Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 22:00

General

  • Target

    Fraction_sub.xml

  • Size

    494B

  • MD5

    d4a949fdf52952cc148069a5ab1cda09

  • SHA1

    9bc68bfe31966146161e4f1d3904fe2837f9f1f4

  • SHA256

    b25ebc2a6abee5348d57ad2252e356b421315d3134c4269b13a221320cc4f4eb

  • SHA512

    d43e6e1cbd47d3a75cfe821b2cd6836f4e000f482567cea9f97ec5f949fcc690610d3b9f59c5acabbf5ed222658faba0e604fe5859de6a94faece50e2b1845b8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Fraction_sub.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    98ab65730257c52c659d065326658a60

    SHA1

    aeab895964197e2200d686f38854650020c43695

    SHA256

    7f72c7e3b58c2e770623f4185b71eb2ce5d25ae1d30c2cb9464cd474de577d88

    SHA512

    e800a1fef9b5c0d2dfd3071d46cc5983ee88aa1410709b4a9a74e7544d62dc9feb503c7c13a21834fe1a74b71299c114c9ac853ece2fe98e19dbc69c55516476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac1be2b91e2978aa53561733202c47f3

    SHA1

    b396de5751abf8dbf18a83ccbb27be7591546413

    SHA256

    fde36b5ab664f01fbdaf252b05b87ffe10cfd8c35f784370964d3851cb820222

    SHA512

    4bb0dc41c74decb169e8db50e72d7c43f18141e4bc8062a47faf82eff61141573cb366b23edbef289ff92616b8681bbe402363d1c1ec9b6b48d286bab827ebba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c46d69a67b33ddc7fa5cd93fdbc73048

    SHA1

    470be652d12e8cc114f5bc7cc82a8bb04eed4fb5

    SHA256

    a7263a083dd82cbfe08a8f5bd462befff8572c017f22e1b12684a585182d9909

    SHA512

    5e32035782ba40ce9cf225deb7f151a8c2e7ae8a1efbc48e1b58188d2b16d6c5bfbb36e8b800937b457a582074d87acbf339772a4d71f4007cf4765e549f4192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    238ab358d7f4b0b2551b84e35d8e3a5d

    SHA1

    78b55f56b1097f07de1cfe49aa6afc015928a48b

    SHA256

    3e583551d5d9fdead6ccae9a3b82bc92cd652bd994628e933129ba1edda21933

    SHA512

    fbe3e63b77be53f6303991d4fbdcaa9bb45b2575da03270ee3894227d520f1c1bea87df7cf4bed040760e0bab03ec8f2321da88a59fa212589cac98b510e5ae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6935d812caf461a97cc89ebc3daaa6f

    SHA1

    a73e92cf5e09adeff47a2daa2762fba59be74eb2

    SHA256

    59302d286dc28b51519021ddd042a29a02eaa4d0db9c3febebfbb8e112d673ad

    SHA512

    417a03dc548fe72a12b85ad5a03db77f6c6a82174a0e3fe8ceca8566edd6795010912d9ac6b9c51be038c979ac5e04a881894206b39a826451f24504af0e306e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b38d95bcefd0274f6cf9d99b9570c575

    SHA1

    83208b3176eebfbe15ac68481525a2451ff2a217

    SHA256

    124f15eaa180af4d4be3360b867d04dbaa1828c0f7782e4616ab632ac3ad93c5

    SHA512

    feb91a6459a3f588d9d06d0791c482dd03d16d37ed3e8b8a6063a55391136a5f72e275e805558fa3047653428845e415a5a8aeef50539e3ffef7d471fb400d14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52a7537fbd6e5228c15b864f78ea4a8e

    SHA1

    03e2dbe140090d9004665e08f829e684c117a13d

    SHA256

    79512b3d7996077939cef95dead93d36cdd92fa25c3f7a09e028595dd60dfc02

    SHA512

    a932fd4887610d3d1544646a5d5ed3fe8d26fee92ca378b66f41ce86a41cc4e1d8ae3f44436ad628f31a0272da7e42cdcca11851eb77dce61eb554d5ae5d445e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57693f7a0c6610c0c66eceb62fbfaeea

    SHA1

    8033b533e6fe5ba87dbead1cffb266183da49cf0

    SHA256

    286c77d7244711f26a13cf6942b6aa9d367bd42c4597ab2dde822063323555f4

    SHA512

    1b94f2bdb35f702215d5a6dbfbf6af566d684dd85bb58bacee0edb47eb03bea4f3e23f9b9d48dc9d3efaeb3b8179597e7d631b314296f5659c8f606e1bef1d77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ccd9c595b75087b20a1cfe71193f0175

    SHA1

    946d2f5ceb38e556ed4ccdcc1061e44be3b858e6

    SHA256

    3a7ddb42322106444737d967278afee4f5826b72dd9bd4d0a824c0faa712cf2d

    SHA512

    2dc11804f3dfdfdb3b357c011b75ecff147616fcafb2103798dbb945a49abda07174f829a2e051feef533f0abc475be479c00bcf9bd10a6cfbdd7b65b4bff88b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e1fb52bde6a8ffd362af256f40e2b26

    SHA1

    8d299c104cd11018b3221d4615c45f714275876e

    SHA256

    11ec0da82cf16d1246648c803d833f6a9f618266d17853e2dce322562c952ea2

    SHA512

    0bcf7ea31f70ba3af943d782fe3ce44678f116d58394b3678a8f4d3b03a587c4ddf9589598e42c663f346300daef743297b5cd0f78925564fd9eb70ed65fcd35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f37a7b70fee661d26f7745165e5adf3

    SHA1

    f22a997e7dd1029071de607e6245a0bc9e1ebba5

    SHA256

    f64eb6a0d6be5f08104d7c0665f450fe6ab606ac52fcfff9a37d49339df55cee

    SHA512

    17bdec38f51db00993bf6cd45f5b29acdf8404dec5b1dbfc9ee67d991c6b3aeaf4e391af227dd81cf6d1aa916ebf9c399debc784fe298f520b363def743d3842

  • C:\Users\Admin\AppData\Local\Temp\CabC342.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarC43F.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27