Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2023 18:51

General

  • Target

    shape_10.xml

  • Size

    930B

  • MD5

    5c7ef87056ccf6f4d25c2f3a6e1af143

  • SHA1

    8537d7a037046679fad99e67289c5685d4038aed

  • SHA256

    910edd6d58c0eeebc562a7c6834735d9ede684a8f2b21505245a56d1bf783d92

  • SHA512

    ef40e245883ac049e6ffa3338bee672921d266f332e919cfe2de7d002174ad1f93da0081f226df787a88db7fea9ed0660785a2e495c08871b9a9592c5cc2bfce

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_10.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ef00563813c9e95174733fa2f4e00b9

    SHA1

    fb9e4616589f27dd845fb45a5c90450a0c693112

    SHA256

    69d6a26b1aa6bb733c72bcb89cbc906640f1e1f631a2c5912446453ecc458ea8

    SHA512

    dc919488c618276fef964abfe926c51da3ddafec64207185b08c937e5e958f030d667f72f6693ac598ab206a0e5958581b286f7a188107a6082c3b0ee54c7da1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d973db5f84a0a5b31b4dee520e2fecf5

    SHA1

    2af28b744b39a7bfb1ee03a8ee470cf365b60c62

    SHA256

    a6fa9268cde4efb690c6cf4b14c111ca0b29cd8654aa3f61a33afe84f87e27d9

    SHA512

    d1598567df5f75d8e42d8c91a58a7b86dbb472972ecadc1ead342272220287400a958322032440cce39db5dcc157b2bf4b216ccfa17c513bedea0594839c383a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b39150daf99bc6d7d83974a31f563da

    SHA1

    0bce9bdfee99a20ae71fc86d0fec1369e6de6e65

    SHA256

    9bd4e96bf1f155dc3e5b1a169e1d7c2342a93d946c90ceaf75bd4d001f842458

    SHA512

    c3387f6da21740ee03701eb9639d32deee130c77544aefd181e4daee6cc27cd8528e9982e563653adcdbd298fcd9c6949cb2a61819c355a32371c3f31102c805

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d5c8da40162dbf0af7d3cd9bfef81e9

    SHA1

    0a18220f07e2e9832e8f26d4ae480485d3cc30ab

    SHA256

    eef63f9b0a210f01e8b8339d21d5d8ce17139bfda525cf6300ae9eeab1048e02

    SHA512

    ed26e3bf423b75b0b36d0e11c4f8c014229e3b810db7e4cb9ed2e09ba3a377630f35caac1eb1b16c39e6cce01912a212c9a1c41f94329b6dc9e3d49d7b9a1755

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    491190b53e3a6f8e84a10334359d7498

    SHA1

    cbe449c899af6891963222daafb1af15272c880d

    SHA256

    04387afcd0d323d211565f47591eebcc235b96e97fb6a8473c49455dcfb418b0

    SHA512

    8d89bd8ece0e0e673e542ec23009a7d4b59e8e858b09baeaceb64ab3488c3bbd12e766523a0f3caf8622554f5c8a2de51f8ed07afa278c48c13598129a8abe53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c33031677ad40f547d53ac34fd028e03

    SHA1

    4aba6050a53c00023ea607d7f8f65e9a3d94fa12

    SHA256

    ed2287aee374ada64f4a0e2ce986403409c639b8f8f0df10ba269e9e313d17b9

    SHA512

    7d39e6ea7b121183070c9262ddd6c6a6d89599d147e150bde0b55c75228a34d09544dd08a1aed4c3eec14738c8a606abaf39fd847de595e28c83440e7a0de9e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ba5cf35f654971a9c7ef5826672fc6c

    SHA1

    225302df8a8b9d6cb39910754c214a324b7b047c

    SHA256

    dcd853ca5a2b5a1a503bf4a119eaebc9d639e14dbd31c664eaf78ee9f12aac5d

    SHA512

    5f82f3d0244342a635fc1b1cc614956bdf65e4798443f290a32655d2004f17edb41bb668c5e19ca529044d64b7835c7863b6de8ea37aac97d8ab90b1ebda868c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    144efb74bda9e566d4a35519d2904f0d

    SHA1

    fdcdd9da97a44c5d875afaaf4b6156e19eb25e94

    SHA256

    cab18dbfdadc7ab4d9e76c288ebb4c7df773812e487c434ef99ef715dab1aef1

    SHA512

    b3268b34e34c699e397998620c0b00b31cc577421ecedab1a191995543e4a50bd8fe5d423b851dedbf6080e28e41329ad4cd5f471b4a55633f549f36c560f16f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0428212470c24690b3e20f2d5838df48

    SHA1

    99f6e8ac27c4097ece89b7e76afcd73ff1c28ffa

    SHA256

    ad20dc07b76c0c074335f0df0a6598b85b782a9eb95429570ce8de170d2dd5c8

    SHA512

    75a2bee808b999f84e535d385987342454eca2b070cf6a559b64b8d0a0805be306561c60003741543071e317a384be9221c54bb19ec5149b1f5d4c3afbdaedf5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WEWWZC8O\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabA610.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA6A1.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3AMD170N.txt

    Filesize

    601B

    MD5

    f0427dcae26871a79b4fe480f06c934d

    SHA1

    ba7fe01720612d4f836f6fe0a1321b50914aaa77

    SHA256

    527cce6a84fdb7783ec191392c9b2ceefd09720c4c46c3b37779a0ac84797cf4

    SHA512

    0c7932c06d3cb00456a68ea6b7f6d239d0d22288da920ce66007c827dc7fbf2a319e5667b24c2330b3bf7dd93d9a5f716ddc3676b53df505cd39e10bbab82d05