Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 22:11

General

  • Target

    boost_01_effect.xml

  • Size

    2KB

  • MD5

    c638bc6f61497a4a2c32f62af4bd60fe

  • SHA1

    3618e84825c6b5fa6d0d63d3e8dacca90c490fff

  • SHA256

    d3d9dcc6da6b954049e8834661f6d2a1d3f7256928991fe08f49c5daa62a8637

  • SHA512

    814470fac0d683a3019f004a4e0d98420c0a72dcd51dbddefbf496b7a90e25b6e8663279240ef0c2e17f141571ee923271a0e1b2ac3ca1bce2fdb46398720dd8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\boost_01_effect.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b39e37a7f7785764cc8957ccc5907754

    SHA1

    9cfc728ad97dbb84a14cc636e502657fc3cba2e6

    SHA256

    47e244d21d05eabd7c9955b521e40224bbd15571e7513ab89c501d63590d8944

    SHA512

    95327c3861c1a19e668ff23e1e3d6ad935f66b0eee8886c555342cca66d137b1233cf6076600729b96bb0cf2a66b3b338c6d6b0680685e5c76ea13e67403e099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    547d4147acedc027797bec04e79eccd8

    SHA1

    7a9dfd69f7876b8cbbea3989e365b5aa6738081b

    SHA256

    4dfad3287edf8edf267e8ac7878f7d2624d1a44edd3d763af1140066ab2bfe99

    SHA512

    bcbda725e450f0de78f6def03d96edf2b28bf1dfdefeb1fd17fede5d418f0277a0e16e2ad123b401f29fa6859e4f736c705760bc2590078d80cccb598ea1a8d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21b27493ade4238e414c5ef8cd169215

    SHA1

    e3a20683e5dc68383fa53a510616fb9dfc8600b6

    SHA256

    e28385d8f79806610aa4e0a2b7a67eac053cf3d94d597810a1696dcc1a0b9826

    SHA512

    701c289850ec5db1749aeff14a47bad2ec71da48ceb8f1d8f3251e362d5aa1d80428823bc70a54cf1d3221f143aec4c8d5e2567f896e5d561a2b8a657fdcb1a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8b08d0efe20fdd758885f74fe99426c

    SHA1

    f38b14fe89ceb4945a33c1dc6a2b5f0f4cc5f39d

    SHA256

    541ee4cf25c6b690a297de4c0a1ee4229be267384a8c98bb8bc5dc84ab498043

    SHA512

    a560fd734bffad8bb478d945a9896504a090568cd8a7f2d46bb97339cc474cd4a2485b2d8ab5eb5b2226cb44cbffb08b17c50a4efb56dbfd87a90583e4e86c26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    868c2e3ef79a997c76bd9eb1edfb0f6d

    SHA1

    5efd6a6b222307865daa913fc7e00dde4f153927

    SHA256

    e21687b6c14ff3ae51c13ba24593def8efb3848e0ae7af9d5b2ed2f785f0cfa4

    SHA512

    4650f7310dae780f2619747e6759afc28f850452191891a26515cbc26ddd19cd648a07f258bd7139b5536fc3fa7b70f726a7c6a4be3f312f0a04f5dc909e6708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe69f7be1d290d355f676df945218f82

    SHA1

    1f64f54ef9222f22d37bcbfce30234dd22a27ed3

    SHA256

    849f6a2cffc48d45cbc7491099f8c04b8cf64eafa86826dc36ed8f3fed654e61

    SHA512

    36026ae838e962e6cde7df7db42affcea87f38f0d075fa0f6353db481c7cce4166ce03381beec5a8fd20e669b18d3c2efd8a26f96970fd094956efd32e1865c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1af82350674cc295409fa60be50d136f

    SHA1

    e0b2dc40e63e2866f54508a4d49a66e4141a594e

    SHA256

    98e9cad963bada6757b9bde97fa76cbc83b04f4ab1213cac33069383a69ce60c

    SHA512

    66ff0ee6074b995f0ea95d09cbf85c36dfcbb9323893fa43244fa3e9e4ba7f42e436d976447728f44b3bc4529fa21702e6700370d45b60939fea389455c076d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb7513d4d914539a581926919d0fb874

