Analysis

  • max time kernel
    140s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2023 20:51

General

  • Target

    GD/Resources/DungeonSheet-uhd.xml

  • Size

    2KB

  • MD5

    27ba105952636545dddebc4e8337c7e3

  • SHA1

    ef45e7d19370d3c4a65bca01b60d94339ea009c0

  • SHA256

    4f93ece615eb1f276d22cdd72d873be10a2d4bf90266743e80a1cf5d0dd67291

  • SHA512

    e4dfd2b6ccf4fe0760027e922450d6dea7b820d457acf3bf0b04ee861a40f1169bdeb1b101e007b501ed135c8bf8179e0586e8a011ec33f0f0a37883a29c97c6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GD\Resources\DungeonSheet-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7d07876123449ac8c975e41aa98ead5

    SHA1

    d21cb25394d4cd9c07f2c04ca62bc353f9a14689

    SHA256

    7f9b7bca6c5e0617f38d8d3d51585ea2f08e47b2c310555776ba4308a36608b3

    SHA512

    215ada04a7f8ff5452205ccf2c8297dc254573d175b76a1f25fc8ea182b443a153511cec7bc9f4840be89e57de8f4394c10748535e2013fa5d5d99a6e77f0ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    428a066c967cb0bf404c5bab7d84ab4a

    SHA1

    1465f5d58c41aa707f38579be95e9913f801e73a

    SHA256

    adc13cc3c5d04f55597b56540eddb0dae3b1594d2440ba741883345ef47ea40e

    SHA512

    74c3580517960201e3cb0016e7c2257255bdde165311a36e63da4f9a8fd106156c1daf3ab09c5e67de7f2afdbf1554f7e0f5f4aa0e88dff648476adcec4e5cd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    569d9186d702e078cfc85c62d4330ade

    SHA1

    43fa02a80b337acfe0d2377c838df5d46d0e09e3

    SHA256

    20290e6e386422d77f7bf62cecb74877f354f033e9712762892689856594f844

    SHA512

    adcd326d6dfaf9ea23a73f2c3759199e1dc0a30e4587d643e8a11db443cc06f1f4cd5ef08695c3769bba9c00244f1aec0884109f86a8811efd69fc1cc98db53c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04a1e7894c7c2a8b1931e3cf77e40bd4

    SHA1

    8e0ef08c8bd2270cbfd01ac202bbf52fb5cd2873

    SHA256

    dff18ef0762b88a283c1f43e8b1d80600d8bb812075f090f3360a391e8850c81

    SHA512

    133c8036dbe413c0da726997454fe772442b1b809a440bba14dfb36bd9e28c0b237b080dd73fbec34f0629cf091b84942276642da7eaa78882fc5a38fd9f0460

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99b8639e845ae286b25e4d76b67efa6d

    SHA1

    cd846bf67ce72876a227c890e922e9638e379b99

    SHA256

    39b41c34c1dc6166c40ceda6c9c9c887479a70f0af639b223d4ae81715e164c1

    SHA512

    8ecd1727754c884d41af3e5cf56f9f432e3d72fa8dd87027b0b6f441a64129a62f61269eef610d8f8bd5da818b6db794aec1304ab0106a7f7253a70e7b3441b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dff043b0f39a92f66b707ac3ad6b2355

    SHA1

    1c739dd8bd89a8d39dc0d451607e5a43e50d9aae

    SHA256

    4d7d418cb4e193600a2bd05831f99da9bee9a8beb9dfb86f28d89d2165c8dc0d

    SHA512

    50e85c5be61cd71555da74491db8a1299998178883655aacf20dca52f1246ce9ae584ba22d954b242e732d952dcf61249caf5c3698fe127a054c5c0b49bfb36f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UORESFNG\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabE35.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarED6.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AU04IVDS.txt

    Filesize

    603B

    MD5

    4df88ddf6417746c80979bcd038f7d93

    SHA1

    3d6a25feb5e5adbbbad8951f76b7d02edd50e0bd

    SHA256

    c9c254fc9768e01bb0dee56f3cd736b1660854a0db53808cb95d89238bd16fba

    SHA512

    67fb92f06b6a183999cd8b0d1961ab67b318303df64e75b100ecbcbd0aa4640403ae1c8ec8a704e4a37aab653fd39d87ec2646ff64c966e4226f3c647e42aff9