Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:33

General

  • Target

    shape_12.xml

  • Size

    830B

  • MD5

    e2de6b0a89c9e1d174f0cc25817d6932

  • SHA1

    18bb110359c6fb3437f5b88f883f768718da3a21

  • SHA256

    fda624f0337792f76df93c9f92e8bc426caf8d145146886477abf187c2d02f04

  • SHA512

    b239dbc451ac54a01ebca23bce47854f519f0b112ee8367e1ff87c131fad049fee0c30f9d3f226e1b17e14b402bd3e0bfeaa60579db0d7bd075029b4546b09ae

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_12.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c31319eb15d4f4eeac556d831f4aeaf

    SHA1

    0382a65e05f95a94402dc278dc4c33dc0d720b71

    SHA256

    dccd59685c27eeb3965232335c6a794f0f7090970fae5ddcadca48bc3ef0e776

    SHA512

    4cb06bc2c37fcfe8012c03730999ae8f0918016806ffc4202644500b1867890a0b82df336a367f2b9a4801a4090c8fecc57f37cd4bbf26ab80a2f4a69ffd637d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a5d3cd59907e6963c5adb07a99e7eae

    SHA1

    820aca5b6847044e6340eef411f6b934cc0f4543

    SHA256

    7470e943ea6fee75e82949b8c5a8774f970a8a939706a310ce018098258d0e5e

    SHA512

    6aa8e28a53a2fc4410c64e64e31d4a30495c76eda0c8919e50ebeab27d8154c4bfbba18508f955fe4ac91489273a91ccc7d2c282855207ce36c733c80a40c217

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af060f150840432e19979f1ef214eb87

    SHA1

    1ae8619cbd12fb41ed30291481d79e3a67cec69c

    SHA256

    3f7f501781395917081df636b4dfe8ceb69bbbf850b61d4cd039305ba829e9e4

    SHA512

    764f90e079ebbba24edbaa5a57aad748c484d3775ae11d292396e4a5f5ee14f1bbb067faeb0df6931c991af9d7a5296b76819bf808741dc713c87675c0113ab3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    045f0f86369689b597833aec25eb236e

    SHA1

    f88bba8d1a8facc78a92ebc06b7887a2eb252d41

    SHA256

    9e019f0ea5d5e87a0b3172fb0907abebcfb7046f633f86fa0bd6a20804156997

    SHA512

    46762816ce8a766b888293b39281593d3b38f4defddfb1c7ac366847cc36d3221532cebe2338329b810f8f770d660e2c01bc0cdf3cb7490ae746f4cb499b03ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66d4e2e53bc9b65c8f98a0f6a47d9d2e

    SHA1

    ec727c0c65776af878cb6713c5c9b56c4075ce93

    SHA256

    aba7291507e5e0d36624fb70d18d8e8885d480878c5c4909743582f7d7d0f011

    SHA512

    6802f309e9423d8ea3fb8aa4b7dca0695ded4ae100edacc9483108879e26ba6f85c5f8bb08ff2415a59600462b78dfd446687ccaaf2057f28ef925f3a422942a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b28ea1d6483b275d676b171fcd82531

    SHA1

    949e1ec40ca3df4617fd51d1280abb6336a5bf03

    SHA256

    e87a17f60eb76ff1b5cc7260efbd43e54acff788f7de2a38810b66d240705d48

    SHA512

    d94976fc4bbe6491cfc8e5cd2292eb03c5f200c2a390260d05d7dcd088fdbff29d9cfc43dd88383b59eefd2bdb2867a63cfb4ef58ecd3842b24264e1db98d27a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c30b7823adeb71b2e44913a3ba00321

    SHA1

    a5d23b9ea1c3f036533fa4798a3cb50bfdb28a82

    SHA256

    bfe5ee7908200f4f4b5739be8d5ca9b42d7aba5be356b51b8f728a142e4428d7

    SHA512

    925fcf848eeb8725641b0c0731ce9819de76efcbeb8459e23b3b8d523c743551745cb38838ccd74c61a37d5b75e7a4675d4ca257211471a022e4e92a4e8205bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb7469595c508b8d89923dffc61a6474

