Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:30

General

  • Target

    bird.xml

  • Size

    1KB

  • MD5

    564073fb36287299158db87208c3ef4b

  • SHA1

    d9ea8d3bbeee99b3acdc1fbd5f779d329783852c

  • SHA256

    888e1f6b188d57d2bb5c86656872193e2dc882672c67ac53a1c6828ee95f40b2

  • SHA512

    77ad8ceaa1784c765eb3ac3cd2d8da442d5bcaa8086e67de4baa929d020ffd90895fe61710f285d6668235188b9520203b86c986154815cf5de82b29c4b3ef1f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bird.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c43ebe94095b3c3d2931975f86385fee

    SHA1

    680191b77eb52fc25ba534e4815e5c29d476e776

    SHA256

    071543751a46fc79cf95e2c522d352023b0a1f990a0c9d886ac6f8311d11d76a

    SHA512

    e7887d4b77bb96508dee1e468fe3c21fbb63cde134e614149c625551cf9d41f6bf82e0d4f79799832f3dc01a27891fbdae916ae5a5a581437fa4293919fa5b80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    332c11aaf0356c42d69278c4fee9dcf2

    SHA1

    d6813f95217532fc37c77bee368c210607195b16

    SHA256

    2ad76feb281ca283ed4133479ecbba0fb1a0a9b82878d1eba61738ba2712aa43

    SHA512

    86f147d8406e0737048a8a9e0c086180a124ac8944876596c5b5fd1e710ee89aad48727257649f7c3049a6f91b6208e862abb4594a9a0f81d14bbf84ba4289c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2aed5de7afe6ff1a0ff8d86491772ef6

    SHA1

    e673f797566d42ea3d77d7820f928205f4d8ae74

    SHA256

    bfee7b98de4aaf830017129ad51f933f6b5083bdda2a3caff44d647989c35412

    SHA512

    6a5d4d39803a28f3f9f056fcad72265d910b79a8b18ab4368dace139af0a3d51e826c74b3a32b652369b89f1ed2574d50376183f619603050e744265e39b0148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f7a1b0c9b1f45d61d372143679f3d3f

    SHA1

    ec0e8722aeb0196d2a0117631832ed1ae9b3141b

    SHA256

    f8845961c30355eb808d3afe19a7b08eea362b3bf2f698fdd9821c191c4af153

    SHA512

    aac3e50e44dbe4f7a56a7441b11133ffc400fb3788e317abbfbf66456336cb66422247962af65995617717b629a73b051b45a7ce850c97d23b5496486c23ff17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb5452f66b114b0758d3f94fa3f80565

    SHA1

    e16625ad297a922a17e2574b0fac513566b24263

    SHA256

    5c8965863c8033dfc1b61e0b337be82e223f5200ed12729fe33c23aaabbc6e10

    SHA512

    852db7de63615179bf0b8ca2c8a909f89966d03ba74358c06658dd468a611ccd0af75ee55d2f6e74bd2fdb5f4d7c988f6f9661800793b8a768d08b2c7de7c3f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae7738544c12764771488bd4d19ce2a2

    SHA1

    6cff36354b25a8a851103e5a79deb25382cb3351

    SHA256

    e1b21bf6192608a234e2bcba3cfdaf3a7134fd4bc0cc6aa21d30650b3b9d1ca2

    SHA512

    497876b336ebf7969f100dbe2135f1af883dd8331b8bdd9317c37f42e9da6c5c05b4696e7ec3bb2720a4a446ab805dc39aed29f0f68fef7218e969c16c1dff16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1f82fdbdff0bccd35d3b2cdcf6b75d1

    SHA1

    86c6d4e095a5e3be8be447a1c098ff4e53bfa496

    SHA256

    ce89b940b69d5b1838099c7404d75da42cc08b47de5f1123305fff9bbd72e6e4

    SHA512

    a1fd8a2174b10d4abf71b51e5a0f94a9aea2551259771670099a4d9ddc0523dbd59738b0921591337ff1c13736469523e53f832e838038271051433ae92e4a50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21265d26dc4ff74f97c66b2a6c2e5da5

    SHA1

    94598f7624f32a142537d3f0babe880d8b72dbde

    SHA256

    02daef8648619e1bf8d9b259240a855fadf4e5880de63511901cd11a0e301435

    SHA512

    5bdafa71b968d1ef7caadc776c81f521ee5e3f02199ab58ec75b5b289a9297b108f765064807f90940b1c17d70b8952945e98872e40a91c7e5ef3f32fab206e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eff4c7abda5b49ebde3f74d8abeb857