    SHA1

    4c4582d432c6c922e21ede10e2f6018df4f57bb7

    SHA256

    3cccb74b2382ea6e27390eddff5d7604ea31bd91c277b1c9c3df801bd29e09e7

    SHA512

    2998a3afa80767cba09ea144eec946d37bd611a4031aa7c4672eeea0769cb5490eac6d66a7ba2ef5cd889526d40f54aa256d7ce49b950ba3c28e6d7e1e33f54c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6894375475b1847a1e4640ded5bc974

    SHA1

    e3e187e30cbce7cebf5209612f52fcdcbb13235f

    SHA256

    015f1ac01fe60f60f0a5a0dd9a3bc40d063630dd2de1354aac8b5dfef97eff13

    SHA512

    a8a56efec8f41868c81b15ce48c9344dab3c00de44e957040753e2720d9a676e0c4a9d007c370b411e23f9bf41cfc798437a6b8cb2d2429bf3def5ee52007a44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca4cf8fbe39d8037b7ab9f33191b6b12

    SHA1

    f569314b7421e2f39814f0346e0215d67b12c5d6

    SHA256

    03714a08e3eccb60cb5e397649ce32057624586c62a378ab0e895f36894704a0

    SHA512

    402afe41ca74d44f64e5272de9e6d43a8b2d44fa3acc4c0c9b82b8d7e03cdeb24fd974e6693fb2377c187d4051e08fe5c45e6d1fcc59202816a4f8d7969acdc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b0d34260868a8f65cff3bda33fdf26e

    SHA1

    ed16641187b4eefb3319a542fece48c6f230f014

    SHA256

    71b10f6d2b26ae1013228d669dca72a585c64b1ac7da91ed46cefab5379ef827

    SHA512

    d11ee57c4bbc418bde73368de7e9d2270ab611f179457fa7c4bb3ee1dab19d389cd0224037dd1838367613be9b063f5eb0d583bbc3c023f7362b6c446dc2a8db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79813de2c7bef79d6ece17bcc2506c39

    SHA1

    f6702f1b37bc6411dfb66c2ae1909ad37f8b0a81

    SHA256

    d887b1a80cc81e89e99fc34990ef0fc27f33e9eb65fa4a3b4a81f4022c43f74e

    SHA512

    cd414479ba31820a4a11d3be2a9db2ffc1c0263572a249715715f65a2acae3a32582cbc64a98519f84d3490972467bcb6356023be3a008fb34de86b2fd664ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f38526ed36f122885e05e32a627c5fd

    SHA1

    0ec6df3c22d19c22e470675f4868f2756c1d7b49

    SHA256

    b28fa75be7574d030168846849ea739c2fd4c8749662df93249db064047a948c

    SHA512

    0229ff5ab32ec95cb9a647b5cc37d745749468a0ac305f99158f89def9d7ecbfc43e869c7c4569e77e7b2eac11a55ee98b604602270a67f1894592b83960bad0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ea5cfa01a932f5bbdb868b4b77ba1f5

    SHA1

    eb24bef928501126f47c6e80685d9708a5782ea1

    SHA256

    36c10f5b2aed31c8d17a7320f99f013edb050a3547bd370ec60ebc6292604a67

    SHA512

    03a22a13981f90390e0a7b973cd0ede73ae2781f1bc125fc7c0fb5a1f025267fcfc61018b36551aba1993a85e1015840160bc6667967d506034506c139abc4d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    deba8cbf704b5b3ff8c15e55996da679

    SHA1

    8817dbf119e6e3add30c5dc9453aec280f5ad7d9

    SHA256

    4e8c44a57235c4fa0d4a299508641979e97331db27d1076200029e355c4ff32d

    SHA512

    6fd8c340c092a1621c6a04e88d36e0047f6e5ef100c12455c0ba9bad35a10811f3f15cb6e4de77e5f7510fc0965795eca691d6c3f16176155447a07ebfa7dac5

  • C:\Users\Admin\AppData\Local\Temp\Cab980C.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar989D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27