Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    apple.xml

  • Size

    1KB

  • MD5

    386807d5a6de6f8b74bf26897af8e092

  • SHA1

    9184e48a9f8276f32be763a254773c4e5f2017e1

  • SHA256

    be1bdd07dae30ddf977d7f1d34574f6e6d6f9cc68d3b5428315af589a8d15ca2

  • SHA512

    ab99eaf548b8f1b25516a62d814f3d7610a2d6d16c5a9401b96368cccdc5fdc84762eaa6041ff17e59a99a08c5f89b4b97662e080825d5159003d21ca7f767c1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\apple.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09668cee37f365c7be8aa8b419ffe63c

    SHA1

    b083273cfec470956523470f35b315c91c71ad36

    SHA256

    0847cf11f27556eaa12ddcc564a03f1749a6a2771ff43ef5a2de8bc5c3cfec6d

    SHA512

    15245ea2a417334be3c2134a20fa76f1ee4d5720c6174e2e1975911a745e9be57be78a77ebfba3d207173e44358152e183c5a4da222354fa5a0d438a2f73c202

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4afc2b3d9cc08f12fc37144b70393be

    SHA1

    4ab9022e8697b82a0a4a204f46046bde6551031e

    SHA256

    dd1a73046d0eb4500f27b13f44a0c01a7d9dd59cdcbb08ac30f0e401f62163c6

    SHA512

    2fdc14d112f32b497abde5305273549275d5188617bb0878849c8abdecf8e4933c84cc1d7fae772ee4b52b2c0c139a4901f414d06d1ef16332c3f23186e91718

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e9ed2a11d018bcf98e64c776b8b9eb0

    SHA1

    34ff79d60b3a8f6a3e8413504a64952921153b93

    SHA256

    640adc47e4c01910a0b94d29b1518f1bfce876f690805b51596ca27b6f4ce7f8

    SHA512

    32673086b23a434dee796b2d32695a84e4acdf614f1edd9f27612c5b7af0b8000d51326c62c80eaaff1d6016318b01bfd29d007f6e4c04222ccd36163ebcbaab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b69dfa6dd0481aaf0446fe26fa26111

    SHA1

    ebb641f5a397989bcf21d0f31606251a46c8ef5d

    SHA256

    9a235e703e4595178ed57c8c55a3e8b841e70b9642ab5749d664a4d3f139ea71

    SHA512

    a58a31d2992936f8135a8f2763b42bb525352d83dc281367f7c3c603b44294bf922542b360c5a3803628d02142a7254f0f5941d66adefb3db03482833d2040a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2acbdf1e8c567ca8f323dc52f6c4a4de

    SHA1

    8a38913f25b752e4976e4da24c9a3618f6abf998

    SHA256

    a44b18ba83bc899752a00abed97feaa5f1d2c8900180139fa69e6bd64914dd28

    SHA512

    157006414bea4ba76418b4fa29911a2480a13129ab4051399feccc96bb9da9255db5906b39134111f77ed32d6fde57d5b8c3b6ea880edc81ab9c53e76a01bbd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b00b2b4f35bf8675dc07815a00f3e92

    SHA1

    a6e73968854cf477f5d5c34a3779ec1a2cbc944c

    SHA256

    8ec4e967f3f6d09ac7ca990b55d7c653a85cf93537df5b2a02b011dd1ed7e6e1

    SHA512

    50e122575c0cef0957c4fa0645633d8f6e01ff32ff3ed890e40337a6bda58c25b930d93537916573f3399847fb273255bcd9d5ec78c07cb439dc0559e28c36fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28d6cb4e5d9b330fc2ac86e3b19100cc

    SHA1

    726e7a3234b6955f5203e31a6d2a136fda4d5628

    SHA256

    32b75f74fef76c7c936a7b46f0a7f5aa813d894360a922eba9b5c035ffabbcd3

    SHA512

    fdcb342ac499c1aa64a378e983da643a489ce62bc8fc8f6a82da7ee488eaa03283ea945ef5ef8590702749734f128a179c807f8b3a8655bac146f4d89a441add

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1bd25dd50c97838cf6972fabac0f55bc

    SHA1

    47930e882783d5dc90d9875c79a52f86d7243a39

    SHA256

    f92dd969454c8eb8507105dfe36fe0de42214b5a61932e87d1cf4415577d1329

    SHA512

    eb7a3776feb8b0a510aa1d86c7344e4ce01b1a7bee870293fb0716c3f8d4da46d2c2f93d8dac65618316f63980f7dbfa1de43881fdc34c3035a6931764263b90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    805f52b4db08398bc17d8be02df14353

    SHA1

    2f8264354270955c7590f282c022eb34ff3e3709

    SHA256

    451cf25aa16bb7c2f2d72c654b6197eeab54c41054f6b2379f31c7366ab65436

    SHA512

    c56f4dbbea13bc65f0b552a4c29592b487335ce70564df0c351341b7bfef91d153a2b97dd03a85e7061c93821c90c0f575d6e39a180376e6635afdb6d6c0d717