    SHA1

    a276d7bfd60aa40080d93e3cc0c69c75ff960979

    SHA256

    7e25f5d70d0b1367bc1ef91c797e8fbe0c4449d058e90f23c69fec5fb81a817c

    SHA512

    f1e05ce3e8557d9717c04f858e5dce3842fbb280543229dd72b88c8e4e4addcea0c529450c11062e3a34b2d3291b8ef0e4d8239758fb06a62983f3aef7c8767e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddd421dbe7d33255564dec703f258f47

    SHA1

    3f09cb3d93335f5922f05c67b9e198379542d82e

    SHA256

    5ba18162b3c965037ae482277b441b7acee3b23c4967eff46e2f93ceaeecb8a6

    SHA512

    5c058607bf3c52b221f86aed8b37e191ef572efcc36b8984c4664d559d0c6e15818bea734c27a364a043ed48f36b64902e5ee0e166bf52d241ab73602c51f31d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6fc482965b2295951194aed797e46f8b

    SHA1

    f2bb631b6671dd5ab2745de4626d15fcc5fd42fb

    SHA256

    04974fa64b700e78fd8b9923b7d4ef7782251e3683178214146c5fdaa7f7782b

    SHA512

    3b8e6c3afd908a37908e280efb90d37bcbbcc1e5593006e38bab1f8c118394921973888c6d6047fec34a56622d44e3992e57c13234eae4fe0ddf5aef76aeec48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d662006d1e93cb7db803543434de210b

    SHA1

    eb882f827e6d9286cca4ada97f8880b41897a6ad

    SHA256

    c8f3fe81ecf7768d616e315daf747e41f14d5a59fef71fb08f0a6275184e8746

    SHA512

    a32159ff85e90cee7cd93bce07843f406726cd81ba8932774070efe3dd12242081631937f75bfb765bd855357cac4a7f8d0fed75b211b586515ba526a3bc26a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4872d5f64291aba6d9700320e81a603e

    SHA1

    0897a2ddee5b0cdbadfea6ce71a00d3497740db0

    SHA256

    78329f952902c7785307a54a10e5dfcc8e7f9e06cf6d55a9c5430b8643981a9c

    SHA512

    a2abea01f59434bd6ccc297fcb425c0180a210d3e4c83c82d26dcc31b8ae15707c379e8c0e9056bc4e3f46e56eedab58901c82b8f65372471b270ee0293a7552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8564cd7bcc6617045085ab77eaa632fd

    SHA1

    2ab9b80c12f738284cf5294d841bee7765d45a2a

    SHA256

    8ef0abdae2ac483861a3135364bc24a5ed0abdfb99c51a6f4c8d60ca4b7da413

    SHA512

    464cc88de1e914815246cf5f997b9f903e0e1c9a2b5b45e12dbe1b3a3027d69680c5eca208a61ae08f4743bdc51dd6715523a111b7a5303c91e81fc370a5b795

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d733cc3ef0eb37fc1261ec8d171e9a89

    SHA1

    75118bcba428d1d6278bd6eb8cd5ba3c3c41e5ec

    SHA256

    69cce42e1cb1dac61bb9601ca05409e4fc58b8a862a45c9bcf71d4352d4a3b16

    SHA512

    636b0fcf7d4b6c87405a67847c54b8f6d3ecdb3d10e6acd18f72d795adab63934c37fda194fe93a3b7645fe68ff71bb909c014857d6c55ca95fd634b1f4010b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f54089e605ae8538d9f522107d26e5c4

    SHA1

    c7a0141fa5ec18a19d25db05574b4106f5598ac9

    SHA256

    d567e8ed5be7647a166cd685cac8d8f25719a7153e69d0fb66a7016210724399

    SHA512

    593a700eb7b38fc44c23b3660af323b109e6bef1d41cfb9d53baf2237629668ab3b1c8042e09b32295136a8e6c8e97cad3b88d92596e5028a583194ec6c28abc

  • C:\Users\Admin\AppData\Local\Temp\Cab8C3C.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8C7D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27