Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:30

General

  • Target

    FAB2.xml

  • Size

    1KB

  • MD5

    a5024fe1b8259adff02d901bf33dbcf4

  • SHA1

    bc45a9613897ba56d1784045fc7bd8f575602348

  • SHA256

    61093297596e0335d5f4ed34807ad214dbdbe1c15d08cb51c7777707dc66f5b2

  • SHA512

    ea60da36d50118171c78d99dfdb955b4925c13221b45e755c2542bf9e0a60c355fb8e0f6c0a7189ea74c2d1630cb3c0532cec390cc62ca0254dc5e70ecbf227a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FAB2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06b75fbf73ec3f9f4be0283709a43542

    SHA1

    d07d85923e93d222a82f79bea02551e76414a15f

    SHA256

    1ee13bf87a96fe00cb7e0963c2187ca151c8a91d444b6b5eb8c3d6e279ac327d

    SHA512

    df0828e5cb3fb8b0a81b90400de102be1c9e8dd7f6d99c8040873bbb9658ca090b3809e2a7b0bb744fb55e25b8eb8fca97c6d0b4679e3a34e2fff1b6bef09d94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97b013eb628951ac5b384014f8e72717

    SHA1

    bb42e1c7abcde1ac06be4a47d3656c485c046b56

    SHA256

    d790ce9edfa51fd9f4da0aa0ccc796d51180f9d10682d6cb9e3a46b540c479e2

    SHA512

    13e35b1b6563e06f96a7c99e234935e3ac4a9dd2dbbc9799ff5186786c9103c9f3031b0e39d1238d3b39f82b4db299c12cb31bb620acee6bccfcb9d8cb47690a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c76d1635ee1bf8fed3ac6169e3ff5b2e

    SHA1

    c9b6a4cca8e2acc15303feb9a909f3eee60b3db6

    SHA256

    75b9108f8b1fd55f8e270aef99cabc9abfcf9a99952f3b8c4dbd5535372b7a28

    SHA512

    1230e3e68cc397f6f75b4d9a1154f7a558e2e965c7e4cf8bc3e2a1f4d2700e9e31d09347f005a19d9a3a79fb7dc5a71d6396b50a7c10438add9e4c54f59e89a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d81b4932331a2c3be94b8fea89aae7b2

    SHA1

    16f0c2a447b60abdb8a19e4ec86ec888ab5c9ee9

    SHA256

    4a543787cb79a2a54f4012bdd10621d23c4032d441676876e817e88cde93836a

    SHA512

    69819066b5ba00b4bc366eebb77589e874a1d36a2e568474d982442e61e2580c8c533791a66fb28d36d94dd833f88685fe1ea4b79ceed1db76e3f91475855e63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    375c4744f185069cb04a812cf66e9b99

    SHA1

    4b95e5902f725dd10fb3c2982921d0850db4e31a

    SHA256

    3c752a0fc849015936071f780f5d18819d3da815b8315ae05a68e95fd3bf6449

    SHA512

    1f74c48b86056efb494b3843ffe83edc64f2ba20be2b4d94b3c86789b5da850d3bd22d5a8c2edf155e524d66f750d705dfdb18ce9d6455b481fe925d5e18e789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    048b49e44b97d465fe02f2147c81a39b

    SHA1

    2b1dd8aca96bc14ce9e5e6bd85a4becea31d9b10

    SHA256

    c2e006ec33b3520a453ee943293abc778a507839620572863bb9babd4bb36d5e

    SHA512

    2596c06446e112c6b070b2a32e97adc6bdb895328d21abacc5733c49ed1b7e75f213701c2e74ad6d7e6ab41c9d721b0792ca72336386352975f46f148affedd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84bd63f16909135c0f11e41057ad800a

    SHA1

    9d3127a7e886bf27cb04ac68ce2fc46a776fc3de

    SHA256

    bfd970b21da93a0dad8b0deefc7764711488ffd7cf8676cad138abeed4abd904

    SHA512

    331d99f21475b5fa148990a0820c098c98eef4edf6f291df089372e071a2c207ed9e8542492150688c90c8151ab8b9b0e1ec55f31a0e83700bfd182eeaa4414a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcfd41ecf6f1fd91de72ef90834209fb