    SHA1

    441181fcf474783512edced32de1bd50519f3625

    SHA256

    c6ef6a0f9537efdc42781aed2d910c1019bd4d12f77302f27f8b1e362d17aacc

    SHA512

    5ea1a8a20f315e7272702a8fa11d15adadfd3674d8cddf0c26609fef5f9fe0d2c33d5c7487665ae597d0e3bea09b777e89dd136044304493cece25e12f603706

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e0071a196639787d648215f293432bc

    SHA1

    172343592ab05047fb26e5ad7467f1454e3f9ef1

    SHA256

    726f5a51a27ff0b51931bbf30f9ca73556097ec1c20e61f7586d80676e011a5b

    SHA512

    be326fe5fdc773fb677354d10825581e1cb420adb435af29e8eb16a90ba44288e7cc8a77d1113c615cfe6d723fb04b6cc7cc702a524acb00c528e152fd88edbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    171c44f0f8ee2a841510cdc284707fe6

    SHA1

    f40fd585d46ee168c214e4dfe6a338508ec21bce

    SHA256

    5b9d25c3a51c8318631c7a0a063a23599be78a7a3f91eaad5486e0f3baa50a64

    SHA512

    b838cf9dde6a0182691ec209deaa1b3754984c973417e1e7c5d690f13c84a353a74275f5d5737a9c1ff7ad0aca913e157169890571db8c3e7968efe3da772516

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    943371eeabfdd755c64bae864b701793

    SHA1

    9eb59250adea65bf62f105adb3dcd9d76e73fb9b

    SHA256

    e2302c64f93a93049d442c70ddb487185acf0b167e95fbe937ee5ccfed2f1675

    SHA512

    bae4280ba59c116a14f82728f89042543bac4b0e75d727d91532dda580b895b66e5ed60635681bb13bcdcb82c4fc964eb277e51ed27fae441acdaf2c04fc6891

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24d44791dea95ad560044caa65e1fc9d

    SHA1

    24bfad534b87de12336dac74a9e6890958c989d6

    SHA256

    5cca6a1acd6560b7dad6166eb42771fc8f8c55c4faa037ca451a04220e3173dc

    SHA512

    7a6a8763add8a23156efebc61e0014da05131c12391fc1cfd42ffd751b400da61c27180384760e948d0d89beae2badf52655b4677155cf27941085a256972323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6eb82bcda54a40538f2ef22e3fccebf

    SHA1

    604e96d665f3ce8ad7eae4ce1c24658f67caa88c

    SHA256

    98b55eb3c324a624ee794821245c3a9cd31ab8480e42d6366337ff250cb57b7f

    SHA512

    4b2e2b98b51190a65b1df444d527b2d44a185bfcce544cb2bca502bc95a21fa4412c71c8b354cbf0a61509e402d156956dc8f1c398fac81239f302595122bdb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    755d092e284fb83d3e69f7eacc044965

    SHA1

    366fbe9557ada42cb65d35f3e6d6a73ae74f7783

    SHA256

    7240b3f073bee9819a935450644764385657a1af233c7f798719f7068e608905

    SHA512

    b7d832557a42c594aeebea8185a8b18533dd262b14c57240d9058ce23f3a9afd4e2ab4263e1857b713e7605956a52462977082471c3cfd24a44410c9eaecf966

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a40a0f63bf4b69bd3f120472c530cd3a

    SHA1

    85425d2d6a981fc44a6ea0ae7e0a73ee2621d7e7

    SHA256

    efbaaadabf81925c747354d52f6e91d4222413709057f6077f558b1b63d67b2e

    SHA512

    ffa8de1f327924a1166c59c1e9368d3eb69741222296b2fe1c365cc8f2675cbb31db74b509521fb34093e147e371fd6503e2f83dfc6e3aaa6ef78ae629475a6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    521d18e0ee88a3d497bd0d19d1637cf8

    SHA1

    92c77f02c5e91681f69f38665f8af99de35ef8ad

    SHA256

    a10a423d281493f0937af33a89651abde29566cb82036d99f0ffe60b7c915c29

    SHA512

    b5ea784d06811895c78a552ac2753bf9d2a65999955b1d82d3c526ab91e4950f1b0da824c3455ba9b6c38dd147e7003c0f43ff1083736edad40c7859ff70f00d

  • C:\Users\Admin\AppData\Local\Temp\CabF355.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarF3F6.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27