Analysis

  • max time kernel
    121s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 17:45

General

  • Target

    billing-ce-cp/.svn/pristine/19/192571290a9ffa871fe23122edddfab634c61ae7.xml

  • Size

    6KB

  • MD5

    f8c792af2f74494eb07c2c43ad66d182

  • SHA1

    192571290a9ffa871fe23122edddfab634c61ae7

  • SHA256

    c4836fb84dda2b02af7c7cab0bab826bb5f9c16c385055df95db4c2eea081bb9

  • SHA512

    da2d9cafb55e36ecc4000087542fe080a4069e65ce76473b6beefabf3cc5853184cd5c8007f16b9b7224cd6fdb0cccc37ccf979eb3f1166dd2c1b80aecb15e01

  • SSDEEP

    192:2PR/OboOPsmib25ETzZhpRfLP6GMGvSO7y7NyizAjAUcr9OEYpqnC3uVT:2PAbo+smib25EHZhPfT6GbvSWy7QOAjy

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\billing-ce-cp\.svn\pristine\19\192571290a9ffa871fe23122edddfab634c61ae7.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2732

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7396369cf348bc37ab7184729e38bb68

    SHA1

    6acd3e78fe661a7fdd68757135d305a783ee77d8

    SHA256

    95d33d6f9f7123b29170439d0aeb123e9d3f0b4bed333e15c3b3b01ebd773975

    SHA512

    39e3ec143dff454062cec53d866688e6cb553772620a73b1d1ccf3a1c6e7fa365fa28a15dafc33f8a38acfdc43a4f6569143090a9def0fec927c3d952e9f28af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cfbac977321fe4e3f94bbd367d1f6e15

    SHA1

    8710a5aa6e3bb134dca6386fa721d6cae66f486e

    SHA256

    8a86c67c500b222a54c86d7e8e3f5af25baa1dedeac541f5a382db4cdd99e728

    SHA512

    19a7a8a5f000b36e71bb3d431033af78a7c3c9f01be372c7f7b743ff58bc27286fd76052f2592ee9552abad8385a879b1bbad07be44eb0f42f0b59df48fb55f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8c39481884f59b55db03b00cd6fc6209

    SHA1

    2fbdd23d45ecdb9bc7b65923322610f4a725fb56

    SHA256

    86519813590fb6e7afa0deb1f6ae381dcb108886e35ec788b0c21201bed02225

    SHA512

    46d43f9f6094152be7879254e8ef8779a6933339a426cdfb846c2b8e851844a7f1da3c4b21206fe477d2bf39a1e3ba1401b47c095324e8da4c0dfc314340c304

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6db17c5a94ffb27f46d669c101ad2fbc

    SHA1

    bb0630442a2e9eed4f6453058fae678e483526ae

    SHA256

    2c83cb6efc861f6e771fc962f52dfad84274581012c3c11961b86e98a8fd507e

    SHA512

    b9096a97e4d43e41a3bc593f01e46e0958d2c892b19e0a9f3126bcc5e38f0a7e5fa8bdea1533b4f87a90e7e3f93b9b864e5fe2db1edd885ee5c8f103b5b2de23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    97879a38040a24ca8f5c6a02ec8414d8

    SHA1

    7a3ad41f18331faf0a096a98d3662b1bfb7bf326

    SHA256

    8cc1b84bed30851a002786676df766dab1f505741c8108a7e58163b4d8ece33b

    SHA512

    4693fc0ef9047fbd08dacc03a6b0a696aa25554363aed70ce88d217eee205f0210f1aa2d11d09abfdca5162627627beb5ec29012f97366ab9d758941607f42d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b804996aef912230854837adb38b5a47

    SHA1

    351da48f13776c1d2e606aae1842f27b59165976

    SHA256

    8ec72d5d5d4c87c0e36954e9f7f95511af6c62e4cf2398c1e5652cf09d7f9963

    SHA512

    b1922063119418665d1a7b70a21de12a1e6a181cc722c625325ce8e5d297cc94bb94889dfb4474370f8cfe7e219d3594f4962ca720f6d90cefc4efd0a0463e80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9ada000bf68690d1d2ef815dda6a5637

