Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:30

General

  • Target

    boom.xml

  • Size

    589B

  • MD5

    b4ef4359b2f85a6594ce804b36b96876

  • SHA1

    62deac4f0087d7e7486a5c725ae6588407c9f258

  • SHA256

    82dafe3ff2010e88478ffc68934006b9b6dcd6efc8d58d58d8e0f38adc35811e

  • SHA512

    8ddb0dcde339faca1cf95eff030b924e242f6b071f44deec4998c91e04d28b98de20c415070fc15b88fbcc36d04da1cd76259e3d9a448de6ff3e2b976d1dc699

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\boom.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82179b90de91aafc56a4305f49514256

    SHA1

    8aea038be5c464f925820f15cece1d88ab4260c8

    SHA256

    a977781b72a48b7aa7aba5ec7bda26a092a62f76d8eb59e3baf2f9855f8b560b

    SHA512

    8bc7ac52af364ba3c7f273b072d233d3c40ad88234fb4e64a8918a07e73821b5b459564373f5e43d0197b6cc5c79112fafbf7e8a3403080bb441ce8116753bed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4af5b01fd9f867dbe501d31feb52dec7

    SHA1

    fa57db8fe425bb9512c476def4752dabbdfede58

    SHA256

    a1d9396fce61e5db30d7a97e0284cdc44313aadaa8d974f3133ebd0fdf912579

    SHA512

    1fbb78dd08d249ca75cbe9dfee0e037fcca84429ad0b5d227a2a1d95419cc61c7c402345833a347204dff293000a2d0327c9ded11fca3cf3660effb09ce40cf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ce222052f047ad315ab55b9f106d9af

    SHA1

    8eb040aaa99e8f02e39cb1655ad77e701a63fbc6

    SHA256

    4d8bedafdf2a6de659f92e37c83b7c4fd4c27f2154102dee166b83f946765b6e

    SHA512

    23e73381b212fa1fc353da3f77fc6bda7b8372ccbe18dc8db2aa873241504f1393432cfbea44aa3441377fbbc4cdc9240e69d3558a5f8c9f1220fc6e3e7a3794

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8c3fe96e8cb2deeb0582ea3483337c5

    SHA1

    c2d8290cbb905f48636e82ac5463ea5403bc8aca

    SHA256

    a5f4b0587ac0361ec6452e62ca1af4bb8d62fd0acee44ee4f766d886442ae80a

    SHA512

    46b4886de56b4f64aa45c642a004c48d5768afc1eabf689cd885195c1387a0adc73a394b87d70a7bb279a18b4486db5a528a918be3050424560e11d7a3337bb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa954e06d6e6319dd1047fcf8e78f1d6

    SHA1

    6e6e91856b4c627ee5da0ee735f624bd3b001ea4

    SHA256

    d89e33058f94fa234f4113d9bef231269d73a006cd2f3ac71eac9d77e946c2a8

    SHA512

    d9aa823725e40a89efca5a202cbe9b2f9217bc5ddf5e700b4cbbbd57d7d2f3eda8ca7cf4be5b78c6d1fdfcf85f1b616131b0fd4ac98656349c4457d444bb9e32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04b6d528f8089b6939225962966fd6da

    SHA1

    1c4c097294436032a4c184aaa1fa84cc7c69012f

    SHA256

    9e16008ec690f9b0b6cca595f51ccf44699a31abe99543b0a560d34139094d05

    SHA512

    2d42553acd81a16226df1faf94dacd7b9670a30fa08175a9a21e3d97c3e372e32e931bbb7fa658e8ca817fbf2fbe3c3e4712789a58cce3b18e953d8c4f26539d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb2571a75dff1cba6a754521696f940f

    SHA1

    29f6e226ad7985f9f525a69b059d21ea25ca1e4a

    SHA256

    1121cefd0a3b1db997824f55453a25d6f201561427cc3a8ab1f52f612728dd05

    SHA512

    35d8f5d69628d4e3ed8cc9964206dd42c7610acce35cc57e95664005af10e6386d7401705ac5b7b326df835492fe920930f8fd5fecb9ce82033aab35889f2154

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fba6e4623d393db51a3916ca292cc3b8

    SHA1

    a54383fae977599539781e2261af646044b85371

    SHA256

    0e7c811e01a3f613c92db20bdbe1d48e7aaff78101de0e58c44fdb4b84dcfee7

    SHA512

    ba63a4c9fdd93217cad7840f3ee187a83493798e9334057bd265d683da8eabf3a4d0c01e80105ddc38d0dbf372e95ff23b21ecc0bef17f72b1314f84989900e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c3a8af5a6bfea93b5e6f309334d2187

    SHA1

    d5f8691703aa98e624d15cfde45b6df88902a877

    SHA256

    53b772f07479e32a8b90cc1207ad55eb88b62ed1eff1d8ad059feb3a9346f9ae

    SHA512

    f7064275b942505b8265dc07ca405c319e5e504264a17f7de92d21a473f1ccb5196b564fc4064f2901e9d8341b5d51b249e1bacdbba8bfba32e61d793dbd64ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5455610001fa399e7fd92bd5cf2100fd

    SHA1

    00ea0ed44bbc5730d11b198c915bd18c21e06e9f

    SHA256

    0e6b5b37ce22a329e1b6f07bf89830b2fdfb642d0d5509098aa09d619d3c522b

    SHA512

    feebd75fed6f132d42c8bb8971790f75372806e23196c71d3f9c4ec38e45f6241706b80a473aebe4c20796b6d89d3823a97b8c52c30d2fdd03c5914ddb43dd70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    459c4508e97000db883c387b909a291e

    SHA1

    a851b389590559a6407317944b52e154d103022f

    SHA256

    fb9b3994478bc65d4e5c00ba4fc2f55339da5bcfb0f926790abb4139a081faf0

    SHA512

    52072877311a678eaff71ba9a36d238bb014302bdb76d574e5270d233fa05d25c9232c8b55a91ccfc2cbff5668f03c64fc0e00cc9c25e95d8b5bb31d3090c185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    723ecc13f978c2a24e9dfcb29e93fb32

    SHA1

    530a578dc9927eb488239f4c95004869dff27bc1

    SHA256

    a31270104abff0476ab9c3ff974f54ad30e294bdf0706a8e68ec118f07b29bad

    SHA512

    cfa830c80b8e67588a00ad2dbc0457ad818613894dc4adcbfb2383684dc0aa58734006663e818514c929979cbdc038f1b474b9aa94bbfb71ea5334c56d907b2d

  • C:\Users\Admin\AppData\Local\Temp\Cab9F2F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9F61.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27