Analysis

  • max time kernel
    140s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2023, 20:51

General

  • Target

    GD/Resources/SecretSheet-hd.xml

  • Size

    8KB

  • MD5

    fd1b8ad2c4307a1ff6a6bcf696b327cf

  • SHA1

    491072085cd021ca280485d92e22b5e5bf750251

  • SHA256

    e8ab94b4318da1b011e95cd06700fff9adf1a2bd7e20ab72dde7a2496a581035

  • SHA512

    57460ebec83aa4ccf75dc3b22cc88a469715a995db1b84d8672b1659f6ac7690fa2365cd9a55f6058fa2c23e679768dc026cebe0363b41d31e6b0597fa82faf7

  • SSDEEP

    96:/y+sYkuDXoSYkRvn0cBkYke58JZcYkxd+WpKJYk/NBBQX7Yk/NnHe3Yk8aMK02YM:a80g06LGak+XQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GD\Resources\SecretSheet-hd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1100 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b971432ff3b5a529f2774cdcac98c05

    SHA1

    0445e96d02943915d0b8dc7ded11f5b96561b91b

    SHA256

    cd01b5b512a2d80e2526e0ef428514c0d8375f8a1bfacc0690e5929a9bc943e0

    SHA512

    c23e0b70e7e0eb6ec22622e4b0d874eb925ad5ea14a77ed5c00e87f372d4abab13407927b5b8c5f592982b3c6536fa7e606d166f31e57e21ad7e866b7450b729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4781baa5600b93729ca4dab01d90354

    SHA1

    52214dca79d5c3ac911a522f24582e9da7ab45d3

    SHA256

    f89d08d80e76e116484f137b318210eb5953548cdeba44217af6f651a04d6fed

    SHA512

    c703512d42f1e4512a4895cbb2b0ef22ef11ed268d55908d99163a61768bc7e80e64320bdc36f3e8f34ca146205227448144a5a0df2f1b84816688c38c2c7e04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5386d1150e80a829a0681eda362f633b

    SHA1

    f4ba9cb355c9dc6232435c24adb2c92478664f6b

    SHA256

    423a2a9b4ac16e6538870cdf60bfb9a72aff963c39e70c53407400a32bfa6dfb

    SHA512

    374610abc350fa2a89c05b14ac4213c41d700fe4fa48c11186075a73957ce92d70717063a59a3a86138b75e57934f89eaab60b4ad87f581c736c565bb7384840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2db40cb634c6fd3422a12331aeec3c0f

    SHA1

    69f5589bb2b1ba0e81425afa7f0cdee26f4905cf

    SHA256

    1e36f27996497a19af4826e2d493eea28e1b2397f152aa42dc800aa7885cde1c

    SHA512

    dd36f736cbee42858dee9d89f8aa0a064abebcc39834f3f062baf1bcc9d606c5de00270266f63a185e64aae1bfac5edde3d2b9b76bc1dac8a0c07aea120183bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3499e73ccf310d0285e5e441d6eeeb69

    SHA1

    8a20a4b426639a537d54f3b3869ae6e9fc71322e

    SHA256

    bf527ae3a4f80065030cdbf3edd005bf7dc80f053a9c3c65d158afd8a5dcd699

    SHA512

    94282bfda712298440a8e7c6604b812945c5ce41bad882ec5b90f61c72ec5cc33c466562f47f0cda6954f0315d32087e0309aa7c2f6b907c03c0096d1fbcbd0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f766d6b74839cf03ba380ce3309f265b

    SHA1

    7c2571e93b78045bf2a78d67dddc42698e20d348

    SHA256

    8d3598d36038e1141e6a3a9e238eb0a51ad1e9032cda30497f8359a683cf5006

    SHA512

    e62bc956f11faee0bbe8ad1442ac8f4b0ffc880f6045c984121bfdfe9928cbbb5883b4b80bf76f310527d775572907307aa3aab2134ccfbde03205496b5e0d0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da780a3aacac5293c70b6ffb23744181

    SHA1

    65dd4c8c8b4451b7c03948309dc928b560114ad5

    SHA256

    e50c9f2e4b30b5f34116f2df2c7f7699bd882a471a387d522110c2693e577b31

    SHA512

    5ed16868c4b9eb68112daf7a7c2f41768f67deea685a81801edc46cf9904986cdf1bc97df0e137ec93b4cbbbd98e1a3cda95bd51ed2ba5f2242eb7d7b9140a19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bbf2d299b90d9090709670ab582fc57e

    SHA1

    ed55d75d69551657889a01f2e6729b7289b33d4b

    SHA256

    e6ef29644061cefcd1c5d505608d9b35f0df7d3329a4de7f349f441fdf8dd47a

    SHA512

    98a888095497a4d0b40617bb20b900f0de8e09851385fc1fd20db56d4f0a6fca46a53bd13c4f60e92959c361cde15319769a464416f6a9753e86b117cfaa8c92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    edd2814bcf8c5f80d5d5f37bb71a451b

    SHA1

    7d2c119b7348df10f44998eeb41455b01ff6d70d

    SHA256

    057a5990ff244b31cf57cd6bcc060c9b6dcecb87e004e6ece9ac901a96d3b1da

    SHA512

    d0fc58253fc93c4c51e707c0a72eb20e471c680623b147937396135b134dd3b8275f05474353c446d770846f244a9fd08f2b930ef1c8ed2fbc2f5227b60e8f4c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9EM1SEHQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab1A76.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar1AE6.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8JICT7FE.txt

    Filesize

    600B

    MD5

    e170485fe31f87cbea5d0b802213ddd0

    SHA1

    f56384cc1ca6bdd5bbf354ed8883caea1a5a314a

    SHA256

    3c79860204840563e669ce794de557c250811fc5a08a9805e1f725483232dd90

    SHA512

    23503aa38ff1852803c9ee13e5f29f9008e3eb845fa607447f75e9c55b4562af0d280dc11dda971c04e45ae6d16750567a627fad04f7530225add769ed62c6de