Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    MixedFraction_sub.xml

  • Size

    553B

  • MD5

    e1b8068a20f4030c991f37f6dcb89071

  • SHA1

    f0f55451231bd9ce797f8d4f819c45b5b84ea540

  • SHA256

    056b91a230f814a0f5ee461b1a78ecc37088656beda49db42b572f5e329a3e3f

  • SHA512

    bc2474c6c9da3b580be3a13aa2bede1ad3ea929ee599a9b04e171aaae0d2df0e8f17ee3bcae4dd27bdd508b526a4fcd3c4673e7accb57efe1dd569b8d6157b2b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MixedFraction_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d387ed21b66db97d24c8e83c93638b9

    SHA1

    494000e95cd5db2212a22c35c63bd2553e248c58

    SHA256

    220aa9696d3310556d1dba651aa6fe7efe289db05c396499a0cce709f73be6a3

    SHA512

    1bf1b54374d9419548f72745165434388e7faf295f09dcedb09079cfed042a4d1551a1170e6cedfd7cdce43f399467520bc9332a6086ca68ee0119f5a4055795

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b04d1bd86454bea98fd6e2a3a5f55188

    SHA1

    77ae5fecbdde0342bad9b8bafadf176431e74d43

    SHA256

    245ac96b31ae69d49cf76de74e0e154ffd3d8c117ef5549a6ab088f5299d4008

    SHA512

    8211bd5a0f5c8c3b4e5ab05239fabc0af7cca46210f69fa7f66ad7bea0a70a9f5d35246bba696ece64d048411757e924806c41bf924eb63158130fa41a00204b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3598869bb07688d346a578018f9cce2

    SHA1

    70cf1ab61a612a97dcfbb1c6e37a886a308befd2

    SHA256

    afe8abbd4700bab0574d8f947aa5a1b121bdb243921bbef8c2ecd330300451ee

    SHA512

    cab4a514b78ced31c058ee5dc83ff6e52cf3924b3350e54a32336b1cd429c91a1f27edfa04464a0d93073717c05783c0205b4ec76da05348a3a866d2ac46c143

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8aa5c0a797f92776388448fe1013d169

    SHA1

    f3b4b2cf51136fa9111f4c90ed53561936c0dd59

    SHA256

    11081766679b1e91bb4cd758d0c543aed0e99a7c7ff6fe6d21b6718861033b7d

    SHA512

    d1926f6faf8a6b83831a63196bc19e9e39e3c6245f5dff6261f8e61f02d574d27d9a9b654fc83a2d396e48f71a5cc4cae8cb5fefc7ee216829866f8fa05a26f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcf706fa9dedd5ee0b4fda65140076cd

    SHA1

    0a18d0046276cbf3b816df939a0abc5409629c10

    SHA256

    1601bba922a743a52aadd7e0d6abc59e4aca46b1a62c9f11fe5f561caeb6c837

    SHA512

    298ad715b7512c9373812b0e67210421e43d0b03df66218ceeb5e203d59459f467d0ec8d688076b84ef17b33f3796fcdbfc47099fc592099951e21b68766b8c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddb46502111bfb802a1ef5f02bc2386c

    SHA1

    e4bf34977eff011fd014b6c40285ad96a68227b6

    SHA256

    c41b52d4f4804d292a1d9d6007cc9c51243ce4d59fb983309da6433f26def871

    SHA512

    3f15c9c7a4570ea8b6c9a7279a2c70992da80aea290a3b88c4585ad65bf9ef47ced9392bfc47c2b8e6fd3d70f9223208adec1dc8877b59cc5a8b3e8be253ebef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d6bcf65d3427ef7e036d4b85cf17bc9

    SHA1

    9a9c31b6423745492a0a9ee5d6a8e340c21ae0a0

    SHA256

    e470f59b2167c3d6f9b3e57f6aa28f88dffb10d085be01e35f7ba7af548d6b3a

    SHA512

    086e681baca84f3404bde07cbe706420ce11a3060f855527612caf14de7e7e1af2468fb49a81b71542066dcbb6951322b26e3fe0f1338c30800b9903579b8c20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    854eaddda15a7fbfeccfb3a422214d1a

    SHA1

    cb2598b40ccf21b1b0e38f61f280ff8b05788fd3

    SHA256

    aa4d4375c581d19b2d141f4ccf41a9bd7ab8d5b76d369c27d2c589ebf285475a

    SHA512

    5ecbe70d66333d0e8358380233f0b0c2b709e15106dc709257787835dc17bfe606637d4714da522a203fd808c324331dbde8144277891f05935a4bc4bb458590

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec26d662f3ed995064799b344b7cf654

