Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2023 18:51

General

  • Target

    shape_14.xml

  • Size

    1KB

  • MD5

    033e166967c07c7cccb48d0275999169

  • SHA1

    196dcf6448debc7d07953ea135dc0355688b1f52

  • SHA256

    9676be618dc9a87f88e46a92014e554c4153b1f9ad97d185ec9e3dbec92ecb78

  • SHA512

    933685c1ea659cad93e0c6c5cceffb6a1f05d201302b35e0aadfa714a4870c16d05ff4732b22d4499cb0885ee8aef263fa7ea0eefebcc6fc79c529f494eb484a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_14.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6809f0120a2db75ca15962b6467c77dd

    SHA1

    0412d48c2b661dcff795192aed325f5f97e51301

    SHA256

    c2a28f4ea4f4cd69a0d4d06121fad57f372e586f753c7a8e7779614aea246229

    SHA512

    7b4d071fe99c5eede031790887e3445f776340fccb91a4432728dc3a16a1242e62155f5c710bfe7515793958cc159b475da6a5cb73b9df89a2bab308fdf90592

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9217129c9e4a05ec308502a0b7067b67

    SHA1

    ba1b3f31d1d51abf288d77380a3611243f6712e7

    SHA256

    f5482edafa96ad28c1e84c36bc3c9a5ed154eba6d2fe1ff4bde0419ea69739ce

    SHA512

    b80a41780256a28e6cbf23eff044d2f923efdad3cf570be34f36512b181ee916448f7f682e24dd628265ca9af528385c3191c07289b3ec9db21bb14a9956f3a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    457f48839e869f937721f7d1f2ebdb86

    SHA1

    83fe9c9e3f3f95104adac4e658eadd8ef58e7156

    SHA256

    8afc5d0329ae693c9ff4c10d7e674798dd179e62e3e71a1cd7de7a20c4c2e5fc

    SHA512

    35bc023d006f4d8761674ad29308236a3a423ae4a70c8da2dd16a91ea74708be5f17c59fa08286c550ec4ab60c5ae21500b4bac7ad9546179e514a53f6cc9f77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4cc602ba7d11a3a9b5e29f063bd133c

    SHA1

    0e66b3f26ba4a18b50f8ad4b8b36c690b9988cbf

    SHA256

    01962ff04b40cbba964550f4eae4ca7c58025ed13baabc88614f66952e0819bf

    SHA512

    6c43e1a48ee72539ca70b8c9859c71d4dda8a8411c4555953988e4d7b3144dd6781c995c0d8c530d5059f7b1608f6b59a911bb5a3b4969c2989f2015486439b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    472a36fc2057605fbe0e1577fab2e751

    SHA1

    8b721158a066851330eec23d8206e8da3155e147

    SHA256

    be145777ad43951949e9c171a74cf073c09ea7da89a447af27cb36b6d4f236e3

    SHA512

    6b065e787255a2255a46bcee7b49105deb45cb442bca568b725d6387b6b50e6af4cae387a8f46e287a75969ab79488ffd41dc173aa0e456f58d4dc431494028f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1a6e1ab5c85998aa43bcebf2106f5b6

    SHA1

    79b35d6f643f1d657d73ccedfa8165743998e0c4

    SHA256

    4799fd02a67d81d8168b14e875d2f88fd7527608a04c99a79bc42c75d3d79eb6

    SHA512

    cb943a15ea2b1d7c42f56f9a72e2d1435ebbad5403883a110a88417ab055004b2570d0b8ae4cf2a43489fb7385dc54fbdf6b7e2a97eb48fd789d8593cb9857b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6f398c3811f2bb0489806fed0fcfbe7

    SHA1

    a3e12eecc83ac89a0b797a3ad43efa28e8dba51a

    SHA256

    bd1676f488664ce1154fa2925aad81480b2da607284d63009b01f1de4b3ea835

    SHA512

    321bec3158350effeb72d6e4f5581f9fcaa365f19f1afeb634ab2dfeed29d65e6581b7eec8f2ab9f09e01f5c5a040e2bbdaa65a6a24bba1f06c8711d17eafcf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67d12ff999af856070aab9db5fb4d249

    SHA1

    30faf344acef55a2f2471276b07cd78832922a3f

    SHA256

    4b4a6d890a7b996e7070e78187f502c02be9a51790ab124ea0f69c7bfb4c200b

    SHA512

    24affa7e0e3b77ff48a02c0f1ee6c19a004f127c9e5893fbb2e1b5d337fd8e0c1ec8b167581eca363f990f1d0fa75942a2d7cf81932fc760de0690243229053a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab9704.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar97B3.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AX0C57KN.txt

    Filesize

    601B

    MD5

    1adf2d4c6a16fee893828ca4b4b60f08

    SHA1

    dc6f29243bd62532ceb549226af6fe228c8d4636

    SHA256

    77e9f3327c407ebafaeafe486a0c7d281ddf56779587552e21c428c0a4c67e98

    SHA512

    8f993c3fa1c4831b17c56e595acdd8a4afd644b41bbd38593f6c331c59061f06108c039bba7934ff683ed098d438a4b6c5542155746be6bef767eb6c7c84bbae