Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    GreaterThanOr_sub.xml

  • Size

    529B

  • MD5

    183ab03927d5d94c808d6ab0e8bd5d72

  • SHA1

    94695a1ad1d71e412778c65f610834a2e87d3a64

  • SHA256

    b3c2197cf9ab0a352d9ff3cf5657f06a6e26ad815e7a783bea4e1e17ba2babf0

  • SHA512

    66cd9167775c9879ce3c5f0cc63fdab37d5f059a8b2c4b42de1725e5356b3aa682b7845b2d06f4d1e573173591f830d24c41095fce80f2da8d52d924ac495741

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GreaterThanOr_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97cadd9b8353f66fa582e17929c9b0bc

    SHA1

    94944a4886032c2e4b57690dfc849f46415ffeb0

    SHA256

    99af438e3bcea65169d385fc90d01cc8b3a18e7b13a062e83fd95904a75b57b3

    SHA512

    939a02d520a7774ca3b0f9cd3b7ec66149b8ba71197688c6558f7cb171f8af4c1b77400dc870c4d86031bfbce4a514b41b16138b2a9828b8331cbc8f088ab74a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6b8e7064efb32b52ef85681a1a863d7

    SHA1

    cfad457ee9cdc22e42a79e62243189918a2e77c1

    SHA256

    c6f38ebb14dd544cebe0566112aaa0dd55d8c7717ec08624d2c85b4e1b8c4299

    SHA512

    5487b93421dd66c58f36134fbf07113bd82274c041438ffb5e1a7e8ff71165b2186c918c2b7b8ccb1983436893e7c01db19c2345c4813e04f5ab13491380e950

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca633856e8a0bbd2e53d9023775d6765

    SHA1

    24b93f214cf757a9a0b4d5691d3bba5d77441078

    SHA256

    9ac363adf72c645974267582957c8545f0fd1f651ee033efd159a682ed2ba9be

    SHA512

    8cfda6e8ab6cf2662d639d900a0654c06faab4adcba10bcb001ed3e9ea90610f0dd3f3b0a6bd3a746e7edb56f63ddc7db566220329e46c792697efd7435f05b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d90488b1948777d68444442fb540645d

    SHA1

    defbb15780dcf12adb4be5649b531581e1abc7a9

    SHA256

    d8661e5181e1d6441d317727c7b8ecd19cb507919a9cdd46652464150383ec48

    SHA512

    93e795f83200c5bcb264bcbbd326248a1f61b54cc6c21a6df84a13be1ef71ea3fed054dcab5b52ba09292de473db8f8f4f40f3e7eba6ec227da18aae6aead910

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f302c359a4b5df52a86d6519f7471ad8

    SHA1

    ea7029820e3c4be68b645bdbbc7126a82cf575d0

    SHA256

    393067e07c66752a43d24c94fb7a3451dc90bc82f290295151b8c240c2b16e30

    SHA512

    18b0aaed9a0954fd3166c23a57ff156225cff2f665d2707f684e4ce6862d5183aa1a1c2393d98fd5c55e900b651a76daab003e3694222643fb1c11779de3f5f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7c9ed7cbaf4e851c6050c8b05d0eff9

    SHA1

    720b1ddf4a9acfddd580cd5e00c03a310ba12d5d

    SHA256

    c994e28459b45c08b1d05ffa568e38a6f981885d985ea6563d405e006bf93bac

    SHA512

    e39b3906233b822eeb49af08dc25ce6e92fb7d2d92100553217f9f464557866a040d46e88bb10e5dcb0f02633bb61363cd03bfe6a39a405a258d9ea3a7d1fa9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02af2e6401232318b3df9f4f118fed40

    SHA1

    6bebd0e3867c4f6a4681aaa546a8de491f4930e4

    SHA256

    7534ee754821fe45ece0e3e2c1d180e6f656ceda2b1e98d030e4d9ba297df251

    SHA512

    0adda00736c0e5a63e75a31ee1852da1c639ec94e4dbcca4408d4b1cd38d7d27b9dd2d272a74ee58c77e91ee2c87f33fd48003b53bdcd9a2b125573c32e99f46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52cb2a99a110db94028637d84b683491

    SHA1

    6ba0383f4e15946ee3b8566de5d33fc8c023c37c

    SHA256

    3048c806464324e848a6d4b8e72ccc6af97a7f46e6775bdefc2544307bb91087

    SHA512

    e52b5774908d91c6336f215d3027d5129055c4e23eff5c45391c55e0968f5c82ab9a7c6c7065494e499fba7792e98cb291d365f025e09e781f08fc01bd528300

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82a28f67208bdabbdd46893bb3fc2ec3

    SHA1

    1cbf9e8533dfe32231835c6a2b0bedd7b7908670

    SHA256

    5769cce99228540591f35488d1dabd8329172bc15884a37fe066fd16d556f04b

    SHA512

    7573db00293b4de63e6b3f8e9b298955a8313e72a947cd2a19c5c8ec6432364497f3e47b2606fc13b2c0ac9ba9dac3524e3172b2b8ab52e298abeac85e2925ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e79413da744ab42e7a9a17edaca9394

