Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:32

General

  • Target

    shape_11.xml

  • Size

    754B

  • MD5

    c3afcbd5b1c0a44d3a2fcb3022914660

  • SHA1

    01926b15d96092a156099405a6e7fadfd9f01d73

  • SHA256

    68be9c2482cd98defc5a883eac39155058dbfc1a42f132d072e11bde535f85f1

  • SHA512

    a2e2b061f3368c118b4351658c542e9e71116d208d370ad7c86592c36dde254433e92af6ed4a515f1137c9bb0a49f8d83d00a9272a4280aca72e67cf23931dfb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_11.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5592f7f7707927e6a6826d2c2d4773e3

    SHA1

    f233975fe55d1c9f6f242f28b4a9268a9c1e3ec2

    SHA256

    6bf79afe53665f0f81d8f3dd2f8ccce6008df7b6e042ade672325469d71418ce

    SHA512

    41650b478bb921e4936a563f98831e2cd8d980c424d02e5edd166e486c1f8e6a4862a923b12e44f7d3b5c8eba6056008470fab4403e7164eae5b8319198559ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    148e604245f1f80950e1ff9a4884a321

    SHA1

    0f62654de15330346dbc06f4bce81b7f4d6f70ab

    SHA256

    e0874f11ea3511f3ba3745fda70531c4829d69ed85a61d6959f558766ce3b1f0

    SHA512

    1420fb5b3b96b40dca808ae5bf09c0d696ecb4545c5e7250e86e597bd3afab1e3aaf92a717fabd584b1191ee81600dc5fa3ab4ab5df6ff14582aba7a3806799d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ecb5788ea3f4988706d650816eeaa7f2

    SHA1

    16e2b30049bc94bcebf42d8075bf625630d993aa

    SHA256

    3d04304d918db8fdc9d29a367f36d1ecc2fca9caa6ab73749c9a8f0d8dfef00b

    SHA512

    1dad54b86aa8a950c675593c337a2dc1e915d0ac80f96db39b3d0719e6fd0b8765aef081a51d5bd5af01b9983144363053051e52c029f04d4cf60322a2ccd305

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c605ffc84ed005a32536a61ef9c66838

    SHA1

    1f14c1e5da3cb1a2be4017293a030b73e2990359

    SHA256

    1458f8f30a0b5d8ceb3f927608fd99147cc8bed25a7a38df39dfa7fe783f8076

    SHA512

    615a3458b43d22fec157a77b5333d868f0484137909bc77eb53aa4bd97c15234e37361a8cc711e11481c3d55fe0deb61e521a52444c96f6188878d560c24c82a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf501c13a20a21a9e64c0eb6b97e272b

    SHA1

    4207dc1efea7b48df795b4c7d4133e75daf8e54d

    SHA256

    59eb7c2de192409246dedc66d299d9c86e1f2fee94d4b956a063ba71c2444c44

    SHA512

    d3e0a4de1eb954a1601727794c1b76f50d8371b84cc5c4966fdcd995e7ecc6bbaec54bc8cd7c724147fb14fb0d145d409d711607d1c18d79b40abaaa80e1dfc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3c54f6a6325a547534604708f2e1085

    SHA1

    db574331bcf5b9d4ceffe2a3704d793845cabf16

    SHA256

    1662e3c53806faba442c648a284a0e78815128277214bdd54f4410233a6728ec

    SHA512

    a261f5eb41f3667b0531ca45e5fdd2146d2f9f27f293f12a9e108b0821876a10d8e689b20c006a3df59a2de4359886a1792ddde0fa3da4edd3801a1be4ba6c9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f94dfef796d5f4c6f32b31f6a7b1bbc2

    SHA1

    6ceebc68221374a6271826c6bd192ef7b7b96f9d

    SHA256

    1eb0ff995af133ac9e666ddb46d20f1dec0582e9fc7118c3ca600121a2c5a79d

    SHA512

    3a66bbca36e0d955f373e2483156956f4057deb336ac659af59efd83d0f11f9b3d7ee2b52c639031aed28aaf9d3378febf15eb21f53d67ef34a77d2932edd81d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a271278e053388f216a44868ba5fd9f

