Analysis

  • max time kernel
    135s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:33

General

  • Target

    shape_18.xml

  • Size

    1KB

  • MD5

    03bea92b5a80210f73284dca552a783e

  • SHA1

    6d8c76be2d7ca6d15e7e89f9cc432866173a8b43

  • SHA256

    cd185d4a912dd849f434d07505a9af77ddd98e2b5d7d2a40a3061dd2b12978a3

  • SHA512

    91bbee4dfc04ee1e8875f6213fec804ffc0a4d8ce584df2eb8191b90a6d1f76685a8c3bbcf15befdd4b71847a299d5f292f079b09a7c3ae8b94af8deb83a81d7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_18.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1943c77a57df0f78d07c9f64c402234

    SHA1

    8dc2cea6b0dbfffa243d11c66b1da6b99b9d5e96

    SHA256

    27b5705e670d9707d99b9c8c50d352cf734c9e612d9c5aa011e31d311908c7f2

    SHA512

    308a412c959e6a90445eaf7153d925b1464748aba5d9d296427b8452f84ca801cad10f036736c38aece312eeb6197f66d5822b00823a928c1636417056f2a768

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    313068581f7d8b277a53316f05ba0a68

    SHA1

    6c3fb40a7a9a9e88e0f44c3fb33aa06480ffcb83

    SHA256

    2020a8dbc7a842e44cde5113739e0405dd7eab8cfb8c928795423cc3f8b2bebc

    SHA512

    364cdddba3c39dd5e7d842ee3b4b66be11cfd47ce352d13c8cd36dd067013d012ef9b42367e87b580f33597b9b510889b0a3a203df6725ce972ed7a0c6344a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c7e48ae39edd0de915fe3874edc4aa0

    SHA1

    3766a8daa832d917628816ec595c2b1279eaa355

    SHA256

    3839af6ea4ec4514e555cf49335ee741b228c7df5ae6b6bc847e3acdc56662ac

    SHA512

    d1c24be2de9802a4ec9a090fc940ba8b3f0969b613af262f33952425f74990f44103eec13537fa5c6f878f572948641a768a1235af7fa76fb20ef8550978f849

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e20d708ff52edcf0344630b6ea0d7760

    SHA1

    85b4b48bebccf050fbc37e8fa637f5696d46be8c

    SHA256

    b42a4a38e89e74c4ef7da40e042bd0deb128588e5737105acffd59dd3f5c7aa4

    SHA512

    9d59052f67db1e1c96b0823beb93ad6994ed5ae313265cf925c3a135d24041e5026d2c2c5e28aba10089421fa7dfa3b96dcf5ec2edce6b91a17a4244cf7f2d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00d7dd993a201c1a19f90df9fef462fc

    SHA1

    f375d7e5594a1508a031c14deceb5064d6e27bd4

    SHA256

    e25f0123a7099e1a76e5a0415e917fc7b944baffb9edc8d988c49512c4c41b57

    SHA512

    f7701072c02335ad714bd530b50638134d51bab97c31058dbaf7efd198d16668524c1cc8c19bb908536e0c063ea84644088d3849cd07b3ba0cc39c9cd34d8a31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d932d691d3f4f80995261d5c5a32a9f6

    SHA1

    bad0ce73c9ad495da7599f3a7b3c75906afc2764

    SHA256

    7f5a4b958be497d89791a5e11167443c181ccff0b45b53968b43b2476a0d9bc4

    SHA512

    12fd9867bf03720dcf0445a5e94c3b3b0f8ae8033061492c0c02f0266278da5d605bd43fd7f95a69638e5ee5d5ca2ce907d3a6a56a991a6c0f9baf7cfd1af7a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6016c7cef22fc6350639ede716faae7

    SHA1

    89cb0f85adda79ca9233e59d6c1525251d8c987e

    SHA256

    01d6f8f7b2dc1c88f8eae720eb925977e4ca4ba7fcf35b4d9d4f30f0974c81d5

    SHA512

    3fca39cbd89cf746a1cb109627313c6ae6914137de268a256fd60272413e125ae2b37dafbccb961fde2a5ae253d1af01bdd40f4502919ba48f6f2977bb7424d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    466b6dcd409bf4562b3e9fd0c3fa3b78

    SHA1

    03bf432ace00073afafcb181dc91ed172ed9acdd

    SHA256

    75ad012cadfe5bdb809639f82b522c8eaa25667c085f89b0cad6dc2fb9a34acb

    SHA512

    4f47c7fed43e285c9bf7d65e57c45cd33a63c572d2e90da9074bd7648cde5a8d195781ec46eb73af8cf8f4d1e1ddc235711ce690fc40b753e7894b18c5e3f0b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c01e71bcf036ea01e19206215cfc8575

