Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 17:45

General

  • Target

    billing-ce-cp/.svn/pristine/80/8040d33ff07ae7ca25253042c2dcfef37b32b12b.xml

  • Size

    1KB

  • MD5

    4336220d2b4bec28e425a1ae8dcb2018

  • SHA1

    8040d33ff07ae7ca25253042c2dcfef37b32b12b

  • SHA256

    5eb6a9af4f23daed5bafdc626e6d078498276a0362053b8543761000d0c8485a

  • SHA512

    469e3da43a9f4916944a11b9fd4bc965ab47f30e2b56a5332c863e4a2e4a63ae0b39b7bdb683529426be6ea986c735acc87a6d26bac14580e38feea28c05cd88

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\billing-ce-cp\.svn\pristine\80\8040d33ff07ae7ca25253042c2dcfef37b32b12b.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2900

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    183e933ff800964cead58bada3413809

    SHA1

    126c3b702ec18736d5d5a28bbf4dee70d4183964

    SHA256

    dabb2cf67c116d04c1909cb316b5b18a38eb222e4c23d81877b629a160062e25

    SHA512

    680b37a5609f59158f438e31680ef8837df6df5e8ea00aaa8623402f7150753c5a51fa676591117d003ea0a333b50500ee4891d348deb9607b4691c90ea00d84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1cd4611e017cee85507f4fff2937254c

    SHA1

    d8f2a555dff2ceda8d72471776049b0d2ca67c74

    SHA256

    c0a1e6b52536bd981bceabb43829dad87e6a5900e7ceda85bcd4a9310006604d

    SHA512

    a9e9389f675a288dfd388717903c778d0e11f753d80f64785c8558d2d9c19a9e32f05f6f854206ee2bd9abbe65a9c8695a621b37c60630dbd2b57e48adbdcb18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fc02e9d4d8e303b9952aee92a1445560

    SHA1

    158e0e57a0917d3292344874725cc39824db92a8

    SHA256

    d9851f3bc145fdd991c797c263d67907165584b1628ce145978a437c03b999e5

    SHA512

    62b64ca795d1280956ebb746f2cc54c67e138bb264038a2cac5ee72c7fb4d083c853fbc010249cbbdbb1eb5d6aa22df726de3f3f38114306d4ec753884e6403b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4420146b02b770810da3f0b6b9e23ca0

    SHA1

    3df43b3cacb4af0e48422682c57dc62d4333d970

    SHA256

    e59b7b8837f8ea763ab226a33053469336aab927427e4b108445d76027c8db03

    SHA512

    222a027eb409aba6cb89bc10bc67d27b8d4440822ca0190404a6a4ced7a1bbbcd30b7761a9e4b933251cab750c91b5de4dee9c252875157c51162a8fd553729b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d816a674735457bf001df32e73ff44a3

    SHA1

    50c0a1ab562ca469434f08d23debe067b97268e6

    SHA256

    c239ef2a009108b45995aeeb207439797a6ac0fea38b695870ef25e2a0a84e87

    SHA512

    a0f2c4505bc498641fcd9bde78dc9100594dff50e461d3d5406dabcae26cad030e01b863d1b252c6f0e4064b22081829c48d0f6c2fe53bcd1086eb16a0bc673d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a95a188adf9d77872c32c042dfd0282b

    SHA1

    6e952534076c9fc44c1db6dfb68c6bdd24463fba

    SHA256

    c251aae0ab33a455b6a944ec4b06a21a10e24cde8b2f7a9b81a7db1b66ca26fc

    SHA512

    1e5e2e9c5508eff9db1546b63a6cdf3c8072009640da52689d9c57bf09ab2502a8757d29568f4a5608a0302e46a75899934e0631bc7543e994855ff1f4072cd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0cd0cdf53fcb012f579db2eb9fb55c84

    SHA1

    6c94c165fef89f14366d30cee3f15f195baf049b

    SHA256

    b7b4c192f6667d8f68dc6e87a15ea5bc0cd8ed668a401d34938b99c35a4dca95

    SHA512

    f4f266cb6544f22401ecab0c6f79ca13fd0c1f7d019e33c42cd935c328b9503f43ad10f7b6bd832dc876e159dbcc0fb83a9bbcf55b9f5f31c9bf15692c0b9eca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0f229b56d029a1d3f2e194ef0ccf0a9c

    SHA1

    08c889e76c19dd29f8f2cc1d587df9811d74b681

    SHA256

    3e53ddc6b489778cdee6d4fba7273945beb0fcd81921e2f2ca5c5a7b44522a25

    SHA512

    2dc805d3ea4334f7f5e271a80d76314920c95412f43e13e5a9154a0c5da8c623074d0162d0ec20b920135840c00d81ae4850f18ccdd5c547698e02ec02b23311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    346e54cb28408a52cfa67e8cb719f2d8

