Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    Log_Base_sub.xml

  • Size

    1KB

  • MD5

    92c38ebf2823cbb4f85ebc00130d483f

  • SHA1

    9365238a540f63b0949e9ba3214376057db9fb84

  • SHA256

    afe3aa2fa70f0649b11d8e7880995036e00fc53dfc54d6afe2013fc4af5449d3

  • SHA512

    7a1cf10c2b75a957ada24088ed4d21e7e3d59eef7c2c3c4cd78551c54ee054862c161a0b581bded7bfab758e7c149d2c1164210da687aa625e64842b1c7f979e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Log_Base_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa5e642bc09fd60fee7755a82fd6c63a

    SHA1

    c276a32de6b1d5696a690f57cd742ea1584813d6

    SHA256

    0b1c33682d1f99f2d42239359a0e28bc5ed758f9f54afbdf5791986c7551a4d9

    SHA512

    96d9807c8bfb98b15c5d87ffe3870a3e40b8a3aad7e6dac4e1a5da7dcf534ef096356bb7062f6592061d265e3ee3aa1a82894ec2460899ec51471b372af047d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd918752c83ecbdfe27cdfca105c4704

    SHA1

    0dad01b445b3c69c61715ae9915d1803643c658c

    SHA256

    5ad37f76d883c6932921df36d80bce92ef471d8de1fd744918ce6422f30d1a99

    SHA512

    80d3f749b24d7c4b86703402cf19837da9ce92513fe2e7650680915fedf7ded75f6bb825e3191035c426530df1d7cd4b6975fb9887378a75e9f2a056b96e084c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a89d735af951c228848558fc60810d0b

    SHA1

    a0085658de145101f442be4ade4852f57425acbe

    SHA256

    220d4a0c908a3d9c50e629254aba68d5a7cccf000df436f0b22b502b89286dfc

    SHA512

    a055ea0659171019d0525c709033bd4f61378a9d2442111273a31c7151b2d41a677fd387ae4064a5bf1cf02ee7a92df6b6b6d954523d671923611c894570a0b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbb4135cb65a6e436661b53f8c4261dd

    SHA1

    45dc4036fd02b0e06013cca4120d44837d16293b

    SHA256

    d0e773d33ce28a35a5ddeae7d17ddcdcd28f995ae945a44508973c8d1abde0c5

    SHA512

    d21f13f7bfca2d0bfc41f83ff4e644b6ae2f5062e090d441e00ebb9d994d02108bfcfc45746208c56cf4bda2f28b33f87962c1a0711bf6177771b07464841084

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27db8c7913b38c16e5af860dcd75f6b7

    SHA1

    39219c60d54f44ad59675f89ca4e80ff5dbb9219

    SHA256

    1234364e4b2fc6898a3314619b541190a90abec1d621db8becba1c62d5708e24

    SHA512

    48d1526b3dcaa5bda095cc457f7cc50243b62ab25181c4b6d3fe8f9c5bf33de09f892af57775bc1eb9574847ad7f45a78cf7147f3ce4c4e39acce4074028e354

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da20e4e440d2df9126c83d2213a70299

    SHA1

    139740476f3ec7b7507d6ceafa2a9f47051ccc2b

    SHA256

    2e0bc0c0f6af8a9813fd7cc2fab937342ff936f402e1c2badd136817960bbdab

    SHA512

    89cdab147e7b2a0e21fd36b4db272eed6985cb48a282e999002f588f7b56a25756a741b50f636f659b41ddd00a5f8590cdb3e0fe174fe552939f788877d015d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d3f965b43249ddd6075fe0a4cf89f6f

    SHA1

    b2193b2b58ebc412fc99ddf9ce5f895e78c459ea

    SHA256

    890fab9025590e91e2459f345eac45046006aed9a38cd6c3580cfcaa655c949f

    SHA512

    c7b201cf8f192e72d5a7892cda2253158f91301cb649420365b8fad4dffddc6d1320c192ab8d3ab0ba40a543989c4120278b98557dd6db11eed3b64c5c3176d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99bdac44648297f03ad1299c86a1aaaf

    SHA1

    20aef9c78ec7d7010c7562df6d973b8d7426bd25

    SHA256

    6028410fd895d1e4345959e783839495e547d86aff005064775268d704507a6a

    SHA512

    fe0b81044fe2d645f87f66145ad1804560c2308270a4ebf542cb3ec9e7801cb8f408838ba9a3d62df9046c88255cba6dce187c4b34170b93824b394b48f6b493

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2ab49ed0388285fcad574fb81104aaa

