Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:33

General

  • Target

    shape_20.xml

  • Size

    3KB

  • MD5

    f5435cbc7107f6ca5ced160662cf7e4c

  • SHA1

    6c57386e93e4b427f372d79d895e8448c773d505

  • SHA256

    a6c337992c71d6b3910c6f3f5dbb9ef071e70df9f5d639ffd275ba3bbc7678c8

  • SHA512

    729cda9e7174f2d183bfd38ed9a9cf7a81e21901e2a975dc84b53589d68fc466ec97de03a089346da8b464778ef73342467b3e55e544dbceb91cbfa8cda1e5ec

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_20.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37252646981572153ce8df423de4b751

    SHA1

    a51cf3d6896fbf73ea8fc30be53155daff332d4c

    SHA256

    2ae8ca5310e994a3c3b983410d3fac63d819b7bf17e892533ac150b79ed15f86

    SHA512

    85b62e574442c6cbbe49407da474d5e62b652741ed591a47e7ea98cb0ef3744757b933e80c5039759e5d427b2e87d1fe926b12d200f14b323c688351ba784670

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f38c4d25975f1588ea2851c58a6493c0

    SHA1

    849c7d5a3540620272d997484c21fd2143535236

    SHA256

    3d18665490c32950ad6447b50d7da3fe4f3446584c0cd38bf0eedda007b366ff

    SHA512

    a42df91623bbc4192378cc892c1887865247273724ca2c7f26823d9069f22fc1641e895119eb71eb549e416efb6221625b77e01714fd53ec9598f5cfa031577d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46cea534b9f63ea7b5b135578524a4e1

    SHA1

    314726ae933fe0a1f49d5710745f4e74dae03ea1

    SHA256

    d7cd08fc4709cfb7898836b96e0e6f6c025945a92bcc7088ba710477fddd05c5

    SHA512

    cc71a251b3c1c1f5b8941cc476aa2bb46339fe90c0eae86db5aacbc8391bdcd6fece7dd85e16bc509e23c3951613e9956d3a705d1447b28ab0e6c43e90aa013b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9d83b8e128958dd171b2be6edc3620a

    SHA1

    2d280272a065e8f3e8d24ee486eac13939adec20

    SHA256

    7702d74769cbcbccdde280fcbf74c5ae28660741afde0d202214cc946abf29a1

    SHA512

    d35df39af36ff22a215f107170d41e003565145487ca809b518a88773b2e6aef13dfaafeb59c0965d8f60d6546ad383a5a792e8699c7df2499502bc1186f1cbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf9b336a5b60b534d21e75aa3bcc1066

    SHA1

    1f62ef021d47806acb3cdcc16e41081cb055675c

    SHA256

    7a8d6d4bdd2b20c22bbf05845c35f6a5eb35b5c02c966a72ef4c663a1ba7b281

    SHA512

    ec9aa213d653347f7bff0fb1f1e0ecbeae3f50126f3cf89b4f93ba91327029064d6a58e87c3b7ba8c6064571fe0c988fbb619bbcdaebfb970d54658dadd85847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0c1840436ecc01004d064d98668c607

    SHA1

    e0c3eae252acd84bbe9ed083ee361b1b55de367a

    SHA256

    724380aa6925182aeed725834bdf6ec706f4b875e4cc9f754e1af692db8077e7

    SHA512

    4643aa8723344434ed24449af71711cd5d7e8520850f622c0f49db89a0d773a716846fd3b9143684b7869a5f982c1bf6800fed962ff75ed42f38d7bc8fbaad3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eea1866776099bf1001d130e65e99e52

    SHA1

    a4e650002d4d1fd6648c71103488c25dcf411260

    SHA256

    5e611d9599978a2875528f1f441cbe9160930ad203344ad9e3f9d942a32f298b

    SHA512

    76acbd6dca335e3cf4058c160c79b8dad48fa2190d32048e6056941dffe6b95a1f76f57f3078e3c3d8200c3be15444de2726f2f6adfff3f059c4f8f911b5d6fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c337169cd84afd5ace16786d4308de6

    SHA1

    9bab21c4f7396005ef4039e10c49e5b42e31510c

    SHA256

    57cddedfca37e67887cb41e30626a94b52e0ec8a5b5108e1731e7ce1d025e860

    SHA512

    6b36abe0e1de30ec51a7dd86aa39651cf4b551d71cbbddf776a1db6a7398e929daea41f11dfa866dc80800515d505d2ac9bbabe293e54d7400864daf332f9ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48811a5c7069b7de34eb99789f116ae4

    SHA1

    edae7bc6a0efbff8f5038d73ef43842cd2361217

    SHA256

    7ee092899ac63e52f0896282a0be5790658057ab97085651e31dcbd014e4318c

    SHA512

    a183fd0ca852bff180edc16cefef4b8b2193766c4483ac32270e5010643bbb2a583d7264090e2fa9b44497e410ac15598bad94ad4f3db15bda0db6f58066a529

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb7771c3fcc1d70b3e8ae0dc13bd1a56

