Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 22:08

General

  • Target

    bear.xml

  • Size

    2KB

  • MD5

    a3b81d60e065ed84bf23746ff5dd6b39

  • SHA1

    7420fe1744bcc51399be1efc8331d6a808335243

  • SHA256

    7bd2c80b5ed3cbf4a70706e9a07f68eb9be108cfb3046caa02362455d0896096

  • SHA512

    56987ee2776451b55eb99b13fc0981f65e824fcc61852e1a5e481e4e94c4509e058337718960640e6caa52c6a1c5db28b6a14ae5c356abae57689a6b6221f750

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bear.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    116c5b929da539235407dbb24791c65f

    SHA1

    95b90b7e10ce06e9d95656753e7aca078d58701c

    SHA256

    be3f8b91850d61d89fc73e8fb1baf53418a8723877232511c66c3232998215be

    SHA512

    655ec28f8e267dcaeb278e9d4a0f2193832be5a77fa2c86f1ea15d91cb33097f65742f78f92d9c8e1fc5550f8b6adab4681aa067a37f2b5e47c5ebe7db2fafb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0811588b9a9c51efdbe58ced5101a0a1

    SHA1

    28d2f87df1850f6b09d52ce93c8be4742965a261

    SHA256

    42bacf55bf48072bbc4092f263867bc98102853ddb297e34e6e6b0fd9661659e

    SHA512

    afdf3c4155995f206c64f29f6a4624ff8275034907a3314c044aa0f6f48362d5946f3270864d91cc5fa3ee98058ca97ed115d285fa99670deecc70338bb01d7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21394474265656a049bbb32033d9daf0

    SHA1

    8c4f57de8cff617555207a0a822fa80cac582960

    SHA256

    58b6015e6064cb8236de2ab3aeb8f9c820f6e827e9cfa59f33266a55f1d54ae6

    SHA512

    5d25ec96c6c49e5f048606ef95cd0b207c177e1f898d89b629ebaaa0358055204ef15c6cc4b3ea6b8f64258defdf04c6b3ba806293638e45d4408959a92866c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21adb47c5a56438c27fb2354c0dc928a

    SHA1

    d8430a119dab00ce79e0ceaf4e0c3d6cce6309a8

    SHA256

    744f7a923d6b919858c963136da132fb68791c64cb1b42fce8e5bd76e7ff21c7

    SHA512

    8d6b0fa479b3e63f0f235be25c7c7bc0ab13cd5dfc387675010ae7bb86cd9e84d059ff270e458c32cf1c38d54cf6ac195961eb4eaec6596cbcfb4eb7d3f39c45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    290dd204b4556e6f2a6508e1fddd8804

    SHA1

    0dd004bdafd2e27db801658c3499c21dbb79d5ef

    SHA256

    67f581eeb539bc62d3ba2e9088d5d8b31c0284f0a44bcec4aef29d7967f692c2

    SHA512

    77fd85bc1d4c66e7f7fbc03d88f3dbe8b1c8650946780792cec6de0c956324f2065378f4b57aa14508de636425a0de6fbdd5aff345848f4b8cda9da8f41b00f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1314662780366288409a1da38ab67e4

    SHA1

    18a97498c17efcad7a6e939a170a290937ae6b20

    SHA256

    e809c78a486bcdb929c60ea23125b70c4738ed6506fa9aad40a39c3634576183

    SHA512

    c1370425d982753b1f321a89fb963408d5b7bd59607abda4e7fa14522216156bcf4080587879e9cc7c1a535ab270d23a4089ba4f29902383b4123085070dd247

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22cae883fe2ab7e13813210f522091c3

    SHA1

    12cc2c0b55de6a58291ad2ff53918d2126f510ae

    SHA256

    da68ef72d045de54d34de582d3cf0b1658ce8f7eef1e5e09b1a3485e073e7d9d

    SHA512

    27644786786fdc503cafd532c63c7bb388ee3d730e7b7af4312709c238a0c936942356b6e469c62d74698d8127342712ec1193b5efdc904f4ef6fd4aaecea375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b43ba90c4aaeeee46da91ebafecd5e5b

    SHA1

    5662170b397e49629fb4ec6893556610648c4521

    SHA256

    5b9a55c0b06439eb8bfdcbd7cf9f7800deacede302f7835561a197016a199137

    SHA512

    b90cb2c77086043cb6e1f3294c0da1f695d96a2815f6ea073d8d0a0894a628851a5234836aa4b54254840cf6f1bb099a9e064ed9180f8a84ad7fea3516c8cdb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8928829212e74294662f5dfede571280

