Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2023 18:51

General

  • Target

    shape_2.xml

  • Size

    1KB

  • MD5

    f804c3c0fc87fae049b25a827c8af161

  • SHA1

    445ad3b8c8d54a5ef32b25289d76907b4d32c9a2

  • SHA256

    f51e36583711e18097f4526a3303cec7efa3609f96c8051a5eb4ad0c003abdab

  • SHA512

    bdded52d78a6dfd4dd37327a752aef85cb9235a03702fec858696643b5d884970e3896b737dc1f894888ae6bc4e5b8ea2bfb7822b3ecfa87e34a7f25ffb33cc7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87ceadfdcee2805108911b7ad073bc2f

    SHA1

    db071003b7c187c99abf865370ab3aec7b80f44c

    SHA256

    7adcbd4fa75b5e0f0287d130a34381964b1f1c145201841be731bfa3187c018d

    SHA512

    8bfd04139fe25c647c465dedb08f7546b1d036f7270d3216b7962fd669390e237c7be46779e26cb2873972d7011fc451abf75b91d1f6bd5e472c4cfdfe490720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    398a9219015bd17e40de35367b61b300

    SHA1

    7db7391b19f13c2d332d5cc04430dc199f80285f

    SHA256

    8c05cfc43463c088ba759f1a89f970da04ec5e5fc3ba8612edce20016c4b68dd

    SHA512

    7bb337e969bd2074124eacedbfcf4ce9773dc058cd3d14469535ef0db21c9172df4705993d26dd9d54fe8d1d8a67d7dcd3784745a33388517d0450b570e77876

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad9c46bd16ceaf12ab94dadc3f62603c

    SHA1

    b6b5a575763b5d619688ae34564c395f56d326bd

    SHA256

    f4a199f51ad196c3c4967450be4449d96f449b931d8a4b7236df11b01c0f5884

    SHA512

    b66db237cecd8ebdabeec67bf90987006f3fc63ccbe36b6a4414bed19ea42f8ded85fbf2cbc7c310d4ce9c0bd9ebe2aedfdf0136461c77e779181aa08130571f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffe9add8c0d64017575d211f12e9aabf

    SHA1

    08a83472d8786d154c3f2335681a7518b874851e

    SHA256

    d2647b28877177824a96b519e40041a3bb4880a18bda0a8e637ede44fdbcebd6

    SHA512

    ddf433823db0dbba642c15f1c4b74da0c702c1f1406dec69fb9c2e58d0c37f79224b933daefbe7dd0e6a5d5b245a9ae549ceeb117f064a7c52e74954ac1ecc9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e2c80a98d64f671bb6f7ae03537b931

    SHA1

    a06a12c874452555f4247a38ba1b1f2a43cd960f

    SHA256

    23d231676e16e976de0686edb3dac2119e12b48b21c42898f21b773330710e14

    SHA512

    02d8fd02c96e30cbd5a5236ea412b4a57f8f7aab4fb2c76830542dd3f125951e12a704c45d0307b59d5b2a8fc21abd0e0353576002c66b149f33d21b40ac995a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    004abddf64b56bdcf5af2cb6ede51e0b

    SHA1

    e415c2dca353099e7db4899665d08bb0b69e1e65

    SHA256

    a05aba27e5ecda460db8835e3dd0766072cce0a4748e3b959ab7f03deebb27e9

    SHA512

    d665848ccde183834a78e68aefaa173e32d11c0c07c85542c9ebf56c12aeac2d3017c6e84d8a2a1841060cb51473cee460fcb55d20074b07f92b14915e3effe8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e793b4d6043e8c8ecb11f2ba4df6c1ec

    SHA1

    70e455c7803c2adb392b7eecd22ef7d7440a2043

    SHA256

    e289bf675f98e41b827b6b01829e3ecdc84c4042cb8dd9ee3dde581d91b89a87

    SHA512

    c763b1d1ee95b1af1f3c28ac09c14a1af343620812b1ddd89ff98cb272317123f2643366cd76a7be8c14bc2288995f34bec4e9482979c3e0cc2154963db3b749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ccbd9f69cc2452da466a8682f15f9cc0

    SHA1

    efc6d8c4cc4c377983390cb26e38568fa8f9b02a

    SHA256

    ecf70effebf078d703661a8367f1d8b91e248b361f1b9692f3ba53c4c1eaa708

    SHA512

    a31cad4e4e2870928c1c4cb0ec67c87e4dd8a6225e27428a959157bd385e67a1929faf819aa1df6c8a7a34b9dd1d379490f331b2be796c4b7bf05f859d010aba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb1165b3455fd2a5a25911da16ca13d0

    SHA1

    8f6370da8970bb9e006b51daf9e8c2aaaf70544c

    SHA256

    51ead9e7cde7c0e35ec2bc40bfdfa20480809c75f84d528dba1e04b3b6319da9

    SHA512

    86c3124d8623eb6c139be914307840225d55fe4dcef96516ef30a4e9dcbf63c930b77ff324172abfec76a9e0fed8cac5c59acb5b5fd9c4dbc8578009ac86288b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f820c608e790652d4ebb0b6c9279f4e5

    SHA1

    f686fee81659d5259bd711f6d0b555189561fef8

    SHA256

    591a81eaed5ef26ed649c76aa7ff8c3c7ab8f0705d5829b6a9f45ee1057fd245

    SHA512

    38db74a121f7b7ca1678e1028a233dbb022d9efc701c3d9118fbf89af0e499b6ba2c00f3d4235e392b3f28d6c372ba9369be218e6ec880ee43e875cef0ac8d50

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WEWWZC8O\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabAC49.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAD65.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T9N4XNU4.txt

    Filesize

    601B

    MD5

    34465b8cba71321a1248e8e01e9202fc

    SHA1

    b2d28e145fcef772d4570443b266ab7d5dbe358e

    SHA256

    ccbd687f5f45154db46daf49b094c6af9092739309c43cc0585fd81c497bd1d4

    SHA512

    ce5493632f324c544b4d9b6d46bb16758372c74cda7b9a3eedcd57fd896ae908aec679dec7ea44befa0eca5476f6d73d4b073674c95a8f389bba1f2cb9c3faa3