Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    Super3_sub.xml

  • Size

    1KB

  • MD5

    0afb1f3ae2e3817d6637de5096725941

  • SHA1

    6851415d1500b345d9630eb19225501d196e5a02

  • SHA256

    364f4c4f75e4ea55a354e502491107b19e0d3cdaff1f277474550bfb8b192250

  • SHA512

    3c0871789845697757224b57584e75f27a0d758a8d4ac2f9d0c054e104b232108ef8a427d690c6ed7744f06806de320f48681bfe92b951ab49bb6ff1e4e11793

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Super3_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94b5bde5f50632b893f19430be55539e

    SHA1

    b176df69ab99490e754a3cd23ec062f0348a4b99

    SHA256

    a9b999e9104871f7546d12424c7456236a2059438dce218cce22054c55be78f8

    SHA512

    6946d446e382149389c281682c01fbb6f8f2396f6023ae9a37d8ab3a96e9068154769e493969a0d5289326161206254be31fbefab6d2ef6fe5f85ffb1b55042d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f67de19bf33887276f2bb84f62d9134

    SHA1

    f9fd8c82243646a323c2f9bcac350beb3e4eea46

    SHA256

    3f0cd1c8a4d41104b71ac9705e0ee883318242b6e11265464e674d3991c2f122

    SHA512

    0e5fe39ec802c5a2c5d8979a887a6114a786b0b8c6b851fe5e7f18f6947ed35ccc02f2d131ccf8fc6dc50475b233e3d92b24c72e6adba0f90a4c2d90369c6cc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b1875c107393b8064a92cc2014368a3

    SHA1

    9e91365bf889ecee7e0f865f1656102bec2c8b7d

    SHA256

    cba7d2d40ce52c71ce4e032eddac6bec820c132747bd1c2e7d884bfe29b3e936

    SHA512

    aef3cf2934e5ca115d892614711adc698a11060f2f9cc77ff82a7555224285c5e9cab07b34339d88f23875ec78848aa3c4b7a13a75dfa0311a40cec7bf7ff5ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86d4516b5f62e47dedb36abae9194dbd

    SHA1

    3f4f7129c837484f78475d77608cc4a1da449137

    SHA256

    64d4100cb389806773bb46c58ffb000b5c9e7b3b068802abf970657c85e0dde9

    SHA512

    86a185406ebfd4ac16e7e2449cd4860b4e281c2f5150ba9196d4c45c6098d49c975bec1713e7f324f80f6fc72b3c87c18ac8477da3334241dbce9f96bc22f495

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18525ef63dfa0d3abfdb1325f7e1d75c

    SHA1

    fc1fa941093da712d8e29dee4b6e1ccc9e9bf5cb

    SHA256

    c87ef03ac0e93e102fd8ebda9dac7ee6e4425b7a888ffdc7c25a1613658af236

    SHA512

    905d83c1c98b52e9871fdb9a6a4c43bb643b032b04c1d52d87c0d0856be5dfe34cbff99ac1c583bbc70f6751425275682a6d6c1eb908f7afd9047a9a45848348

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    102f903d08b645ff7039caf402a20404

    SHA1

    92ca1cda0242dbe676f277003608361bd890e200

    SHA256

    39147fe9f96f05e90edd85cc832a10965547e36f4ea11ecfb4999b36d229f043

    SHA512

    42fad97a926230e1c552b44a39ee31ec14841b1419897db12406207e1f81120764bb372730832c8bf731d4e4a3e7392c94ceb5574e852e3a6b550e9b3d81eb25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c928a7ae2664fefc4ceb352c6e3ebcd3

    SHA1

    c8122f2555de0bef314e8bbfeda9586879efdf27

    SHA256

    34975a4e0675b45bfcf4ca3cb516caf6280cc475657536d682d4ac42d46ccd5c

    SHA512

    a27e8a1de49e29c06aa30e5ad580e3a7063126cdd868993e346e8be63d88c745cf7a7f871a04be0c2c95acb5476b026597c29da42245d7596f9ba70f75221402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3f7b7fd5190e49a7e2afda939cc1d51

