Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    LessThanOr_sub.xml

  • Size

    532B

  • MD5

    ffc78a6304742e04f2879c4a11f3d369

  • SHA1

    d1547c090e070bcc7c19666ad9a0112316e43137

  • SHA256

    69ffca2fd95c8119d9c0cdab62bccf24f7799e03e4d84ffe7736e10d0611b808

  • SHA512

    18d196273b7923cb09c211d460f1aec6669ddd5cc8eabd3d747579ad5e540bd19cd15e26da6cf726ad4539ff5629f6dc3c2e84bb104d7d0df3aaa7579fed4dcd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\LessThanOr_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53ccae5d28e35fb872a55a7b76b1806a

    SHA1

    8dcf8ae138b00c5bf7c34c05fcf15c0a5ace559f

    SHA256

    afa14b53db86be841459c78f983a83e0ff4410eafe32f9d6d3ddabddec7356b0

    SHA512

    ffd3014469be0a4e2cb5c74dd1b496fe71b30b37db8d1f5d111f3f521bbf25866f27618d7d098253ab7b448e7af30f0ad3c2c8e38d538c5f721552d6983751e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb5361a7ccf13494066e6767156ab508

    SHA1

    3e22e88cb744a1cffaf83e63154c833d0c721c80

    SHA256

    7b63d0babe7b8d9784fc88780d9962ef588b297f6368385a3ea15b76f4ed3e97

    SHA512

    c71156748589c341fc82800d0ecd520f3cc08622486125260b0e7e8d3ffcc5479c073dba8559d7a13cb0863067aa18528e3ad1f7a6b19d08a779a01735f5efe7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fdef2ec33c59627005f962e5cb12bb9

    SHA1

    e2912f74b970c476915dc5b8d31354c3a9951a10

    SHA256

    ef2cadcf2893061d24b522db354b4148ae494c3eebbfac822cfb809dc052c004

    SHA512

    85b6b40df8b66c1bf0f089062648769e307dc737fb00af5879ecb1a4bcae78f3a6f9eb7dc179621f85414081c1f7f5c9d2650db3a21b4d17bc31cdf0ed0777ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aeb837437f33fe2cb0b12d0f7bd8ec95

    SHA1

    f956cefd541d1693a28160d88d2319c62d2ae4b9

    SHA256

    a9e93a0da561467897f69069118eb589932ff7cf905fb55cb5898587f1ae1176

    SHA512

    17a395ab46a37861e9a4548bc40a649c76adb87ee883f5a634e095937fdcfea4877c60164c3adf98a884ef09bb6171ed6a0944a423eb7bba13d4c710d9baa1ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c594a45be9ee20c8e494e1b4079fc36

    SHA1

    2b3aec625584f3728621834019c47bd4514ccd0f

    SHA256

    3f73a2331b760dfebde46ea11783ac167d2687ef316694875f18857c0c1f977d

    SHA512

    8699f0c3b7cd3e7cb209d8da7ffc10a5ee1e4a55aeb25c7e85c559107008a955af02754d0f23c196e4ebef001e98fb3739b544f017085dcf4a650663062a3510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd13c49249ddaecb5fe0922dc95501ce

    SHA1

    5a43278768d1cee85599da26a12e7e3588bc3e71

    SHA256

    f348e9b454b8303db557d1ad30e03583d2c41c9446e8e1696c2d084750f5d385

    SHA512

    528f52655a6c82f5fb6bda188749a1ff14e5d795be90c7be98f69a7bd1cd5322ee347fd7a74fa6fc6afe0a293382047f707273e16db15073f2af6fc715bcd621

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3db010002d5fc9bb52fb6031a4913c41

    SHA1

    d4da8506ea8468cacb7f1ac00dd2a64595eb34f9

    SHA256

    1bc3128e2c7b37c23630ea2a03bec0a1478b8a5b93c726b2a58969707bcb27d6

    SHA512

    8fa27b243ca921050c8016a3ad7ef45eb88e8fcd362f631d8b3c17c9f6a9c46ec79ead55648346f4645f29c7caf3a45043d6fe71fa73b908bb9a1c95b99673ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25ec05e3bf03eb8de9220e933bda46ef

    SHA1

    b63d39f8763bf8abf133fe1be25071f94e66b7e2

    SHA256

    110b2adf76fb3710451330c9b2d9104283111f1ceb72e8609e8a0de703f4b97c

    SHA512

    abd4efa8470f4129aee791e56a1515af61446e8644f6c02ecc9bcd429b5c7032b094aa304a87cc64d63197732c35209f24865d67155ec878dfbc19840442ee52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b0d73727c470d3d0576ab897a5ff5f8

    SHA1

    678998a31c21908b91e861218c6498437ad4dc28

    SHA256

    dc124a1a84f6349884d18bdf0b0c276a348291ccf092720383b7c4200e868d41

    SHA512

    3a12c132dc6db5546878e2132d4b1b7901cd483a384435b30927a84be64adc000bae23c1f08906b8371e06ca05feae669d4a2f631591a1a30ef8b0aa0eb95737