    SHA1

    fd12463b2a507f4f4f67da95256c0af8bd902a5c

    SHA256

    13e18f687e4a3b4a7002f432f4ababf3fd2cfa95cc9836579662b740f67c9245

    SHA512

    8b63bc7bdfb816c5a2fc5033e07cf8c54b0aa18710779f5ad7dde2c04f5f9ab71419c5a7aa91370086d8543045af56707c1ee558a3a70069d2bd5a1e6c22e62a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79d120755f72a8294d36ce95c218979b

    SHA1

    8a7511f0ede92250bfaf4f2a2ddef17c663b1707

    SHA256

    764af1b2205ac0996c3fc5b21f940b39834833c7e81a05a138b7e29bdd1dbaf0

    SHA512

    183db088c4d211aacb9d3ae9dba7d07588069af8480702a80cea960d41f235127b0fb5e2752ccdfd0a19f7a46b214a659deb8d86c54e82946afcfe199c2a94cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    179c545b5d1a1715e1b1ea1827fc7613

    SHA1

    df5ad1099df0d8ebe1c85c7d0586cb74bfee8e86

    SHA256

    ba07e85eb9fc8eb5e4eb37c8672f0853bdaf2b376f9cd262dde268834164a841

    SHA512

    d701ffa9efae3fc8155c1e6089d5c6df0e92e7a1dead34eafe69b967ea74248643e19d14a9f854a26d4587a1488520131a49ed42e1a03fe9bb7fa3409f9f01e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f67a0f9b515ac73974275eee573564e2

    SHA1

    c965ff3e1452dd87acb82d95d4aadb455320b15c

    SHA256

    ba30a8ecc12495c70334bb5206a50571df9ea9df1160a8ec7e0b53cbaf4a5d92

    SHA512

    d4b64c2e92644f3f3f253ecb91a508174299cbd01e4bd18630d652a0de3baad2810feff8a8223632f361a17f3fa796cc110dfa07c801219405054d1f0b0d11d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc3e88869519b4ac2c3fb7e675b33dc7

    SHA1

    e1352ac34a0c8cd9352883be9dccff9e7a6e7c25

    SHA256

    0ef661d002954d196eb433e52ae6a105f007d0f4a491aca09cb234d7c037206a

    SHA512

    400a49e2d4453f27b6960d69a6430e3c5bfaf14ae4b291395bf7a7ce67359c2d208accfdcd6921140df3b1e5de8d8cf7c20bda6b99eb06ae8dbdfeee24e01b59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1f26be0799f7cec41171ab4e81ff8d9

    SHA1

    750da28c7ae264f8f9550dad14d02fcae94f0699

    SHA256

    fccbdc5574dc8b9f1cd1817efba5ad18e267f552bae5323a02af78281b3920d8

    SHA512

    a4ccae4256bfee6e5ad3977cfb0dad14162074ed94a86c8576be378fd95e34f0598e9a40b4bdd91731ff7104feceb06143766157005c816c70f62645ee5e5d7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c23bb4de267d2cf97a670c9584708e57

    SHA1

    b2a787a32f518372fbf8a54589852408b03d48e6

    SHA256

    fa5122310ef8eb4764c0d38723652685df81dc5d016e23cdfae110c57955fca9

    SHA512

    4ec365397dd8e4d3b884d370290969782ad5135fd9f5eb2053bd9ec091724e20113d9c7a85f9eb3d1f45da4f6733aaf0c9db25263f40ce265082101111c94f94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b3551c42e249c04ae6253f6a384d5df

    SHA1

    09119d944d090d2138798bb310fb7d4a05b84eb0

    SHA256

    31d8533d0d5fe1201eaaa7739143e99ef431f710963da1dfe0a64b66d73565dd

    SHA512

    a99c4dc19cfb4dbc6df55c708016442cc52a5a09874c4d9df2e7535a4898d8b47ab975c16443a8345dcf4b1d1fed6daa3e4b8da989244a9e467e40a36fddd135

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4595bfe9736610235046213464c78865

    SHA1

    3de381f415aaf944e5a0a1b1c10445204c18a25e

    SHA256

    219bc3b335a15b867c5ec5a97b10a5ba8eccd730e5a3bf973b184f158550ee83

    SHA512

    3f188c7399e0c6f5eb17c1ace8135ed2f5b1cd4296e25c40768744b4521c61df549a7abcc79ca2c289675c77f3b366377fb4172e57ffed83b8b425a032424f79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9b035d3422e7ad78f5c275fd31dd249

    SHA1

    2a768fd8ec957b6eea31f6732c3bb51bc381e40f

    SHA256

    6df921c426404f979c33cd71bbf0b68420f653e474e11229e95857a87956318b

    SHA512

    616fe7dd0dd1144fcec4ea327a002ec3bbf4504e7046c924df1e9e375e94f28b4fa358c952f3498defe1aeed0f3b246eaf75bb1650f59964491e222afdc54dd9

  • C:\Users\Admin\AppData\Local\Temp\CabA95C.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAAC6.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27