Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    cup_sub.xml

  • Size

    552B

  • MD5

    cef20156f690e0ae4c40da5bb5101824

  • SHA1

    dce37bc26bc4d536f63b91ba6f0a01c349221c87

  • SHA256

    ea5c439f5ee0aa4882bea669488ecd308b8b9130a6cc7156ab6056372c2a016d

  • SHA512

    4ee919f3e1d5607643acbe1accb6e2251f578e2cce12cd16441a489dd7e6d0c6a3725ea4ae4eb6cc85f1df8b01a289f29371b5737b8a310bcb1702ad292de22b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\cup_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdeef2bc01c54f16ea1fbd771febfda4

    SHA1

    2dcc3d5ac61127d6a693dc2140a9d0acad0374aa

    SHA256

    63e9f6e8ef8e18e9320409fa77db1586613aeb8c7719ad921325219b1cb15d42

    SHA512

    9c49ed186987b1b1e2d7c7c41a9816aa8d5618266a7d23b03da73ec73c41966a304d60a75ad8418a2f2f345baacb3b6f97e3255b0754be3a24108d9239c879c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fed79e37e425e139e4d41681f0cb1895

    SHA1

    43b9edba67ff0f53d6dbaf7b450a90425164461b

    SHA256

    bd2dec00d35718e12d11afbe7bf739bc8c6c4d8af5f7d9b6eab2cb6ae2c93277

    SHA512

    33bc674128f9b72a1fce9624208b72cbd77c115c6276afd6b4945f3784bf168f9cc47b84c54e90e0bfa49d19a3621caa887db0ae0efb81b7f9c1c087257f95f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72cd8d83ed92d1f5436ffad3b47328ae

    SHA1

    38c3ed2d8d84d42b96d8bf3259f4c6790997b981

    SHA256

    bb313b079afcdaf7cda74c2ddf9754ca86fb8ea91cf37456320bff9ea0ed2f10

    SHA512

    bf313868b8e314eee9f7882d0d18a69ab77a44a719f2b5a7c9884255d5adfd92da996e036a6b1839aab95524116e1503a177749840d77eedc9382118abc10313

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    661505d3eea9c5988eac6f9c86f36e76

    SHA1

    f079b3bb25c293b6f156e1fa58d8b3fa4571f243

    SHA256

    dd942f8453f657bd08d1dd4c25e9002a1304d345ca5e1c6866f402e157d642bb

    SHA512

    f6909303979cc1d72f164b417b10d99c5a80f4ef4ab91a7556a43a81ead504ce351256857569c4c37621ec3764af54949b41554e21733202539157c9a5633749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb140d2cab3646e0cdf6e60beffaec21

    SHA1

    da4b23b69c2dae590a76eaf1891fbe0d412e16c8

    SHA256

    bda34cb653716114c5ee370b38a90e4164d12bb967c086cef74bf81ec1ee6424

    SHA512

    a3da0a49b7fcf87def5ebceb4df067a19cf58cf11c7155a91855d17df42fa1978b151972fe2052cb09616eaa1c48d5a1d199609dc93e1c9530a37ff5e18a44a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b31301f8c83143c016b80ee1f3947a8

    SHA1

    71449291f5b4f52d3f4ee7f87871c5cfa5ffee59

    SHA256

    8d5c5f952f977280f7710920f47c0cdb12f9e8a4f7fb93785096cd311b2106d5

    SHA512

    d1d0cc79bf69ba6ac406eac918999623b4fbef247c1adbc393a6c11fa69d7905204e65b13647f9a766c0d8a0bdb8ba5e47a1c1e0203a08165a6e52e64b5c8e7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6aba8f02ca1335294c4a380280dd894

    SHA1

    601ef1c3fd2200e21c9283b692eca385ae77d3d4

    SHA256

    9d471d13d951e981788af8623f9e50fa4b7ac093bf21f9e50494bc9c452ef729

    SHA512

    13f9b04b96610f19bb2510161252af43da75bd3fda24d068c106f336d1bc9fde9e1c706a4a0bd0fa75c2624e700c5bef1ec64b2b207b3139b03e21fd4a751b9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64c7afb6a26f73bf3d8fede1c0785551

    SHA1

    b9d29430555b8052eeddf2972e5c124a646d8586

    SHA256

    e8fad3db846051336852996f31681b6a6efc9738b5804b9276a483bb64f3f3a0

    SHA512

    bd550c93ad6e1084a9b59f5606a05775e13e9ba7513fc552759046103f0c6ca9cc62c283be11e3747ac80b26eaddd92cb2a265c900c00031f4b3105a3905ea98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff5f5924d5be236fe11ddda03b292109

