Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 22:08

General

  • Target

    bird.xml

  • Size

    1KB

  • MD5

    564073fb36287299158db87208c3ef4b

  • SHA1

    d9ea8d3bbeee99b3acdc1fbd5f779d329783852c

  • SHA256

    888e1f6b188d57d2bb5c86656872193e2dc882672c67ac53a1c6828ee95f40b2

  • SHA512

    77ad8ceaa1784c765eb3ac3cd2d8da442d5bcaa8086e67de4baa929d020ffd90895fe61710f285d6668235188b9520203b86c986154815cf5de82b29c4b3ef1f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bird.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cac6048c29b62c7e1a96a04a1d43a79e

    SHA1

    4d2f3cac45cfb2f40f0c7cd8220042aef1a5775d

    SHA256

    60a4ff9f7fb5b43ed4deada41cf9c6be3a36afaa26c9d528b44fad5caf28e2ae

    SHA512

    2890456e8c1325624888a062a89b124bc6568e98c63d74ab98a0a03723d99092353e5a40ced11bc32ff70d35bf310784ec47a743f0414eb183b189ad07f8f932

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f484c319a478bc09d17740b86f8d377

    SHA1

    62506790e62f78ce2490fdd77e1f531888818f5e

    SHA256

    94fb53bb19ba2d0e84320c95e007924f9e2f7dc6e8630a944d8ee0feb74b87d4

    SHA512

    92c018cee17c910441e10cc3e496b01366dfa33f3739ccdf2888e5f338c0c8e5e7f09727bea2089792529269cc169fa1c8927323bc196536feeea74c9096f8f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63ffec45d885ef910a68fd332adc7e96

    SHA1

    37c2b4b201ea6791c3b1be15991b69705b85d0ea

    SHA256

    fb8101e2704d1f650fd6a4a53370049997fa63ecacf6929a1f7fcf65cdb4ac0a

    SHA512

    2ed418bceaf2eb80f237c3aef7ec454e0fb912d81ab7b0dfcba65225eb20526ebf641bd5d639a163d28f26502a5989bf7c750356610bd2ed5972a286304365e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b726b86f0aec71a7ada3a1e3377850e9

    SHA1

    a39db7fc9ffe13453916908fb25dcede12c1fc8b

    SHA256

    17d402c42d9a851400493d9d5beac720b9b44b68620602c4461066ea865bec11

    SHA512

    a0dc9acfc72ab0482dabf64025255de7092f36608d2fcffe125f1d4989dd64c739ec63b6c5108851b66121f22c68bbc4dd6ed0fca4258e11eec0eabe148b9ce7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65ede77c47988e03868b0af4d4d57809

    SHA1

    00f814062e82689b08555072fa34a65ff14f995d

    SHA256

    8e620417451dd3995e8af2bf1c4dc4a9078241d7299c5bbf299f1ca87bd8deab

    SHA512

    74ffa9371233235d6d14c7f81bb9d9f47409432488b9eeb0981e46a3d5411defc68c9612cffab30d336e513f02ff8d559619840e699a87b97249183280772fca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6351dda5b0862e95d270be1facafb0c

    SHA1

    8e65afa4983536931eeb197c4ab3f95ec07a6897

    SHA256

    63bf5a3753747bc5b2dcb1117af4d653df00a30fd79a43b5e984043b7af2a027

    SHA512

    23f4d7bca02787e0442aa62f7e062c88d008aae7d486f6f38a623ca01478e4111d4eb7fecf02b544aa032cd844d405bb3f1f70d96072a5dbbdf3b00375323837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5864bbf661284064b99cc522a91dd60a

    SHA1

    d5f9f7aeba864f2ae362bf2234b69261b2dd3f9d

    SHA256

    8ee952238d3a8c666cf5d532040397dbcc3a97292d25b16c5c5fc50ed9acfaf0

    SHA512

    56a2ca1d330433c277356c631aab3b444ddbb57ab0da84a7a266a86c33b820376a2e66a67a7fec356e4a4eb450018286cdad01fe4ba5642510061027f1eb1a07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2772d78461edaa60578299f284cdc710

    SHA1

    aff42ae080905ef8e3277b0748d3e19da0535f72

    SHA256

    1e283d8087eaf5b207752c7895dd1cc75c72c9e8ec5069deeb5b008600a893dc

    SHA512

    ac61c4bc563d856302d02ca707eba64f417f627fcf4d2a53a55213206a7cc5c88f2f83e6397e1364bb0e363b523509caa310a903bdd7d9cd5228d2dc1136ae2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db0692a039a1e84447f65f83b9a7360b

    SHA1

    fccf2ff2030d7459c5820a5fb763e6387e6f1cbd

    SHA256

    47245f0e143f1e6721b5fb78ac6530e62b92862347f711cd97b250988b469c96

    SHA512

    fbd262c1e8aa0087567bb784bf772d1cf9c111fdab562ba113d9f50fb863049a0ebd8a0071417ece7a5f470d4df7163fb3c7a671e5f0848b79d90ff3789312ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c712e74fccb8d10e47dacecf8fb2fb4d

    SHA1

    b032d846b66c08163d760d123f1b99e50dcc9658

    SHA256

    023871f70a5ce9622170c4dd36e6f53720fc7c1c354f1ed9a0e139d31b3763dc

    SHA512

    306c9511d563af4c13d27c2cc195a99cbe1e76937f7310e700ff338433d2eda41f84f5efea9d159c1ab341ed228eaa861ae38025ade1f397d052c323224245ba

  • C:\Users\Admin\AppData\Local\Temp\CabED20.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarEE0D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27