Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    Ln_sub.xml

  • Size

    906B

  • MD5

    50948f090a36b025ceeadb20cfedf70c

  • SHA1

    5d1222847e797a649d2a1115f09522004388cb5c

  • SHA256

    fe98593b9944c672753c1e1404bf2d8edba24474c189d4c229bbb94219259565

  • SHA512

    a6deec560f44944b6e2ce14254edb23f127fd413873e68f7ab3c238653ae7395ec44f96dab61ba75a2e8eb841693b10c86b7ba9829d97890140958edef5f8272

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Ln_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    476fcc3ab1172b86376fd84c7efdc5e8

    SHA1

    11dfdb8dd3989a90caa9f3021f19bae070fead0d

    SHA256

    8f1db23780759aa4f97ca8299b24e8d0823e942ba573e38e14caeef44c63e91d

    SHA512

    48d93b57155263f63bab640b056acfca676b4aa853dd29d84e934cc196eabf67fb2f9d75b816cdf2b37213f1e4509add0c00c0695eb3570ceb1deff52c0debf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59e3a56e32e66f502b1653a0f24efb8b

    SHA1

    d091445d970535603a4679a5fa7ca347029a022b

    SHA256

    33c5100ecc437e06017142f1b6b757e553c218e4af8260d8453c2ccb0cb99e34

    SHA512

    acee3e898dee6418c05447dae8135d799dd2935e31792ab3ef2fbae6fa30f9ce38024a867fee0648544b866203dd755ea5f9228d1acd2cea5762febb516ba5c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19accc6f2a953aa48ad82b5a1370a8da

    SHA1

    f54e94b4384d1849d966c2d5ad094c6237a68b66

    SHA256

    236c63cd83c4f1ac5856a1afaf6334afd3628d2b77bb4130690d25100cc9ba0f

    SHA512

    8f3e5a9716c0b801c071d026a34042f31c279332de0dbccebfaf63fa9d7e018dec4da49be7dcb5ce4d83fa5319b752dd7f88405816efec1d943620de3f097723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe879afac5430c80c75b293148a9c634

    SHA1

    5c95d45cf652599e6abbfc0e68299e56409a29eb

    SHA256

    88ff4d7844b477f81a5c241f8cf374de93fc0db1d1c93b8da666b19b1f31c87a

    SHA512

    4415f817a9652fd3d0b9ef3324d2ee8d28326a18c309f9c4be7f9004670836b9c942df1ccc76ef6f1e8ad0b0c5950db040bdb3beba25b68fbf21912dc49db830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0742949a34fd0bfcc5fe2fc8a5c55804

    SHA1

    c9844514499532dcee697bdfdbe3ffe8f7537956

    SHA256

    83c85d7c296c0dae21e03e03dcaa0279401b8c275a97d0e11d2b3b9413dc60b6

    SHA512

    745457188f82e973db311be219dabf5b26ddacff9b0c9bcaeb163c47c1f2f8d728e34e0e6c6c7331c7daf2d9831a2ab009307cf9704ca680f667bbdb03357cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2144be7eef5fd0a5b3acf3e6a5fa65ef

    SHA1

    bcfa381ad3b9e53ef741af869b12f387af416c93

    SHA256

    0766bd8e4777cfd0c0ba7e55bb29ffd936f56f465e937a9080ede36292ac89ba

    SHA512

    64a8e4b65bea1a8b72664e4c6baa0e28ef60b8f6d3db20f4c8316fd7b03279532b62ee0aa22e9dd52aeba9e81ff193548c9534ebf9991b935319ab551b6df5bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a13b7849b51f80c4bc4f90d7ef0674c2

    SHA1

    a6d2d19d769ca06b1530d7153cac64dc9024d1c9

    SHA256

    95bfa00324b4aa6615a7ca72d8f91023f5fc7b2c4f42ecca1ebc2261b9ba0213

    SHA512

    12f9e3a58374c0bd4dac3f105945c54c25801c28c27b4fc582048ddc6707ace9138a203dc0d7c1341c5d2ac6a07b9e85576dffe0ad9c0c8fb61a99a62570d634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    491923c5735724197aa72ee7f8968ec8

    SHA1

    6ca137fc954a682588c0a03750c8696e90c1b8f5

    SHA256

    dfc14feea6b902c1b3416b95110266a9fe332ae04eb0984c25f9fe406bda0f91

    SHA512

    69b84c451b113bd1fa3b0d9181bd96d8c6866ce10044faaae9ed79fb4b87169cd1614de4dd859bf6770eebf186729de3e7336c8b203fce924cc4ce6a7bb56824

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97ca734c840762128c0310ecdd4b8a1a