    SHA1

    dbff00b6aed25aaa148699deee6b6516b01a74a1

    SHA256

    e23aa6065521035e27302f2807e6dee72091958f330f35fdc52eca92cd9bc48c

    SHA512

    4cebf59e58d00c2ad6d3fb81dca9543e2a3f593f034dcc775d1bbc3d102be84fcbcd36f045b9cbca0805f3f92249706a06221308f731f401f9a427f319136369

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d2332b5db9dc5825c56284a50c8004f

    SHA1

    d539dc862541dfebb7011bb9b49cc81ffc4ffaf0

    SHA256

    a9f2b3f4e5fad2fe3c8dd4edce0bf99eca87fe50e1a4ccad8ab9b2ab9adc3dff

    SHA512

    86d00fc439efe96dd0cd297457cc847688fc6a8152e800234cee577bec8715234da032619bdbf43447c101a2ac3fb74628baf5aa3c0fcf284a93dbcdba221b68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b410cc29936abcfd00c21ea3ceceda6

    SHA1

    9e096579e9e138f525982f744e25381176c7402f

    SHA256

    4082c03d21be3ab9d2339f09e885f9f3333f55623c85776db26f090ffecd27d2

    SHA512

    43b04c3602794797cdcf8933a76a347a0427db6dba7df989aaa07fd3840237dce4765da48317a81805d845b923639d1b5ebb87a764a6e989dc8fe77bd6d0914c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92f8bc6043c432f9e1bad7b7ac78343f

    SHA1

    e0e1095e5e06142c0fef1b202fde423b61dd14f0

    SHA256

    38017737f0ea913adace9814cb6f89b50d579f4b2b7f4406e05f62c1d5f37808

    SHA512

    6063265c62b493e8ee90a6c53f79d07bfeffd2a1b38f48a86e9ab570b40835b8d79cf8930e781862053460d89bf8d531d5ced878a5a7282de67648c5206ac326

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d2729b1dc31ade2f43ae8ff5db846e7

    SHA1

    f25fdc73c4d446154eda368dc51e0660f4383e36

    SHA256

    ef3c02fd8b63b7ad4968dcee7e9182e277e30354578189dcc46dfcb9b4cad1c0

    SHA512

    66915f3d9c33fbf90f275d58490f3969b3fb8b513193086cb9eaa9620ee856bb03784679b84cd6dafecf0759f4c13065519f0b917690827cce7e8d4de7763cea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2bb8397bd1806ab93c5856510d0c325

    SHA1

    030f1871f3fb1b87722f0b410fd15d8f8e443214

    SHA256

    72216409f658086fda8aef03c4966a695c07123f6437d031fe2de12c30304077

    SHA512

    cedf1591e498fa70306e390f6d144c5fde57f5640d73a190d935512a6152a49f5f3baf7693f608e10fbeb9e5dfc9587433d35ab7d540d165491d1768b88bc6d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8371976f16b92487944a471db185c99f

    SHA1

    1fa0b09b789d96dd9b41db0bb6f4ff0261f5c54d

    SHA256

    b5d738115c9cb00f18c4f396617695f1b3a85f095c9270eab74354b0c902f290

    SHA512

    df7a5bff9a3d0d996129d0bdef0a1feabf80e8689e14d852ef12d3acb0533f1849ab2b6c88225506d3bb2fc138c2f3cf03b3bdeb9a94101e11687bf107b5ccb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0582743f2736438f555a471cb39d2b44

    SHA1

    b1eca88229c91b3fbadc15260493fc4f56194ba3

    SHA256

    b3497cb3beb24aa2f9c1b880bd90df43389337c87f948a2d43836dc65d017a55

    SHA512

    0564dde80e8429f3a512af516b818443fbc860db43e14cb0cf9560a2b897931227a573fe713880ba44b6097d91e0cd32bd4763c68b180cc44ce5f2e2964326ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c53ccfb3abc12108e88e97e0bb260cc1

    SHA1

    4fdb4ba618d72dba9b819d115754e1be3655a0b8

    SHA256

    c70fdad4a376017f2afb4a40b67f9339da717b68b9911981df25630aabf6132a

    SHA512

    25b26a6a6ca90e12cb74fbbb0eaa68f0c24207787f15e0e0651f06a1e050da7d2f5ae892ab95a238b9ce19bcfd9b77d2a845991e1913cb4d4bfb4aa42706388c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3ca43ffe862b4cd319856204ffa4d8d

    SHA1

    2a19ec2a3c8296c642a274543187f32919b801dc

    SHA256

    6521c6fe863cfbeae40895bfcba9349d7ec8c91631d835a79d0aae13fcc669c8

    SHA512

    e8ef8cdad9553aff0b9532cb74b0435728210b9af6f1ddf3de8abdb6bd3fcc477cd9700caa4fb57af64fc65d656f3e2e78fe711cec4feea25af841c6e2132eff

  • C:\Users\Admin\AppData\Local\Temp\CabC248.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarC2AB.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27