Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2023, 14:11

General

  • Target

    launcher/images/logo/mcleaks.xml

  • Size

    1KB

  • MD5

    e8dae81a4fdf600cb31d5cf37a670689

  • SHA1

    8350c7c64a0bc146af642988a133b4cfad669cce

  • SHA256

    77f8941a08bcab17a63118baae1c3154ba66d8bdcc1d0cfc3f306ff2e3b4e174

  • SHA512

    a88e7017ddf2990913416173fcb9830d5c6e60c8f628c2a7d46f090b1ce5541751bfb57ccd36c959f1bfc8b8e04949cc1f22b3a4dd6f2ba96d5f5849ec3d8837

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\launcher\images\logo\mcleaks.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a6fb0bbd717541fb49ce3cb5feee7501

          SHA1

          13f1347a864e410e1ae536721e89bbb2184f6360

          SHA256

          8f300cffd37dbe3389b85e443233488400707eac77a9a8f968817529d1d1f832

          SHA512

          034ecb517033e624b3af2533497151e2a4f72b5781b66610f538d020584c0595aa6c3c70ebedbbd3932bf8efcd9f422ee4c01b165dfb654a35cbb2243ad5c0f4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          00da3ef74ab9273e139111f3daeac210

          SHA1

          e59fea0e143485b9d0881ccb755e4272118806c2

          SHA256

          2ff67e07e6d5ce7925b24d9066630e8573155b66a1c1681e50a7bf795f3017e5

          SHA512

          5e17511881592bcad5416adf8ea7ee4e5534dac36044c4314e59e3a515f5c42530f6947d312da20cbeb7c2eb2947312a012cf74e9e46d276e3888b35ad4c123b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          68018f162fd8df07100028cab1924cc7

          SHA1

          7f59d82392c828ecd47af8c0d6e2099b95b1e602

          SHA256

          b91ac90c381e7ddd71a8ae36410b4eb592981f39fdd81e9b010db5687e32a42d

          SHA512

          01659f41e5c6b175ed64e4411c7bf8713f986f5345c5bda62569a3fcba6b9030a0ec8312d28b77bdd8859030dc8f73db1b7bfcb58a81a6c7b93a9164832934aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          951f378730232fe8597138c8b65224ab

          SHA1

          0007b8efc70064655444ea6d47c06c0963dfccff

          SHA256

          ec02909545c0a535ff2496aa553f4af51b1ea24265960a7567b3885cdc0eedfd

          SHA512

          dd48dff8eb62dab2d21f5b906ed56b4af8ad007e4d8c52c54fcc2a555e93fa2fd85925840c1e1e85ad88709b1b4b0a241fa444b9639f6b53da089a3dfc20f989

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          522e08972f9eee7cd70837c5f894b70d

          SHA1

          5416730b661c85e04d9c55a493800aa8871a9976

          SHA256

          50871081168818c5c2c93d7e314d8f434114cc37385541b43e2002eb96d1b032

          SHA512

          3909cd3450817c7d2530283c14ab4cbe2492f0f6a3e3b7521e6bb9a010035eee2eef9d6ea1f9e02ffd1d59bbb4f048c286508ff86161789c1e0900e01b3dc79c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f545e50702f452279385c5467b907589

          SHA1

          8c3cb4064d17fa98ea5e4f585a53ed1a26d3dc28

          SHA256

          ebc67aea329248d6d5bb97a1868f9da7312241348e733bdabfc58348f4f1219a

          SHA512

          3f73300529e74ccb02ba6679990b94c02f5d07045998edf96f44493245ea85c2f0bd2c29135b95f341b2e14b60aae080538eedff4eda2e16c38a912b892bc4c5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          24ce701b0bea943738a8d3943e6e7a4d

          SHA1

          c6ea726b7e4f1734f45e377adb45b61b93902484

          SHA256

          57b22870c8f47a4c4a053af73eb2da0438aca532bf360f82be161886bbc4bf74

          SHA512

          02c4d6a7c6e68ff79ea0ef12c33c935409fe638d8ba9e472380010ee0bae0258455a569638571e1b7feb27e9a9f39a4aae14d40ecab6ac9e6a42e6c775e07228

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9b1d7294cf46f089e577e5bbd0e34894

          SHA1

          887d5f2391b320af5feaac174ee466dc003c9e16

          SHA256

          191472e89d7b88313fa56cc933b964309d9503c97e7de883087c2b8351418707

          SHA512

          4bda004f800f51902ae3697a44828b6b932b188f0ab4e9d696fee0f8a89861aedcd0efb57f2c1f6bf5befada0d536922c462670a5f4dcbe6876d99c832598aa6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4bab2f193b5aae3f7ff6da0067a8a2d8

          SHA1

          640ec15dbb1b2f20045b9445e1ed9c80545a4326

          SHA256

          f6c2b0b58a1c963d2a168171a50d09863a8d14b49bb4aae2a477efd9415ef813

          SHA512

          e7133cb3b1e267af573981071e09843da3662155496dcd27529ba1c0b95f8bbdc75585f278ca6f7d8a521dad885d0f32f1d56fa1ad5a97d05972a72dea79a5ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O5N1CMJ9\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\CabABBB.tmp

          Filesize

          62KB

          MD5

          3ac860860707baaf32469fa7cc7c0192

          SHA1

          c33c2acdaba0e6fa41fd2f00f186804722477639

          SHA256

          d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

          SHA512

          d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

        • C:\Users\Admin\AppData\Local\Temp\TarAD36.tmp

          Filesize

          164KB

          MD5

          4ff65ad929cd9a367680e0e5b1c08166

          SHA1

          c0af0d4396bd1f15c45f39d3b849ba444233b3a2

          SHA256

          c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

          SHA512

          f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J4K0717H.txt

          Filesize

          608B

          MD5

          4aade8df40eca5bf1838a2541fe44164

          SHA1

          9fdb31c71b68542c139afa5cb955fe1964599967

          SHA256

          eea1faee82af84f9643ed821de03872769e2eb783bd6177fe583521bc9a2b550

          SHA512

          e6ccbf2a413d4bfe194f458f17f2f9ac19c871e7b92ab75c1bf29ed7bd9c073289b5cb46d0d4abc9567c8070613c439baef18d5d7fc205ae2caba1bce5b204af