    SHA1

    d80b39d2ecd703d3f274fb2566b642e69124bf68

    SHA256

    4b68307ef79856b838ac864cc0e63d08dadec602e68d6488c30bb9b70233c194

    SHA512

    96d728888895e0674d7d9027ec9f8af3941d856ca126ef5b3b31a422799eece2dda881ece6542130db70509a6234e1272543fd07d9cef2a89796c693d86ce1e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e789452d68ea3f1221560fb302b02610

    SHA1

    b2797087f5d8cc1111f6ee177119bdfaf7977a2b

    SHA256

    5752d75e74d009c5a2ddd8af420575255272487c0d18d2bce7b5bc91f041d7d3

    SHA512

    4340b026ce5dc98544a2aa1110910fc6bf7032c120f814d62d2a894c7cb7f8be28caab4f5f3fd58342b5ee0234be7c270896425c60f0a6013a125d170a72b300

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bdd124e20ac64e0af16af96fc1781b3

    SHA1

    47df10f4ce9866125fa866c71dea5c91f7480593

    SHA256

    10e299a9930fa2ec1e6f4a69315fae7f6926c8a6137b4b79547f253bd729614b

    SHA512

    9ef075520cc506228f4c2141f205deda06c7111b888e00053e6d0e43d9377ed4f4df2eee31a6cb073222d1c995f0dc2cd0852a4aa74b6ae162b37b9dd5a1f810

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da678b6fe09b918cefcf90c5d994bf09

    SHA1

    7c456337a81702ae60297cdc53b7f881beb3a327

    SHA256

    3ce59a430e30c326ad6bdfd6fb1e3863b8a85055502653944ba5c18f5d4278df

    SHA512

    8f2ffd22e163c60a1f628384b71e3a8fccebae2dd8d0da51086692162ea852592a75ae5144eb3c5d368aef74678a0b22e5516a111ec1f2c6281fdc3c66c2e53a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a014731b5e867dcf849edcbb4c2767e0

    SHA1

    5c3a0d63f19f541ee653b3583598b84835af40b3

    SHA256

    94f62dd56d2f8b1a768ec4caf60788dc4ed57880106bae3ee0b23d2ae018fbd4

    SHA512

    c6e9774d8d432616c2b98633fa9d32d771cdcaba92705ec3112d7963086bd110d710ebb3f15e1274b087306a9d9eeeb66877665b6010f14f56f740d2bbaa57b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f37ffc3d93edede3f46089142862ec7

    SHA1

    ec940c2be3f1ea4299f734cce0af7777a68d0c6a

    SHA256

    151ca6afaff5c89802c0285bfea2b10caab1e4d09cbdbc747a05266552cb3eb0

    SHA512

    9ede547be5188961a6fa144b2eb66b44424fec8fb8a2ce30d799fb752c3430d93177e8eb69b18789b237635b24e1f61296e0de0be61c0fa48573d1c47fc1bf10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19353bc24a610858e54193c910a69559

    SHA1

    07b3eb4ef4ce890124f1da43bb2354f7b4c3ca0c

    SHA256

    90f22a9c7067f6c61b01122f6fe0ef67bb13b47bc44f0e9097b1dbe9c05353cf

    SHA512

    bdb036327dae50aa842dfb24bb142d4cf485d0e4ecc6afeeeb4468dfc4da6b815b7d43d0e2e8d1a07290d1ee9c54359036b6003938b64021c649babb0a9d8d8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28492e651fc06e3180be74e62aa68e9b

    SHA1

    75877f322f8fa5bca518ea29dd9477a543d5db4d

    SHA256

    a5512b442f740bc89370e728406b1f3fdd9077c996b4bf908b9305836ff53d09

    SHA512

    1c0fdf699dd884e25590725d9d738655e883518bee09d615778e973eab7e47490e3847bcd328398c442392e1c14ccb5cbbedae8ce1409413d2cae0869337c1fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08398584edd63e58e9b8a04e1c5e3b21

    SHA1

    16ec6b921734e1fcfbe971ad12d5437d827cb072

    SHA256

    0e27735f5431625513864a7b40448f0b0fd9d21eac77652638682ac8ffa8d80b

    SHA512

    05d473b8b0b1adc2c02b0c8f2a1132bf2928dca559ec48ab0e13175222efe6d723d68ad0f8ed36c0d484db4d24dc98cc850260afbd43aef7318d52f228d3d83d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1862b51019d9a229129c8b9d5da25d69

    SHA1

    137c235aa8c05f7c448a6bf5fc7c075fb80ea062

    SHA256

    e56003d65d4b43fa0009951deb64d7bebc54d7ef972c14e0f11ad3cc43edb858

    SHA512

    9bbc80ca72ae6a61467cf414ea4d8f3ce62b1981b7828677fab87d0442e37e8d94d1e5ce4edebd64c250c5c101a161a0c985726b2ebe5deccfd36d45d0af34ff

  • C:\Users\Admin\AppData\Local\Temp\CabE5DF.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE621.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27