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bcac806e9e5b1ad166d2ddc3ca3d9346

    SHA1

    354d629c40323b3f97ddfba616fbe14e5128d550

    SHA256

    f6f4bfbec75c86453fc73d8d1208c0e041a18e0df44c67863326ce43a96b4b2b

    SHA512

    2de8db4db4bb0bef75b331b4cc6539ccb5fe03488ccb61d366b218d51f55e3ee3ce0886fe3b5a66d4f7a5cb2c49923ea9cf3457a752c274b74223aae3ffcde7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65d6a16920db1feebc4a2094ff63126f

    SHA1

    c7fd4a63aa6f202bcea7fc8c4a0637794f49df11

    SHA256

    1828353f404fb3b24f4d87eb8205b0d87ab7fe2001494097a507200f5b09be93

    SHA512

    200175154114d00a690b2c578dd12776263b555d7582023f1e51004b3d0c99e230bbc443417c28714fe4ebf6ed2e61d40b322adb1591b8826256b1e0f0aef8c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7266f117f0aa2bbe5233f979a589e95

    SHA1

    b11b9ffdf79f722336c5c00fe296018f65bc6e35

    SHA256

    242bad6e2d439fad267a88720e93311392c7d353b1fdda0620d840c5bad99c9c

    SHA512

    be230ceb8f2bf5e21aa79c80fc654776067c32b7c7a61ca2dcfec9a7401a42049f0bb44b7f94c4ddf852b50c7a6ec75c4f66a54de9c6312b93ed81d352de7813

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9ff2ed9be91ad7331b963177606c5eb

    SHA1

    772bfef7d95952bb60db530370bd7c380cb872bd

    SHA256

    19cc4097002aa1223a6d34b10b4bb0d40de45cd993792a2a074ae185aae9d260

    SHA512

    d775881862ba25a7bc6fa7f2e92709d4eaed5271983a4ef4347d933cb9b4fb336934c70d7ba9857fe465a60c155f33ca84ace287f0a237257633e796fa7ec933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1766244d4c9f009db5d32fe9076185a

    SHA1

    4eef4ce19c60c67b158578c4c163cef7cad3d9b6

    SHA256

    9b51322a8d1e633cb410ab6280473f166420c6015247b0699ce23a64cd3dcbf9

    SHA512

    47a6721f9ea85205b3261a953ed48141f2695ed785900b557cab5697feb8532788095482596873aa3e704b6a3dca1c503cebf12b28fac5729cff17c4cd830b7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60c72b7d0974ac7b5d89432b77f30ada

    SHA1

    d9e99371c3877a76a59e98fb5404142ba7340b1b

    SHA256

    45f64e924f8b34bddf526cd8cd4edfa68f2c5cb0fc79fa83f4e948494b798381

    SHA512

    d2bbdd45846262af7b84ff3774810e69d31c540667a03f04dcbf26940fe50d3b880beae70a2335578900f3253940752bb127bdde4adcb29c14186f0d1d1006af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f30444692c094293f3e92bd6071c012e

    SHA1

    ccd78d06dd5069d5fb4f3c37e883a95f510f98be

    SHA256

    b0a03966d1a35807ecd7672a8c5c6c62d39d59bddd8f3014b6132ec82328bcd3

    SHA512

    a23bfb9fdeac6bfe2ef4057d7715879e2eece6ce563e5d0af9646197b81137190e63b387ccb3dd6b8456924d95859ffcc9518d039a15bf5347f0f6261fb1f572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e493538d9a518804e13b3327213ce37

    SHA1

    857058c1beecab64fe53e23a2b6c70841500bc29

    SHA256

    aa158d6faebba688effdb8732c8da6de2f2be3235e15d56f44ed36af0ce43f23

    SHA512

    5ff3d711ead1675b9bb3bae75f1b8eec8e8f6cc0d8038e23c244f22f83bd7c4e664851b464eacd02b94e8060144ce881203e7c3dc009e0d13a568d403eb156f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9703e0abd080400bbc15e1dd289bc874

    SHA1

    4abe8d89e73fcc8c2c14c4d84cf3f7657e50a53b

    SHA256

    2e5ae0dd7d596f4f4d7e82836093effb35a1ee696f6e865a2b7f3d3a840af51f

    SHA512

    2a7726c0ddc1028c993966601fb1290e0a46c71fd38d629a82d9d023729dde097cb35b4e1154ab9d69c99d3e7975429350c6f5f6d95c88b54a31ee6c536a60e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a879f759babaea62988111888b16f276

    SHA1

    8498040d959c686da4b16d4122f9bc03db102ea1

    SHA256

    c7d5496d15a5e9767437c47f6e19b978d3c3f63c9e69abbb9cfc67c2fda5f5e9

    SHA512

    6df44746913aeea30647ca3fefeb7ee46fd1bdf61b75c0f29b754eb2afcce7830f444b8f51dec598a10d039752272324c6e2189e259822d0cadbcdae01cbf483

  • C:\Users\Admin\AppData\Local\Temp\CabC2D5.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarC4CF.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf