Analysis

  • max time kernel
    264s
  • max time network
    340s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2023, 20:51

General

  • Target

    GD/Resources/AchievementsDescMD.xml

  • Size

    11KB

  • MD5

    af4ede98dc235d01a6fc91903f253c6c

  • SHA1

    09ea0f45d0d467bbc8891ded1731a9ffd50c122a

  • SHA256

    8b11ade6e627486745a5e9c598907e80b14d297e4e25977ec54b20c8893fd0b0

  • SHA512

    1e07bc12797f5890228e657584ad7325da7d454514e3e4bb0a1c4e510bbf4b15e7d4b6fa5c99197ad10f653580fb0a79330cc81ee96f5ab1693c16cc51aaae14

  • SSDEEP

    48:cfy9j1ZkgulyBYGmeCTuP+ty2IqnWKGOfeEOfvBH1mUe0pWYasZHZolitptR+8qN:Cy9rljBYl1wxXKGYqtnz53pvQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GD\Resources\AchievementsDescMD.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45b193b82648690d34b927e3d4558d63

    SHA1

    7a283e1bdce34ce981163ebe99bc53432a255e1a

    SHA256

    ab088c5c7668680c2c990738695d020087378cbaa8c90a96e4919753c4c8691b

    SHA512

    3ff04576095f3635c438e0ceee0171dd8abd6636d61903caa3c9f08ab647f4bff7ac230e1671ef36563b5898b45adbf6608ad12ae6649c958b71fe1f158e9362

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46c2e81c2280bc2e622778d38d4c8a8d

    SHA1

    ee9a9e2abca7c0db88ae15f4336ecfa6fca9d3f8

    SHA256

    9fe7667db4e9d981d7ae7b94bb9ea7f345ea65272fd12fe2efe490b2d25caac3

    SHA512

    f11e1ab2d8b65d3cd90d148cfefec35346765085eedb74caebbf4345dd938eeaa1af03a11b7f9e0e5f2ccbaf56e54b72fe091d730e97c7c2773343da71b22149

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc082f581500bc7c5ca18c0865640bce

    SHA1

    27d30675b73e226e45add3b82f5473e329e746cd

    SHA256

    17757d1c5075e28b40c13104931c65ca3f4b45b12519af75f0b518e665c0f677

    SHA512

    3cf8af62aaa5e49b853e463b986ee1610b21509986a84472e90f100939016d98741a9cfd15a4298540dbe0da813d48dc883fa7b3b91dcf49d5ea0c53ff8dd037

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56a6df5bd7b6989d7ff6afd5e0ebc92d

    SHA1

    680f702547f852fc4280bdac2059827eca22f66b

    SHA256

    2356618769b60e3e12a6c49207fee15af7a2bba49e2ba4fff33f69195f46337d

    SHA512

    99302b04f05abbf8e481a6125016c43a62a20d53739a3a7bed6d09c76562c734ffd9a1e0562701b2e2b72b7f111a73b6b10dbacaf85f753eb110e593422d8e22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    607bb917f78ff3c5b1b66a7d9fdf1cb2

    SHA1

    4e4760a33c40361ad25f1c4b3382252e30db0869

    SHA256

    433bb3603c4b54a1e85f45c74e46cbc1b6e495235adc820251b8d3b5e82d7cda

    SHA512

    b68986fd8566f0bbfed24d21a737f7122d51b398e6280104c5d3572f6b4f745c6b8dd592d196db573181ec220dcb6c60c82db46c9ceeb6be940059d7449a2fbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    558b2baf96cdb98997684afd5bd8eee0

    SHA1

    071fc25a320bfb280309cc27e45f388c43a4b237

    SHA256

    bd3de9b44889fcf36eac292d7618dd41553df62940a72d322af712c51bdb816f

    SHA512

    25923b88d96625e8f9e3b0d58420bbeb6a669efb392da8cda83955d72eac0e83176073e04539197212a26a1d764534074bd62a26bf89f6aca1b0b24ad69c2bbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1136e1f8be18c228fd2a5669f66505e1

    SHA1

    9f92f9e93b23832cb439a5fe3717ce3189b4b8d4

    SHA256

    fae751194602a968958a603351dc481db30bcfb74fb6b54122d1f53cc6a097e1

    SHA512

    d0095d268721a35d04e518c46aed23ad2f034c4cd3fe3d3b689d1b3aa5bd34668829372bc22b33a5a01dea1bba424046834d1f568dd73452f6e006aac11e4edd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f95291bc7ebfa2bc955a66183674b5ac

    SHA1

    a26d2b787ed5e08b4c17ea246fc69167c128ea6c

    SHA256

    2ba2119560f823551299b6fa09c75729b8acb0cc4aa795b77aee2394df3f6cf8

    SHA512

    43d4958fe5c253a0266d932ca5e4b7ed45e7c778314044f049a8f481702d50f878956ba940150e54f111cbb5e057923b70a98f642af6c009bcb17326eef18451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54b5244adeaca9ed19e4cb55041063f0

    SHA1

    b064a526fa6ef4fd701f819ad569db0d9311c1f2

    SHA256

    fcab59956f26721742e535ecd3451b76c335bbea2376b9a2a490f5a439d340d6

    SHA512

    aa181457b3871c422b1514d793c39df69336c100d9328702e69e1bf5fd637579f6355baa2db935fd94db2de7631696316d4b81674bfa18e7324e921e06685082

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e75f4e8d903ef1a81d687e3711c51545

    SHA1

    c49e61f9252cbfa6a58b1f1a70ceb48645b9e709

    SHA256

    7c906171f9977e9db70d623c462ad784fd607fcc1820518ecef675ffd5252b46

    SHA512

    fd0c2d3dc025702ac4afdacc8be37ef78be4fc46c306a5c61a40ee8201978f0c821af634b92ffbc6f137279de78414d777f06e75303df2b6509cd2fefed4e1c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    702349e6cfa8abe704b4256a9045adf3

    SHA1

    8f43dc795fbc4476b4527e13b1720d9121312e7e

    SHA256

    496091c7cb00df5dba3ca5fe909a6bb9e9c6c17f82a87c2a97cb67f08d6e9ff1

    SHA512

    d140b39d4156614fff43569e403a96bde0e5303e39703bfe468af79635992adac7b3ef86d46c3a71398de900be6f6ff0eaaaef46db18a24731a792f5462b0fae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ULULORKV\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabAC2A.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAC9A.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XOHNVZ8D.txt

    Filesize

    606B

    MD5

    9d143bfe908fe490c14ffc50f3251cf3

    SHA1

    3be371f832ecae998b1b0212c1362f5e79a1f259

    SHA256

    842bc136221b3492a26311bf64cd732784fdfa57f65ef9dee6a3cf37386a47ee

    SHA512

    2167c9007b0090be891455b2582b4349b6d76487c7a9c6cb864596597214d8adc82c0eba5abc59d01dc0ffb9c04cdc6d269c817193f5790e0ef27842feadcfe0