    SHA1

    29524be62f9ac1783388bf91ddd9f2c654f2f7bd

    SHA256

    5e26e3f3a32fc4a49c30fe7442470ef989c8b53edbdcdc2e166419b0e3b059f8

    SHA512

    e5ed27e998d7611e8c24bd7ac8eede7516f1717961bcccbb7d657839b868cd8d72edfd349e2f496e2d507a3e55c89d24e8de645b4b27d62490045a3a691480a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c17f36f2773940b83e2b6de5bd688be4

    SHA1

    8e191ff34e65e143884bc23de05d396ae1d5a9cb

    SHA256

    a00bcac90f8977ce12ed2bd5b625120e0590b114f59a4dfb4d93c465026a0409

    SHA512

    744c25300d80bd503a6678ccb6f31568779f2b08fbd333c206af2d1a41ef599b8de2dbfe63c7a3b231a43aabef670f5f1a45b74f5a1baf5c2184face78a63197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    22fd468d9b669f39f5a60173a82c9995

    SHA1

    5a0ebd7b79de5c73eae8241d24a2e7b79fe9ca7c

    SHA256

    b2259f20396c9622181ddb2babd71e884f8a7d5aff1573dbaef4f4212336ff86

    SHA512

    538b9387b65fd586d94f427d7738deea01cb4b0e951fd58be790cfd66996eca9b8686c075b5df9ec77c7919677357f1117b4e08fff725b2194abb5789da9647d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c0edbe43e4bcfc2de0628591cfbdac78

    SHA1

    519dda363966a451608eb3c4a11530ee44f28bea

    SHA256

    2d99ab4a76fff384fd1fe428a5e8bee471ed95847607e62cab58d6b0c401e7e2

    SHA512

    832398f33570bf69a2c758a3568be39c741837c84f8b5c480b18b33b1519b2ad749cd39d80e0e3251a62e6c185c177adb7a4b684f2443b437ade72d1682b2529

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    33046bf8e9b54f83a4a505e28a7d6b6e

    SHA1

    0ad7042d6cc47ade39097f2e9620cb37d75e6076

    SHA256

    4ccd9d4afc0bc151f0fe3f55fa165ed0484e98b30b9e54a66967679e7a12b292

    SHA512

    261f58b1efb4eeb984eaa528ffd0f7c6216e0d301b75da1989871297d3f0ba238ca49f703bff8fd6bf8d9738a377f67891b44deac7ba83e13e8ea296be9b6415

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2d439678b1dd3f8ab084976b5d763300

    SHA1

    b37ebad136f3b90b61dfecc77b212e13e2744cc0

    SHA256

    9560b4b37c1fefd4df533901901404a338b0ea025241345f633abf21cbe151b3

    SHA512

    78ac549ace5b82fc0a07d1795a564624c3f656ac9103804b8f806c08b0ed44d80434712730af5ca7a05997306e697c31a0987b06c51dd50adce395bae6187920

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    edb794e40b8e8a177d00b989c841eec1

    SHA1

    5decc6b2d2194fee6a8beddfc68891c72fc37481

    SHA256

    d227d691676ef4ae089059ff1406a8ff36cbfe24cbeaf873669162e6beab3be8

    SHA512

    9fd81a62059dc9e16ff5152e575aa5fc59137eaa594dfa29d904585401f4043b0bfa41522a6838f5048a44782a4046237dde9088307a7a8c0935e9f99f1e3c61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b577430ea8bdc84e31ef369f47d650f3

    SHA1

    2e79c09fccde3defc13475bc51b0feb578cfae9c

    SHA256

    87eb7516541e5e9a5d4eb7d92fa02c90791a5f36278c00a2d2871428cf1ba0ac

    SHA512

    1f4f57aab77e08568cc13f08af3079b23e208ba41590ddcf49e0cae64d6f0cf55d36460eb07d157c0415f5c4d42cb2d12cab2c1f32f1ef378d517ee0cd0904d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a40821bc31e72224904c20cece50375e

    SHA1

    cca6b0c377c6179b645148dd6ffa4c32de1a342b

    SHA256

    7410249d7e0f8a06cb250b77af8115346d31acbad26ac5d19906bacbafde494d

    SHA512

    281601eac8d606b0896edf8154fdb064dd48b89a7f77ea6c052dd2c4862ca6d236d5904adf1a8ee23667136bd1a2035eaf6ae1dd974761b502b11e1026f55935

  • C:\Users\Admin\AppData\Local\Temp\CabE320.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE40E.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27