    SHA1

    36ebb1368d82d88dacae891d98f597bdfff1ac7e

    SHA256

    d122bcbc032db62779165b9a97dcfc90fa167669fd55676ef4a37c67dd349e61

    SHA512

    dda902eef64312f9ee1f9daaf0d8264d688df090d147b7c42a9531b1566c51156bbcb5f81082777a00e90b38ebaa4bd8b6d6c27f4b8b7cdee23eb371a1c81281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6111dd9bcb263970e438d9349304dbbf

    SHA1

    f0dab3c5c7c938f159fead61af0e1cfa72d7d7c1

    SHA256

    cae092b71c7bdbc545451286b82053aca5b0a3cbf71a50e8b3feb464f6999b0d

    SHA512

    fa5de5681e7581168ce3d65abe8d910d2ac57b831907c5b4106ce5cac52751381a814aa56361292825ca3f39f2ac5992e28a744f30cc7f6e395e3d77fc3621fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ece3754ea16bdff4b5f1136bdbf19368

    SHA1

    b17e544adb3e3455e2bee94764f905f177fbcb31

    SHA256

    2e73fb9f15358af0894799a7a08cbd02d39a3562eaadca689946de87cc87bf6d

    SHA512

    1bf00c492387517284bc5960c756e03926f196d5d8148b9e5d50c77e11e96a0ac6104da9b8e886347259c22dd91ec79165dbee941d3b591984650a9f4502131b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95b01ec596b1600646186f843a29b7d5

    SHA1

    9c051a7c55731115d124c83472ddea39875a95c3

    SHA256

    9f9304d02493eb7ae0e2ba4d893f1217383124ea575e83aca5e9040d93865a7e

    SHA512

    c317e050dbb165440345d9304cfb012b21b8301b654250a6a62ee06516e875a18a066f10c14f6c3fedf526d502fb9d174e3d818711cdbc38f51bbb458f9d4153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    896f71d4cb097b5d678d47d0c828fbea

    SHA1

    9d451c29efce4e849d3810a36693d11f368f134b

    SHA256

    d8cd3c2ff4ae64fecf63ee08159849e8bd2c0484c55ed2f15d5a5a87ae4c837d

    SHA512

    32313f31ab058d40fbdc3771d610e78a9a5a2338edc9fb30f152d97499786537503a288fcf00943164976d3d0b5b36e0e1393219b08de87ce3c071137da0182e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    542a97a8d86263499f98e8f4e05a4f9c

    SHA1

    8485ae1ce9b26c2ebf9607467bf18c8edb16d17b

    SHA256

    c290ca39e3ba25ad0b654e9c0404a25d09f39f7198220b7eb50dcf098d633d13

    SHA512

    9de92afddeeba9e17190bd95bce79b066b35838da26fe4b5645a79b5f811d8cab541cbba45a0ac56b0374533da32ea554ef3d407385a1b89aa5eba21f6cc71a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07ef5f9c3241c3b6064fcd375a105e2c

    SHA1

    1297f2d947c7909528e7b45cd4b7bae44ca089d0

    SHA256

    47d47625e356fb5fe508537851f818339fb52190838c8f5f3391358490dfec2d

    SHA512

    bf2349276d249b68f6ec37edbf91a57c13dfb46a3661da75e8c4d486a2cea1690dc7b022c304ed951d7fa39b9030bc619a37b3d9409e96ec88746bf013490e75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d40ec3038a1e3b04949ca2cffed86f54

    SHA1

    bae9456553eeb908351737b6fccfe3e9fe1b673c

    SHA256

    b94bd306f7fcb2cb9025988d7382541917a52a98a0fad773b771f22a6c5bd331

    SHA512

    c1457d25008290b3d4ff675d379c5bd80d9f0a654e6c40a65aad0a5aee4af5d123aca4087c81d10ca27a3599b4a446acf338f80b666ac6ef0d884f8d6fde2344

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c05c64896b33672e04de9f8f15c6c6b

    SHA1

    9e5690341c0c57ad54c3ab079ecb01088439e690

    SHA256

    105e02c6aba6e09d75cc438984b2c170c52247802d9adf90aff7c77b17340a96

    SHA512

    5ec1e78e993b40ba2f7b4a86bc2cc5764f69c65387e696f98674d54a0039f9b6821c64fc77cb996e6a03145d389d073a9ee8bc6fd120d35c6827c7202b03db8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee94e89985740a2ef8281d9124c3f7f1

    SHA1

    e51dea1271899e687ffbcd75f502ef3fe8eb33a0

    SHA256

    e6d2f26d0398d67cc5a6dc83c538fe8b75d80c33a37cfde95a8434578f87324a

    SHA512

    cb645a271f55da3635b1c63e7ae81d122d585c9f68c000717a145a995ca700021dea6993dbe8d23da35415fc27a532ef7686ec631ca0d710f142b52d88ab5b3e

  • C:\Users\Admin\AppData\Local\Temp\CabA805.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA866.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27