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6abb7921cc537b3d93621299da9e902

    SHA1

    63ad29a677f081681b185d86ef84388f31c55d7e

    SHA256

    f745ab8e0166339cb6a404455f54b7a00b18fa861b667b838122fc9b1c313228

    SHA512

    12f79fbb8497bb7cc49946c7cfe83ec689ec6867489bcb397337dd1bb5ed4c4ae0b59e0bb8f6b0e058dbd199973df1629fb824e8547b59dd29b8c2cd5b6b6a72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84ae1b83f0b19f91fc76b9964e91fc0b

    SHA1

    6f274427e3b2a900633237645f203ee707aa1473

    SHA256

    a22a9875efa9d377b78ed1c79651f90cfe114aeb1c14820d5f27eb206e5fb908

    SHA512

    47d747242ec15f70255bc3f3458676c3a180e512dc2a4e1b941072547243cbd5504ec7cf683aeaccb4f6a6b9818b780a8fbca2a218f4b76796ab87570dd52a34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d53742c3c4c84cf04b20963d6765871

    SHA1

    deed87193a507de64b2812b7591f0531f039a094

    SHA256

    00ea9e5579ef6e6732ec4660637e8344fe1cc2ef5ab7c5c7c91b584bb4622da6

    SHA512

    b0693313f443eb055aa8fb838cf605656778420619a6c03ee6e612b8cbcede2f2194daa95c02ea0163cbd4f619ac630d3cd2d0a2b04f9129ddd6b17adcdb9674

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5face708653ff2ebcdbbf772fadb87cd

    SHA1

    af1d60eedada4d1ac09d8e990a80c0f2fc8d5927

    SHA256

    843d3650e374bdd2b525bc14ea7cf7432aa2cebe10dfbbfb1d0fe8e2e03c1daa

    SHA512

    6b6cefb2393cc049ed8a0d67b7f8dae886c92e7c91376bf57048aab49b478bd538aae1b636af83fabfb3e2132736ad73d741cda38236921a2f5475acb48701d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dc85dac5f040d23ae0ef7ae7b02ad1f

    SHA1

    1f461400264fbdafd3175a602f7f2c6a5a360975

    SHA256

    5dce60a71c49ce80b2135517e86fbdf1cc0cbe60a1f6be3bd4db14b60a8b6ae3

    SHA512

    adf8c6195ee05b4e51ec30402c208bff6de522e2ae09f1c39d77da9ea8b8ed20cd0931b4568bdcbf86fbf51e17d1f61e58c190bd1ff93839b2879d046a046614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09231132884f59dab789a83dcddd6ce2

    SHA1

    d009ef27c4a3216984ff983f86ae28f3c5370db2

    SHA256

    39fb3859c148e138b56b53f1ccda154501a120db00ad9b069b5e8595cdc07f1f

    SHA512

    0ddaecba0f3dab03843343d1b4431c66fe71795188aca6904f51e7d39fd3fe84af9b0e23b2d2b0caf03a0f3bdc58eb81f21790c78c126363ee12eaffc11300ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5ee9222ee4313da5ee76421d9ba7640

    SHA1

    d6de8b7f99394a12b47c5fab029201b079c3cc33

    SHA256

    8741d12ae49b4e4b3cd6ab6dec330c1f9159aad2a1ec63fe84b2e18626cbd941

    SHA512

    c187f12a13bcccae727996e8546fc1712141dba680b6874cefd9651bc964f6ba8f685c69a6556dbca552a75e8b10fa24bc9fde623372c90aaad71f7df29e0273

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1472c7b9de71dbbf31c77040a676479e

    SHA1

    746c62e7477bea007adec65f693d9eb69563053c

    SHA256

    84c5fc8bd547a6243274394c83c827e2aebff938f2210a7cb47e3ec43c7c01a6

    SHA512

    59ce667018e8b6202689e2679a1fdc8e99b33c215986a19a8e054984a2b598a276b52af8cfb9424149f8892025207a631cfb3b2ce56157bec046deffa163d97a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1cf08567621a98a525adf8a84b24fe8

    SHA1

    e229484ff7f80459595e90051924285f602f1831

    SHA256

    6dd15ac98a60ff11a82464e287dca9d8119149826e021f249c19e9ba04374ee1

    SHA512

    4248254084dbbefeac9763cc4c79913078b0436c2e46873efeb6f00b59f17e4dc09cb4890c816aaaa986c8a20de920895237435598dc9ad2528bffd5a4622408

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22a898cbae4f7e6500bd61527ac1f73e

    SHA1

    15f89e9d345145e26444c03945948cd0bd86f0d8

    SHA256

    798038943730184a039ded787df0b0a3a30ce1e264f131a915b617e7662c8177

    SHA512

    03341e379dbd3be8ad95dc90cae7fc54134a71ebfa4e7299747ed94a94695a149e97a6e5b44847fd59cacbd3b883a56e4d4fc14eff94fc893f836f4944beb32b

  • C:\Users\Admin\AppData\Local\Temp\Cab9EA3.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9FA1.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27