    SHA1

    777d3c586202c73dab6d536c3598788ad7a858b4

    SHA256

    647ce172929d03c30783169eebc06c27fd16850653555b99d59c0ebd7d15346c

    SHA512

    46af17fc2efda05fbdec8af65f0675b759b0cb187a36717344c4a80899a62633f2a1dac031f21dfd367c5d0f8dfe2f0250b4df24ae3c5b9c164dc6999e21e723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b5ed354781b2e045bcc80a670533175

    SHA1

    517e7eb48ab0dac3938c0af20735ddce5be0577d

    SHA256

    0b746f89386af213a3b1b22718df10817af818d334f99ede01783c8ddb9aa383

    SHA512

    fd099b5de58bd0aaa3773cfd26fc2f864f0a53803d2ef21c387aea70e2550fbcf19e4244758c624f2c0feb27c0d4228d48ddc374fbbe03f20f010470b20a6743

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d70b7791e76d39a8ea85c183f44256c0

    SHA1

    2e1b860dc9c1c5eea2e05d91cb7015d90d7ef294

    SHA256

    f3d495dad16ae8e1e882514b0b3dbd35336bdbff0c48713530547705558c3c66

    SHA512

    e49ad47c3432acbaaf1deb78d4f7968ee50eb18fdaff77fbbcafdc3c39283e19d32cc47227701302929f0c4acb8c978af7ff87f135e18b25a857df12f5a62574

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07d3bc7f825e1ddf9d25a7fdc549bb7e

    SHA1

    f9c7d698932f7378938b9d5079c7b0508659103f

    SHA256

    e5b465512c6187efc1b21073573b7d983de59ad9b20612504efa002146b14b08

    SHA512

    562c24bb701071262f2b88d2d15a6baf8224316eb158f6d19f7382e57294bd77011d319c9e8263b7b83c2e6d40e00066ecff0f4791d25eca0a66e0bc3c7e5e91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db4e315f63ec814980d9788c16b06927

    SHA1

    04ffc81fe1cba44191ca0024d5966dc5e691ec7e

    SHA256

    fa897372753a4cc5a37c8b6a8ea67d5f688b2f26845fc335ee0320c491d35619

    SHA512

    023f006da0b03639ea5e4cc9ea246542c51bbe429e70e5cc3a04aa3149c6a93c931b3c2d08d30c8037bc2cab0527e604823b978a65a603f75562605c0e7b6ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11bd4d7fc119516fed579dddb4085c30

    SHA1

    51d9fe7dfa0f5204af213d092a5e421f9ac5397d

    SHA256

    0e1caf0dea6eed55a013ddd2dc9c8d177701913dd0cc11534ebcd544344a6a0e

    SHA512

    2abe86ff1c932900fb4cfb8e3e7f973b7d446e8ee392974dc5dcf2dcfd5f08005a1bc51f223918006cd7831df6f9b253c734df64cee56bcf151df108d60d1085

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    597331b04e58c1282625059ac8abf473

    SHA1

    16363788e3be742cfa41fb5cc457215168af34b9

    SHA256

    2f8e1784e956885ccf21bd9211e5062e70441380221dcc7aa942ae91f77cd66b

    SHA512

    29a893c2e4d52b399b84910e5343a6b4a3790222fa060ae44f352ae54d6c0eb31af7b71b473766a009a6c44ca636e1265d49d9bcd5a3aa85ffe8ecaf0eee6534

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9510107f8b565d482e388d1ca6e1d701

    SHA1

    48fbefc428225cf26c14e464a0061c5f02c8022f

    SHA256

    15dc29c280ec9a70481c7ccb3c8007a7f4cf3332c6f1c3e7bc070111635c73c1

    SHA512

    9964a274593caa388164812d9931a493b6b5f83897489ca94e92a980799679fa1ec39bf243b92e939ec3de77551d0b204087c73b89e25a00c7c1d912d7b5a99c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d63c85a92da14f2b05d7c23afb9c1ad3

    SHA1

    aa591460265a32a124086bb4eb0b8c738afaf3a6

    SHA256

    7ca2ca056ffe72cd41da906f4011d541d890f552d4a21b5c492f9c2f7ef84eef

    SHA512

    f75cf99a00d7b0c33bc2682dfa9db7d174b11e5bef7a27c687cb2801ffcf8c29bd31430e3de6c4812d7370dd53428414b60352ba0b8dcd52667a64b11f742de3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ccb5d85a4f4a3d2953ee6f03119250d

    SHA1

    e9efbc0a567f338c31d717647b8b75b009f005e9

    SHA256

    64e252949777e0d2c100768d438773d624be47e671f3cbe63005442259a8a08f

    SHA512

    b87d879ce65c3e7a6fb2715c66c9255aeed071ad41d54ee2e37b14d8e6adfd15263fc26a2ac47c5e778b3e9b961f257408706bc1cf9afa10bdba1c7ccd31c713

  • C:\Users\Admin\AppData\Local\Temp\CabAA65.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarACBB.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27