    SHA1

    5c577e32b5636f96de576e63a65f8e86e51d80c9

    SHA256

    50b93c14a3a345493d0cd991ccb5d5f9192d0e88a028ccc8315e4f20b76251c0

    SHA512

    291c678d573bfb491bd6d0e0c2f4e1062e1c28404a8084f19761ea38cf20b8fd23293290316f1415029717f730b3fcae2c956a1eb78af42c1f074dde0b1fd791

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1045a1c61e034a3708b56f08dc165840

    SHA1

    78788e3d97b3eea753a90a6310580cb78da67518

    SHA256

    0128bd734a8812c535a103fc9d9179d9d6b1f393194823bf6ca74ac11c147018

    SHA512

    df99f9ea5c12a4c046a64186cb34b06e12aa3a69ada56e0e978cf7926b7affc8b31cb551870a66f9f3ec5bbe8d3f74ededdc5bff062c928b8c4d7026487b7983

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9729bb661a2693e70a7f88897a226699

    SHA1

    867d82a712fc3fd264d7c05bd469f70716e858d5

    SHA256

    473a51cacf1c7fb87c9747243e87e927eaf7bc8ae5654afd586bb69c0916ade0

    SHA512

    aa60363e4b734cbf3df8725b2adabcab72704296d05c19f90dd6ae9c876e4d5c3516979efabe4ae4c1f8d69f952b7dee0f1fc5fa42d08211c97505bbb8d21b71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8690860d932f3cce1152a9e94211c1b4

    SHA1

    7ac343e76ca3efa9dace2726380a0f78684ec2a4

    SHA256

    0629fbb75672f4de7cad797385be2b0ad68d765220f265e365483d2ba4ad6b0a

    SHA512

    04eb771425475d3c99559282f04730dfb44a89f778fac486d68391543d6f4a7434532c693f333d3ec658401b210904097b198bc79649753b2bd7304b99816f51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    869a949046c294831b0b420cbf634d89

    SHA1

    9b926087d328680ea701b8a495c5627dec9c9055

    SHA256

    acf44f2da50f99045cfb3e58d836dde9da7402357859998a3c2a1168c3b819b6

    SHA512

    85dad39608dfb7a842f468765c1332a263c785bb9e30a17d2ffd40d351064d6d78567871f3193e527ec51de8fa72e4187ed9bfbece6f93f8a7d6da4c0767d6c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c08d472077035fc9a38234bcbe982381

    SHA1

    aab9319d55463d6ecb4937e7937870bb5190be78

    SHA256

    b8997c8bb91d0e13571ba7ef8aeaad04a59f4214997ed1de210b64bef7394565

    SHA512

    1b5156a49af8229c80b0bec0ee8bea1b137c6aa23dd3402b07dd36d4f53efe4531633d388c47ef4f27da1056d7c2da81b9910102e9b3fb370d32c8d3fc441da6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08c1318c9af9cc8c27e2e6fc6889bbc6

    SHA1

    fcbd04bd2903f0b8e1f63ab0e63ee01b2b54f2c0

    SHA256

    f34e195263fea61521514c0ee91e11048e9411e9582164ce10e127b26f71f7e3

    SHA512

    a898b8fbd7523ee92d81ef60477dea565fad3e6f1b2e9e03b296f492baf1ad18cc99aabb4517848e4b0282a55c70a143d0111142b0bcdb20b09d122ebf3f87c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9403deef6944434150208245feab4de0

    SHA1

    017847242ee24af6a20ce0332683e4e4eddeb1ed

    SHA256

    8c54eef11dd5a8aa9168805c328e70f2b09018a8f4c4dce38b09723b4a7d7c01

    SHA512

    012965472af31b1cf08c425118513eb2473e89b4cd3480f13313f0cc21a1f806a7fd0338f0c5bc4f71ce5171848f9aedb4152cc5fff2ca5b48f883c19bf6fb09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2eb87c25d6be22f2958cd78dce0edb3c

    SHA1

    9fff2d38b3a7cfad2f6e4b0d27050ab6151489fb

    SHA256

    2e489b86ea7001ec23ef459c82ddbd05957f07b29c24ad07d19adf47a5ba85b0

    SHA512

    9f4ba16f7a02bc589e6cf66cac6400941042212bf127781ce1cb9ec6beeeb016af180cd9b52f136550c91eb86995066effc56b9db684b5b1562f741099ca1c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    795f75dbbfe7128bb1dd5c14f8ab2a8e

    SHA1

    10da681d79238a09a106dbdb1824664019ff262a

    SHA256

    5bb94b13da51bb818e14c794613cfb23c8ca1d6f86093c108ffcd5f9a1bdd1eb

    SHA512

    5fc6a54e7e3e465ba86d6ad97a46b639906c96492408018b1027c461d2c75480fac9ce7911a5dac966f8c01870b3df456e0c41912ccd8cf88d25e4b4764f0c51

  • C:\Users\Admin\AppData\Local\Temp\CabB868.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarB9B4.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27