d4458585fa2

    SHA512

    4cc964f5da2fcd16b0060095ac10763ac1fd9005e70337c189705d03348c0adf46db0f488954432bcc18849c03e83bcca93416ceb2d8ba6632946277b6dd7a6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    096740eb08c848d88e0710b17def0e42

    SHA1

    360780f211e698005623eea0b86750d0bfc7e499

    SHA256

    ce4a87061528121e0dd2784ec2391fe23902acb8a755e97bfe61578f0ee3e6a4

    SHA512

    89fc95f12d1279e902a7abdfc1909ba2f4eaeb3d76057f71b289ccd6805bdf6a616291ccaeac4650db65612d9287e0121ef4b4137c58bfccdfbcb308e346b505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bcafa47f6d36be690e19c44bf10df489

    SHA1

    322588d36dd8075de4668fd735d37e62e049e2c0

    SHA256

    c14079e231effec533f5a22259f69a0a798740a0775c1303cf41b48da14d0aa1

    SHA512

    cedf32eef583a60a21965f95e9828fac15f2ae5e47a4cf2dbfc6e6e834491eb5840f52897393f7d0870ec487a75f7af1546fce3893e52fa7f5fd031b62d9ab3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba7d8c583eaef8fc6f4481f628fa3d32

    SHA1

    b0e93eee72f41491e8acf9057fa4e5caab625de7

    SHA256

    ec3782bfe3451614a4cbaa5d99d48b925b0ca594283caea04c0d7a791ffc5b15

    SHA512

    6f83375f89d82017c617bfbcc2e3cf8bc587f3248e96aa46bb4e34688eb0cfbb29643dab6c120bf84df3397dd106d4a87386530a4eef39a14292541e91a0e181

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e41c9cd6a043f8d7cfcd2876d0d1aae2

    SHA1

    d554a6eccc4ba3f6254f8ec47ea3f1e02de1b5db

    SHA256

    388a52f947345fe6affa0a94a70888ad750e5f458888b7edbaa97c29be190026

    SHA512

    efc7b3ca3677608e03a4e8d298c59acbe6524e4518f92e4600f5e08d1c0dc14baf941a2d1d40f04c818a323f4b911e9aa4398f1fa74bd755b261c776183f2509

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    694e157c0a87c8f727195e7a56c4a631

    SHA1

    36c128529d697ae1dcaf6c541d66a39e87a97f30

    SHA256

    2c045bfe361af6b96e7bea8302f18dd0bffdb3da40a0d36a8a2823deed23ffd9

    SHA512

    102d105df52105cd1f44907216ad207554b6faa692c814b5c3dfbe31a5e2e66b60b44a1529c1def2f3e818bb782cb2835aa2a9cd3c15b60cc0716c2aa7048e9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3bb4a34245adfadf451275089dfd4ac

    SHA1

    3573eb2a83aa2cc9b6c638364383f35d4ee51ea1

    SHA256

    61f61cf9a57b953b565161958c202bbdd099c55f34dee7fe6ada2e84f766fde7

    SHA512

    9e080a8108056b9d886432a0525433e264a2213c800dc63b5447bbc17fea74a2cede39c559514f61b0036a78167e3fc37b9512f3c7f6ceeb8a8d0fd64dfde478

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9EM1SEHQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabF75B.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarF81B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WLEY21EA.txt

    Filesize

    601B

    MD5

    0548fdc41e9ef777595f9f72ed6679b3

    SHA1

    9368f87a90c6aa45665082912c2eb5babd8d535e

    SHA256

    91beea87db57ff2b5ae76c60d1210651b59a0b73cfccf282a46aff887400a445

    SHA512

    dd69e3b4a18316a0f66ec3a9c167c1481a519d4ec803b5738a1665c4a2ead58f9eee60d5ea894c8eab4f4df8e4b202947f8cacf8d6173e93e885f6d77b05f276