    SHA1

    5cd545db25cb45ec55a581f55adf5281159641f6

    SHA256

    8e4362f8e6ebe36d91fdc5147a69fbafa23befe842636d832826d711113240ae

    SHA512

    52a507c527dc158114afc48a59ab627317d9a7ce346e32836c4413a2f39f1510da072897f679318a32f2c08ea9171e6cc15e6ef1116987d2ec6572d01631d5f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2d45f9e496a3017c94a1082b69c0e629

    SHA1

    3f4b3062d731def9edab5620b3ba126c7ba8d56f

    SHA256

    e47856934071d2bdfbb9c8fb77b1073473cba713744c5e778f862d395c2b416a

    SHA512

    4e0e19d7750087400e877215d5101e1bd45239adebaed7d990db2fb4f8413da8d27e436a59100184f0ad3bb399ba37e33c9ab727294b429b3ae6ff0cd69169f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3a962621013118051f8bf8ec5ff94005

    SHA1

    257c9bc10e8a9b0b15f5bcfeba4f6d1e22200afc

    SHA256

    8b62588dcc3f237e5ba0cc7987bdcb8f623979e94aee7d2499f84565ff17122d

    SHA512

    0f7ea81e696b8ecca4f44bbde4fd25d7c03e7484550d2a044356c0e9f47e0c7f9d203a5da4853fe6d5981735b21aa0aedb3efafaa0f40119cfac1ed6a29a78f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    20afa15577cf6eea7785b18738182bc5

    SHA1

    96fd232e66b5ca9b6c3cb062fbebcce3e0b0350d

    SHA256

    a042b480139a921f59371134989a704d03d5c222519169acb0c53600e43f08a6

    SHA512

    fe2216469f6e2db2c3137740c4b56c4abc8efbc9aa64d5149369b7a31354d868740059226119c6ec4642b7ea0d42e647323e6eae85ca1b7ffcf19ec9fcafb7b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e4c0978ca11061bb9bd4b07e88a1e300

    SHA1

    f10dfe64b428c0c28bcb18b75354fb7300b4627b

    SHA256

    33d3593f034db0987b8e1781c196b6367901b12abd08d94fcb2b466f270830b5

    SHA512

    3672c352c1c0261fa3cd753e357c832a925b455da219cd9d276e54d8686171772dad230db766b883c416f1eab228cb6b9a3a1e81d20f44b61fbd71f6159ece33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9f1f97a81bac9ad2905d93f9e249af22

    SHA1

    09d7f38f05b5f5bcf119f559cce0fdbb05d6e7cf

    SHA256

    dee1235a096094036dc4f3db70a7f30f4a8e4f852d58643dfca9a21b85a73d4c

    SHA512

    b54847dbd5d3dcb11d88be530842c2ffe176d13b4a91515ca87c6cfb64729a8b14d453a6baf1bb668e2b35e86a6f7b4a28b3d775737e277b0a445f561e5dd2df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    eb8944850564696887dc611ee6f6c829

    SHA1

    cbe8bfaef589c68ac4bb46055946a664006b37a5

    SHA256

    533885b04f172a2da6128607b0dc8a864b3d50185988536cbb286874eee96577

    SHA512

    fa0f8a4752d864fb5285a95a65e2450efe3ba19cfdbeaf67b3b9d54943232517ec80c607f6c7d02acf918f8307557df4f646cebed3846ba619028487c3d20bb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a4d2e66ac6d678e27ca4f2c44aab9428

    SHA1

    269fa797b8cb3745e0fc98a1c94f3669ec51fdc4

    SHA256

    78f411c1c9675a2dcdb0c11af6801b6036ef24bc65da8f485f9dff7f4b665e18

    SHA512

    1e1dc7a843cc82a50253d6167a1a2006073f5ad1a6deb5b9f401a920ac6fa26539a6fa49dcc182bbb48569b96e60a18078a7602c85ff258e86e7a8f2cb058486

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f77e7a6980fbc726013e82abb1fecbde

    SHA1

    eef419502ba34a2a6a25c20e9044af9c157fba5f

    SHA256

    d6f5e242da26e3cec871afdea0c62d0db38aa4df000cf1255b195f41e963bd77

    SHA512

    9de40279aa73f877d9b807ff2f503372e678d176d7a7be2f95437b12e58dce77fe9efa347836e31a8424c1c83e40dcb84f9f8483f39f92c895234c7a834634a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6b51a25d4a28d3b02eadff4acb2b1236

    SHA1

    83d847ad2e64f683bb97ea562e59ebed42eb7ba7

    SHA256

    4d496cda2f1f53a0dee6be515f9bf09cf10d7b83cc267e0ec4aaedffc8fa1f7d

    SHA512

    d29cd988e16b5a7a9f1cd4cfed971486a20645cf87e1e0fe33a6ef4f29a357e61e9e17f0df9a4e4347abc2bbd52329557ff086cbad0664938998f2dd341432d5

  • C:\Users\Admin\AppData\Local\Temp\CabF1F0.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarF30C.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27