    SHA1

    7f971d24d404b111231e47b9a1a42c7b5ae629e7

    SHA256

    ee475553bde945577539518dc8837da9c716bb789ee0c3b2399ea17868087961

    SHA512

    0561ab65f8813222f6b1711c77c55e983d034b311f404af290738ecfaebbd7076852d185c3e61d329740dbb21e1cf10dae758458f23124c0f55f05bad976b3b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27f6a85227badf4e4878d5ca9d0afea5

    SHA1

    33e5f45fa0830368a5abd860bbd740318babf608

    SHA256

    2d02d12a1501e4622ea4a8357531d9c34c2f031d935db3a3cae3c364f7d7c4af

    SHA512

    680d44c1ddde892532ca978d4d5937f16312241cce17af8e38d833443afd66e86354380238d79b0d2cdc7bc338e611bda67f1b9cce2e0f5e49df560e4fb08de2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df5c9c6a7f593494e56dbd026078966c

    SHA1

    0ef3579bc2e8a7a3fc761e524d0c99cf55d0d5a3

    SHA256

    e1f31358fc2f885216178d3d870abd50f3f098c819372770d3323d1ce5719350

    SHA512

    4ed2fc9001373a674b3a85da71bfd985a8244585a712694421d7b244231b67f0540709c3ab4d9900d540acd0eb20f4a19318687ef5eabb882eec21aa7d0c0b5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbb3a58484f020409ae86b76f75a5860

    SHA1

    bac09a86861486b811d548076f5fff503d16bff9

    SHA256

    4295c65cd4b241a5dfa728ce603c3bd070e80ec2ece7e88580f3484faca02fd3

    SHA512

    6927fbaffb51c51816005a68f35fdb9ee441f010ec54e1ecbe66edfca6e90914f9200a9c26aa75481f0819ed3189725b68f4379207d1efab0fb9daddd1d3f020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    531589a622e5d6b4ed9a5cebefcb7bb1

    SHA1

    5616195ed2d6d717c3750cf55da4325a6128b474

    SHA256

    85e739306b5c11bacf3498b736a73f9a5aca0e30b0fb820d287f7706c9f04b2c

    SHA512

    7ebfd4fb10babf8d1936daf7aa5b00d4a63d17bd8767f2da6c9c5cbddcc833d717acbfecc8b3dc864250d9c154c27120f0ba4c4c331db3fdbbcd0a1308893b5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2d4f122b94a0c6377c955e462526db6

    SHA1

    bf0aa545e66633147b8daac04933eeb56f66ea15

    SHA256

    1093b13d96fab3a5f78849d645a4c9aca87ca0e7c09f5079651f15a4e4cc2303

    SHA512

    019c5d1ba9d34a5b2f42786c5fa24beaaeb2bf69b09c5d0872cb70a1629b73ab199717e9fa3205ba39eb642ab69d3278411a89677d303f211bffb49479918830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1cb64dab5fd79e427641dd54132e7097

    SHA1

    e9b4cb8a38b3701fedd99b59e3b6cb33c4dfadb8

    SHA256

    49d4bfc2fb7749abbc43cdb508e989f157a12602ae8fed954e21e0d74ec178d1

    SHA512

    8cc6b748a863c6616e0a4313fe113d5b856605a79a72b6d3db19302d4e1a90f9b885d2faa62800462da21f5711c06527619e0c59f7f6bc50da34d37a70df6971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78118320edb91e028dbee333753ddae4

    SHA1

    c7b2ef0c2d3f60d9cf50df5e5cea1d9f6d181876

    SHA256

    ec5e2b4dfb5e18439ea1e7ebbbe8dc769954dac28e8fd399165c7428c82f8a98

    SHA512

    1885cf7d447abfcb5722720c09b731327ffc1be48f598be4d17d9cd2fbec7a4a92d80c7215b59abecade8bef9da00e1248b66908752bead71715c7fe3d462ec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37dc343a037dbb4d3e5dc2837de13dba

    SHA1

    1caaae42fb5b9b189415a5ac22f4419c7056c163

    SHA256

    4b7bcfcc9f4b5ae3c5a7f79b0e9ed6986e8feb42af15400a232096ad9865598b

    SHA512

    258b91dfa8f6f51da20ec3b65bab834baaa2964b1150d8b99fe82a31195186ded6ed0e8398865f2128a84d3b0db1304181821524c6a027a0f78687e9fa35294f

  • C:\Users\Admin\AppData\Local\Temp\Cab9BC6.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9C45.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27