    SHA1

    1033046aa817daf2f31f416c916fe999ce2fea0b

    SHA256

    7357a6e0b7bcdbb5663834401e7773151852ba0f4732955ea49d303903c5c339

    SHA512

    7c7a059d5b2f4f7ca7a4c2b658454f3a39ce65ed72a1fc0b0088a5cb6ce8ce9a6dd44893eefbffdfd64195a2bdd3927feb13f96a8297a710cd6353c5b3b34e36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83d74f8f732a05f7bbb1b62c83dd136f

    SHA1

    620b0e18b634f41d1d20ce8880ccf304fb8d07ec

    SHA256

    a68201bbc68468a4ef6a04ad73e1c6a1fbcec435010b39c734930fd0e314335e

    SHA512

    df7b9123309fad8c838a7c47eac2dc707c15a54ac0ace7f8220261efe32f0094f44249debd008a88934907cc7f8d927d64d91ead75824c6f19535130b7d6fc37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a223ed1e0eddf90ccd064bdd2d9121f

    SHA1

    be3686f15d6fe02b82f286aa57206dabe39b1dbf

    SHA256

    df6b942fa696c30e2212704468bd1a9db38b33e0bebaaadebef4ec8440a9055e

    SHA512

    e72a64892bf8a4cdf2257a19888c4255fe55c1883a76821375a820396fa8475e5ef1b5456b05176ed4e10d498e631fb0451d20caa47aaa310231ca2fe9d97da9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    721286b727806c700f30bf50537eeea8

    SHA1

    867f5f757f11b2519f6f31e020b552356449248d

    SHA256

    b2d4df258a08bf81deceb867f3c5ad71eb677dec37f4ceebde6031269693ee08

    SHA512

    201187750df8bdff82df1d04d51f6b4bacf26cafcea071a94d7dc03128ec0fd94c7140c872d28b96450f3c8eda541352ae976214423c49db56c33a016012500c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dfdaf06e8769920584a8909a280de28

    SHA1

    d90995c43b024526f0d6e8b169d422761004e472

    SHA256

    815e3c5c587e9ef315c19860459e27a74e0ad1af6953139b8c81a6c25889c6ee

    SHA512

    13f23b39efce85f252098a02f3de73bce854b299a7e5a901ae9e778b21a3be97c4899097d2170e9364416b02bdb002c974ef0a239201e092abe6ca353805b156

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a72fc4947354fa26db0a7ebe25d7bbe9

    SHA1

    7bcf7f4ca76d4393a38cea4dfdc5b55a5108f529

    SHA256

    b0bcdb63ce2943a1808978c7c90f7a1f023da8ae4e4be9cfbd12be908f9928b5

    SHA512

    04345895c30b65556f699e59d9de72ccd20abef9982d38fb9aa0bfd95aa03e84ff6eb3fe9d7351f2944881aae5ff029933abbcce212e6bbba57e1255ae41780f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdc31500c424eab602ab482ccd5c7cea

    SHA1

    1c529eb9daf53cd769d20ee1ca66ec895ecf1fba

    SHA256

    51a8cb180d3a8d6e13a199ac8f3ae5a44498d7700b16ce9be40903ad986646a2

    SHA512

    31506518dd437a63b632a5bcb886377f5b0eb095c29c225b27e07f7462c2479215a7968dda3d6b09cb2e89dc2cc6219148769d3008099378bc6b1dd2792285cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    997836240b21afb1c9c709cae0efdc82

    SHA1

    19dca5c2c4bbc9507671c9adf800ad9aabe38e6f

    SHA256

    15bbdd0dd1a402733d671f6881b5d33a9872151af7b8e1e771c3738d2e5ac95f

    SHA512

    b1c5a49e0731290c0f99f44a0cbe089bc07dbb668b547e230a8dca13928c8bac53f576ab866aea4689095b85fc348931c8864ee32966c83df8f488adb202c8b6

  • C:\Users\Admin\AppData\Local\Temp\CabB2AE.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarB302.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27