    SHA1

    a6abb2c3fdca3a2b176ab5c8d938207093386071

    SHA256

    a487685be9234fd85d328f107dff7c3639c6d7c44de69fd8949bfe083fe5ecd0

    SHA512

    902feb2d62d035633d7f423f04130636e5bfe9f8079ca5f0ac57cb4abb909e0a31c9287ba63ae273d8bef4ce8c2e4e4de359e246cf9d89e26c9ed14c740aa6dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60380d74f3a38134dac3ddcdcafc2172

    SHA1

    7a856ac37737eff3678cd935d52ff9b2a5085125

    SHA256

    0da0246228b2e9aaf05772e1952b0bafcec5e3f8b53a9b25f386e05d0cedb431

    SHA512

    9e9096703e671a277f55d7dffb69e8259f02aae5503d565b5c46fec77baa83f40bd2f7235d2cf37b349308b4079a212b45eb969dbf3b5522a27f177e734ef931

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67653362e380e54b3ec7ae8468f5a00b

    SHA1

    77fd402c190a08266d723bf90ebdc50f46287ed9

    SHA256

    5a7752056f7360ba70b45afb20bafcc30fab64285f64f3af1aad6e9fb3408df0

    SHA512

    886a63532c34138747dc83700e6e50687cc20f61221c8ad55f0bba14efca93aaf587d4898c4f2b00e3933cbd0ae57ddbd887c2c5d832d06335a5fdb7b42f5cca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5b335a51560a570ad46903ad0477177

    SHA1

    624258e046b02d51f87864a7d601fe883e2703a3

    SHA256

    565fcb1a4b7b3f866ef7d1d5c461bca25a5d73fdb5cdfff16f4198d22792ed69

    SHA512

    a0e128254a4f1de388121b2394898fd382de270dbb6c112f65e511131c27b5ff61d07a63a99c442abe1d4aa8af6fce7abd9192bd9c4751221b966cb795b74a39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99c1bdc66eda1b54583a2ba22ca7e61e

    SHA1

    cf2db99e53cd159ac4c916dd6e6f2d8b37f14e0e

    SHA256

    da6cbcc786f48bf75c3b39ec8919ed86b9eef90ad29bc43c5d56b8dcad325659

    SHA512

    eb02342cb66413ebf87750447b1e64b2beb79c5e37784005f904df7600d257c8ec53cbc7f7c7a91e81120afce93decf817c3db8a7aefc1c0a32cef483d6a4311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c44896aef6de590fb1c2d7ab4ad734a6

    SHA1

    2bd3105a2b77c98be0f149debf3e53f2b789a451

    SHA256

    65cee90f0539363b02e138527d2b9f6c998380417c87bfb6ab478665d0353a70

    SHA512

    477b5a1bc78c0d09423865649fd9d4b320b87ecce5893aa3ed1a7f703cb062d9ec36596a4175e76c8e58f446576e2f42c0a097fad7f7c0ccba290194ce75b458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25e086fd6175150922ab71f4f4c80da8

    SHA1

    3be994eef25a189d96685a18022d950c5fda88bd

    SHA256

    a1fdf20522e706be58622c8bd6c10011cec5f55fde7fa22c844430fcb929ad5a

    SHA512

    865706e932bc79e6d546a168eca0562b40836736f2b6a11801d5a4086b46708d254ffc4f03f3d7b82807fd1a501aa6d4b3a35885b73b5cc3d9c0168952eaffab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ab4283e7bc2f46328bcd654ccbe52f3

    SHA1

    99829ade045316461ba5f0a08c5c8fa660920248

    SHA256

    8859321efcf85a3f9811b3494eee1772239ca43d40923d43d230fd97b45ec6a2

    SHA512

    5625e8b5670e7e7bb46d083712db1be725285ff93dd011192f812f6bdbad29c01c21da8941b9c42858cb9460ddc837b1aafa16cc2ec3799e8005724e2ecbd552

  • C:\Users\Admin\AppData\Local\Temp\Cab90CD.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar91CA.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27