    SHA1

    f1604ad330143850e20ace583f1e3e1ab438eeea

    SHA256

    415deb2b747ba8cf8627f746aa3f72e931aef178ea0fe412552faa2dd9fa2027

    SHA512

    9df147519739dbec797956c42eef264b1d33b96d114ef565015d9f452d1b7dd4df675e0cfd5f94abe92607abcef69237fa58c54be266ea49ccaff7d0552588a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a59c98b260b2eb907781eb8c48933a9c

    SHA1

    c903b1ff745af79cc9261c65bcb6a61220f4341d

    SHA256

    73a1e7a91b1f5152356e83275e860b6a020f74de8d97c99bc0a56c9aa379beac

    SHA512

    1ca7b530326a6c119a247206f0d793389d4a381bf4fb554f280b2b651f563d2e3dee65561bc810d099ed249db31ffbddd266f295c50a3282c8cede7018ca9b8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27452ddad33b62cd18db384eccd3c7af

    SHA1

    caca2ee2fdf64940ad7734059ce72875fb826c21

    SHA256

    9a581acc392f1e34ff29b60f8bffa844813f5b368ac46abbab94dcf791f5f9e3

    SHA512

    522722b53988fb2263851a6f83776b476a44a9e31975a3354a81f6856dbc0d90c1605a3ef9abb4f6b34c860f8449433f7f5c51cf114281c46b66ae234b3c16b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c25fa4ab8f757a667b5cb92b5675464

    SHA1

    968d69e5649a39a0950a5563341d554a7ed60662

    SHA256

    1f11692f8fef3362246492f503859c04d71f94faa9912494bd8c554e499ddc9c

    SHA512

    39c54f8f7bd7494350c0deef494435799c2353acd3105949337229ab72641cd913b91f3566ef1b5e2fd77fc18bea7067b0b6f314bd10485e870b9fd75992e6d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ff9819a8431c2239e2f85a34a54f131

    SHA1

    0c89b327393db2361d5578ba2f36a67878605d5b

    SHA256

    f30b74832c80cc4e8813e47f5b997ffdab8d7651f1c05a967123a13f3c44e29a

    SHA512

    220a9c45f146ed6f02315863eb25d4e99ea970bdf5ed97a69695ba92f4037cde8da234388a141d2691c6d063af55a02dc1ac2efaa25b6eae329ac16f5812f4f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf75e7fcb87d908914058a056b97e916

    SHA1

    5c8bfda44f2125536732b56f89450c3c585aca4d

    SHA256

    a0e82227814979a49dd4b6b1c564ec6f06309d1d4eb9c689ca0a3c77ab867f63

    SHA512

    0ef1d73a7717c1c3e6ef87f43f27cc61964df32706f7aff7fb78c3cd001bc9c5e78ccb5d8e7be6c4b90e5f35942e9726fc31dc07268e72bdfaafb258e9dc4e69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f98859d7f6185f119719c489e4b963e

    SHA1

    17def8bb7a9924c44b94a34b7dbd917c3c15ebce

    SHA256

    d1803496a606ceeeca29c475aafed1f6c8c430a2e73024e2122ec0a5931d2de7

    SHA512

    c1b9ac3bbfcdfc0faf83b8e37347eda7eaa4e9f33a0da759748edfff8a42523ecd6e7c1cfae1a07c818b3704fc02439534e39cfd1283aa93a9ce92f55d04b749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a67048c574efca9aadee6f1e5da1a8d2

    SHA1

    3d3d0c820ee0c10ec0a0e80fe07518fd8a728356

    SHA256

    55f53c1a4e8952f82fde634d9080f05826cdd168c0cf0b8dc162444cd61497eb

    SHA512

    fde7f2b6a3dd0459c91f710a1e3d03724887ba7f914860c492296b4e6cb465f7c0d66711d02f6c4fab4282bdeb51ba7206f29df064f91656caaa442f8c8a6465

  • C:\Users\Admin\AppData\Local\Temp\CabA8FE.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA97F.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27