Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 22:05

General

  • Target

    FAB2.xml

  • Size

    1KB

  • MD5

    a5024fe1b8259adff02d901bf33dbcf4

  • SHA1

    bc45a9613897ba56d1784045fc7bd8f575602348

  • SHA256

    61093297596e0335d5f4ed34807ad214dbdbe1c15d08cb51c7777707dc66f5b2

  • SHA512

    ea60da36d50118171c78d99dfdb955b4925c13221b45e755c2542bf9e0a60c355fb8e0f6c0a7189ea74c2d1630cb3c0532cec390cc62ca0254dc5e70ecbf227a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FAB2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be1a487b357943e34ecaa10e8e25147b

    SHA1

    c92306d065953d69e2d1b0b712ab6866ba8b3b24

    SHA256

    6d963df35be563f7f1f0c54e456a4e3fa10f233d1166ad3084ce7b519d3cd012

    SHA512

    bdfe53006013295e6d9096c1bbf8e39b118e34215e17f24697ff93c31c67dee76d859ffd02a1e36856f64f24951faf78fb93ca71d7d535bd80e135dfec238232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d0df539a5428a5397028d9ef87bef9b

    SHA1

    1e9ed35252d32b6540499a4d23ff0235ebef70dc

    SHA256

    4a7f1fe6db58d4e42ab98b1e2ba1efa57da5c73d80e06d5f1b7865fcc62a6ab3

    SHA512

    0f35caab8747252399ae7bc84a4f48876f003589ddc4d02cb18ee5e88a62cde87122f5e5094f4ab9aed0e2ed7f13a46a0c4180b9ef6c16e21875de48508f64b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7c628d1d41ab1c91645e222010c7ad7

    SHA1

    859dc4b96914a5074d9725f0d0fc457d3813476b

    SHA256

    7f9e0fed698739215672addaae3ef82140142ebde73b830ed401f5717c9c9039

    SHA512

    ac7f97552a17321aa3bdc370af1b0bf647be9d4f281e653401ae6ed2cebdf1517b5331bd413527cdfabab73643f0ad71a98460329594deaa19e097e596a4948e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33b8f11b1dd87bd1d4778036a23b651f

    SHA1

    172e06654fcbe2b83e7e1edda012c889ab0eccc4

    SHA256

    bf6c33758dfa83fb609d86c704711a09ab068b3ceba435861b8e10368c63b499

    SHA512

    473d419a18188e3d9c692444c8aff4c960b9a31c38080b015542a52d3965a60a93ee4da4e8c0dfcff41a9aaaaceceb0efb9fa0aa604334853a70216f40cdf0af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bfeb75d930baae0d6a6eb2d9cc3027f

    SHA1

    b446efed5f3eccb53c6a753ab4e8995b3abc917e

    SHA256

    7922378262945561cf22f7da425cf0e3c90e7eb6ded7847b07f8bee6895087cb

    SHA512

    331e687a30c1fdde6187dfa788380d0b7ee96fe3ab77487ceb4eb46a21fcbee369d020b270fe972ecff9bc5d534efa2f42afd16b1d26bca754f6e6c6306f1b90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5893e259af3b9d05c55420459195dbf7

    SHA1

    ce04696ddb52ac58f538322548af21668ed54f52

    SHA256

    27494cb39309f2b90d9ddd1d991b0dc247f3fc1c70843b0d0b9c250df7acbc54

    SHA512

    4ffdc58063377f9b832f300815a5d300b21991467753ad70992b06c4ea9f95de35f150cce2b469ea5369aa6f385421b95b726335448af6d4b6eff90788a3a7eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89d170dc23d9efdf1c4c646920cd335c

    SHA1

    87fe1d7e9a986eb6e9083fa0a76782110c2ed65d

    SHA256

    a87e13849d51213e86fed08fad68456c26991028dc9ffbe96314464a504dfde8

    SHA512

    a555422bc19887c3ffd67e3b1198c9a0c4a2e77bb825604a5ff646bc9268b4181db98c2e75d5a50e81374f6a71180c8d5f8c03b0ae102ee5f798f2505ce73094

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1dd2f2f23bc9d499d5ec7a28ab364acc

    SHA1

    f37009089249ee498d5d885b7a193081b3723675

    SHA256

    4044af4e53ba3c1d02187ca48f55f60c27947abed0c9a3e97d27ee81e7fd3d42

    SHA512

    373de9854be1209d52c46c3e6e1609a812a644822bb363c6d7bf351280172750e31a022348969cd8cbb03c760ef1b86db574512c92f653bfc2278e3371b69b26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a93e2dab6db980c43fc61d1fbf85047e