    SHA1

    f3bf499c13a60e94d0f5e3506a1440ffcd973522

    SHA256

    571da77e43f8173fa589a2efc078fa4aaa6d0cede9b701fabf08672a11190c8d

    SHA512

    af38d25d5f7c1c8971c06ca60db1f92036d756dd98b68c80422c64c5052aef30efd3fee8f660385d889d1faaa8ae43963c229b45f65767c2dd0ea96f5eb239d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5ca10a06177bbc0c7853fa90e35e0fa

    SHA1

    634d601174979988206e11c05c0e56c34ed95b56

    SHA256

    0cfeb8d7edc0f7e91dfcb438c3b9d123005c5109262b94c514abe77cd8fa2426

    SHA512

    55352691a18cc3438b2776a05f6902c7da6aee80e61d9dfb6e7b7b19ed35351b278219e9ed9c638b983831cf0476a518f5bcda7050502f92eb25324a230f30bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae4172eb727536f6d014ddad115e4c77

    SHA1

    85a7b881a47f16c0863220872a904485be6bda5a

    SHA256

    527c0e04ed4de43b3aa164acc844dcc31b044e19d715fb66bb628f73605c9677

    SHA512

    3abca481408d5965afdaa03e743d3e45650b620b780fe85abbe610662a5533c54a2d5628dfd7259e83437102e467fef9f47f5461436065f0cb4c0ad02914e723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbf07ac62fcc82699ab78fe7d2498b12

    SHA1

    1b3dd09bd08be26bf721013357cf21272ed24cdc

    SHA256

    6999fdece9b00a4927adb92d2f24fb7c2e0cd92f9b43b9d47e5be6c7a76000e1

    SHA512

    fc79b2cd4b1fb3f5706c7127ad68af62ab5fb1cc62b619d1ee5447da68b6ba66b77e1c57f060a61c287ca9c1723df6d6e8cf9f83cefdccfaf25693eccb070ad3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8310aa47b9ed364138fae0acb45aa8e2

    SHA1

    c4cec0aab7f3e790595fb26dcf69400880103815

    SHA256

    b89d2178d16af59bb10245ae0e207b515471a024438fc9f39c152e0e21cb3310

    SHA512

    21ddd80c7b836fbb1d8b399d67049239072e4651d226dc65dacfd764fb12271ef972d7399f51dbb2c232157a95b99cf0064bf9c3edc003c61cb4fc3d8902c09f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9599a44e67985b7e50052cc33ab51dc0

    SHA1

    fe12b179bd10d6e9839eb07c2725abadabc955ec

    SHA256

    cac2ecb6ac05034ae54ba914145c96d7697511539a97d6261ce7c83979743761

    SHA512

    b268439e455ea1b230da55962dbd5c4ba7bc20d991a0744b9f785dcbcada12b9ae704a993d5e5fd4366f2e9027a35506e95e0c2b100d1e465c05eaa3b43671ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f62bcf7cf410bdc92eaf7bd860b075e

    SHA1

    b1619c70256c35cd5268a1fbb9b0d7f30a9d6801

    SHA256

    71d34934e9e1e2bf0fef2f48b1dd8bd69108aa0fa45950035aefb5f6f3671123

    SHA512

    69364420a6d4c23d04869ff5007da1787f24b05f2932bbdd58e63f5b3a22080452d44ca1745e33a0cbf6a5ec80e8b0c570e95609e38d3830d2731f9b65d5c661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19444a524b61a6dfdfcdec887f3c3511

    SHA1

    d4e8124eb9ae65b1abea49fe8b60bd179dfe4f34

    SHA256

    6ac7c62194456a61a5a224393a4ca404f183880977a35a0ecba44b17879570be

    SHA512

    abf1a10701ea387e09b794929a9eafc361ec17bbf533d31e22727f0c91a7e697a44aad47fc67ba2c5a03d01bde1eab70df0876948bbc6eb4ec5d7360164bc650

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8046c8e88d0977c6cb2b346c5f8e85e

    SHA1

    cc666df0da89a1432f59301dbe8a0bb47e75702e

    SHA256

    80bb1b4b038a0f394aafcd7fc8b2ad597a06f0816c3ce6dcb7182d13807d58d3

    SHA512

    57578a4e6ce367f801c0cccc741164199df224616952aa7c2c37dcdd2d43e370df0ee3b2d7ff45676e03122e3781da0bcf1edc144f0dde292215f26b3d35992b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8e62f4cd162018b106e3a1a4f546a7a4

    SHA1

    dd87787ee38761540df23603ce45d924c0fd5379

    SHA256

    25a4842d74e67e77867966ae1566bae5a6b2ee9caff8b0b044ca8779fa0f1e74

    SHA512

    c9e0691c7f7e464bacb8e73a82b2e47c8fa572211691d31952ae61939d5566c9ed9d4449b86a7b83c4110d3698cd95c06ab35f4fb1dd57e69b48b8cf74fcf53d

  • C:\Users\Admin\AppData\Local\Temp\CabF624.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarF6E3.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27