    SHA1

    0564ae0ecd6d27c27ec4055d5dc2fe2a8c2c27e6

    SHA256

    783e27d1ead59dfc3b94e3ea7ae3580857d5ed96fed034e5db5dcbd40d4c8358

    SHA512

    e6a2725dcee0df4114edbf8876dab34b177d3ca6c25eaedb2d94765b5cef919f6abbcb49c34788d02b6472c09909f3b2d97eb0db8cd57453e10a99e58f528ee4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7583e4f7029c9691471b16f9e324dd3a

    SHA1

    298484ba9a5f7cd7f38ba352a382ae9b2112cbb4

    SHA256

    28941e4c182a9ea5008e0019ec99e132976f2df1b1a0990f8d7156255a1445a1

    SHA512

    eccd7ec6c83bace02d7f5f676dfbdea8204d3cc2e196172f0e14df52e63703a1565a7856cebde014274ce2aa63719e9ab553c50f0445b4e79399c76558c5d036

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9731f9ec6a6c6dac8f17b807c599968

    SHA1

    ba4d0b0c1de24475eb10b0a9e6f93ee95573af81

    SHA256

    a3b18abaca39d4f2f81177be9acdc6ca319cca0e85958ac8a2ac9ebbb5303239

    SHA512

    39acb91f2c89737e47eca43c75588ed42445b8ea0d9104787042f42ee00b514914e4a89941ccddecf83726ed4113e671a752da6bb7140bd1a2c0436cec9b6f12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0932b3675141d15fbc9f347cc756d05

    SHA1

    9c73846628572caf928d79e2be1ee2bc63f2c4bc

    SHA256

    a1f4b5f59f5a0c04b91c105c436d2859013b455def37e3bd2972905f9eeb9fbc

    SHA512

    d6dffafd286eadefdb5243a8b39637c3330aaddb08e46247b25e865d69744bf2b71a14c3ee3204fc3c0ca803ed7d7b6c9e83aa9ba03f09610db0f10e9062b6ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    351ba01d90f391594002ff316365c0d4

    SHA1

    27c2320f41a8f19200b2154df2a3c4be84c7795a

    SHA256

    b9820c4a3b414fed4eb7256df04531e6dde057cadeee38c279ddc70e77435a2c

    SHA512

    76b5552e28631ac841a328778997b3418369487f8806cdf8c16eddb70511059510771642843fd40ca1110f5d781e37442e7d318fe0e28531a85d8035b0c6f8b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7cdcdbf6232f70ff288da48a99ec1ec

    SHA1

    5f90aeebe64ed71fe81cfa640c9ab3dde95dac74

    SHA256

    9b6d54cdc6d9d336cd2ca80c8987dd3817107e856c648e9db64e3d0d6028c43c

    SHA512

    a7711430dedaa519325f1edb72e2fa4bce43b4e727d8e4accd101c8b3f4e2e0b03b1693aeca1b6ad9d7e7a0545b1ac141a48b3b538343ff2657a4f8c8811fafd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e692a7d7ddfe8b43aefaf5a163912fc2

    SHA1

    80df581227b50f392a1fd59e020fc82f5130d193

    SHA256

    b656ea0a5be7ef833160381523757e72ca234a229ebcc1758ebed7137453aa25

    SHA512

    6e3c8483743598d589ec5611db5f92072852debcf2fe97ac080d78016e3d824030578514a9634a3aebcea28697c4182ddf161cdd3b3205d05349ea84a719652c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58483f1759bddb012e58023e2cefd894

    SHA1

    b9fb6e95ccaecf994cafa82300b21601d7f6fcba

    SHA256

    a7d8d97a04251c7545e49071b9fad78866cab809c129c240d6f0b4f19a918f7a

    SHA512

    2c4a2a702425847a636139f5562b655fb56c454183527b7dab54c4ea895ef801cffd162411f6caa4d0d3228d0c923a279d5b5b2e3d7958b87a25f892bf730b67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb5de84a640b835c240d79dbff17c450

    SHA1

    b396e3a977cdf6c36b5809fe6ca50eaa31cdb55e

    SHA256

    fd97bef9ee2e34df423bee213813c5369f14877e7a301d0061d8ae60877bb02b

    SHA512

    4f68d16886a2a261b12ff097632efc1a617b3fbe61ae24bbdb4c88dba56697217b6fd941d0898f2b590ae5dc0a54df255273b166a6bccc0c3bc7425d259c4cb9

  • C:\Users\Admin\AppData\Local\Temp\Cab8D62.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8E61.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27