Analysis

  • max time kernel
    135s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    bear.xml

  • Size

    2KB

  • MD5

    a3b81d60e065ed84bf23746ff5dd6b39

  • SHA1

    7420fe1744bcc51399be1efc8331d6a808335243

  • SHA256

    7bd2c80b5ed3cbf4a70706e9a07f68eb9be108cfb3046caa02362455d0896096

  • SHA512

    56987ee2776451b55eb99b13fc0981f65e824fcc61852e1a5e481e4e94c4509e058337718960640e6caa52c6a1c5db28b6a14ae5c356abae57689a6b6221f750

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bear.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63ef7c7eb13e438cf6914506a41907f0

    SHA1

    f6b0a351a22d823e7fc72aa74e966b610ccb9b68

    SHA256

    2b654606f7dd843779b28e95783b2929e6c8756f3130f2d758dac8b4cdddb7f8

    SHA512

    6ac0b2135f3a904b360bb46e6042f0eeb2d49a0ce7489374ae72c77f323d36e3d0a3ba99c26740cc7e22573c96d3c491f5618fa6f50a83d87c2190dc62d44df9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26ab4447c9fcbd6db1d9720c3d525d4d

    SHA1

    4e17c74c2d24dd0e22d8755a66cf1789d54ca50f

    SHA256

    549cef2ca33333cad78121c8cad7ffc820f74965c961c4ea3a537ac9e358c1b4

    SHA512

    a065677e6b9e669b9521bcc381c1d1ce3b7cc9925fd39143b413e85bb95f811b04bd85fab5c6c824cea149bc9e69c9dbe86487b4a97b9806bab80ce62f7c4af6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee68a1f11599cc2fa87f2de78a51c37e

    SHA1

    a7fed74460654518d64a9065a4512e834ef43ad1

    SHA256

    7582909fabde0b465082266f344f2199f8dde8b1d1ff3e4b329638d3f3d8617e

    SHA512

    6dd38c431ac2ed828f4feb6294221b81a32ce021523a23cbf51879a46f959a0c047691715a3de7da8053eaa60f07415b4517d9e5dae183586ba79dc8ebda5e54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c56a6100849dd5200c3bf43848284411

    SHA1

    35191829f06c9d952e0d28a254c7f882a1a5ec43

    SHA256

    e10f306aa9e8f27620d05a17ce2c53464b8d82a297b1e1054f4e0f70bd923e66

    SHA512

    a49bfeb2b748fd4c93f5274e2c66528bbfa299824e85bbb6dba056ae5f2a9a5cbafcf2b2c540f9f1b5899603e5f06f2c5d8a66e3b2520a15c84372f040ba7aaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf58c2c2281c4e9a2112f7176f19788d

    SHA1

    b2a4f667ff101ded743e3571a13075073b8b461a

    SHA256

    d63afcd201915c78ca4425874b9746114202c69941e360d30555d3ecd507b4b9

    SHA512

    e6ce96b5c29fbd331b5174a0632bcb618df6039738c6db0171804308bf33f68e97b04d257fb450019e55c1f2aa8ecb5d394f6d3a48bd4d3358b15f0e88844218

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64f6b5e3b33990e9fa8897a0b96de903

    SHA1

    ffcb02f540d775e28cd9eba7d090c2b208125579

    SHA256

    8b84f6b824f516550aa4599d28daa2f49868fb18b216cc9f5e75d32948765f21

    SHA512

    49a68924234c207c3ee755a31db8fb88aa01d30fad0d6665eb20458103cc9ca5e5b309ff4b868665f045018509dbdd883781c4c1d95ae7596f0b283a0a86426a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    651d55c73f1b9ee58a92f19af034f56b

    SHA1

    8458caa326c5a0d07cfa9dec0a34df5309a988b7

    SHA256

    217867f6f411d53262b3da1c9a591e225ed9b4a825ab7b3aa0f54c0528d4dbe8

    SHA512

    91a4618d825e5ba533ef162e41cb8ba4488e0a0c648ea9b5544fe50d0202859671f96802df1d7e3d65a9514beabfcc117c5366803a8e14c2e58ea791452fd5c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    002b0c351e7b1f9467e9ddf3f7b7b2d7

    SHA1

    8bce6400b600e9c963a4386c6134d6299424c761

    SHA256

    7ad07d8af68b0de9aa62f804c79ee792cb8e7ae8ca7e547da6a6bccdc54e4cd8

    SHA512

    8b3c3556136d81ac3c1eb358d34d8398c8c1ac636febb6f0549fc4318d66cc3f69f5a2cc405fb937d278100bfe86ee6aa042a226ae2289c6258b43db117d4dd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8795455e1381e51be33f5883bb2dc4bb

    SHA1

    c14422dc2f907a00f78fcf8bc08c8540943e880a

    SHA256

    c067bc4efb92ff929fac40138e01d5fecad101816f3b040a53d2ad7edcc59458

    SHA512

    a4ba726eba2fa1a6f50280031600f3bf0dfb8d53ef7244cc59b5b6626b8a40ab9946381a864b6ec0bf945be084220b59e4979ef58f3c6eb45a33678e8d3cb809

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54b03e8aa582616627a4cb2bcf56dd9f

    SHA1

    f78d297bf1b596cf444cb94ee8ab1f1f873f46d0

    SHA256

    c17241d0f9a21802bb0acf13189add1c1109e4147f1b8f2e115f3b51d19dcd37

    SHA512

    829e39987049acd51b1065c9e3c4343ac35df2d1a12fbc2b99c2ebb0f88852afe6d5160b0492988d441a34ebcd46af0609a038488426fb7fc3ada40f77dbb769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d6027d1f156ee92769a8787455e961a

    SHA1

    92d8eb85d0c411778ef1442028c2d66f70691c89

    SHA256

    ac0288af36c0520dd0295d6ae9b5a5a53ce68074c93c092c8bac4adf198d7f5a

    SHA512

    ae25bd06f5b1ae065ac21c98a2c846963a266db4a232975721a6929e7fc5e8f30b1440a2ad135ba070aff71966e6c8a8aa3f746a68b3c1e4ddc1f9703983f175

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    caa049c5a2e42f3f7aa92777b28e8110

    SHA1

    45c3211294da77e6252c06913ec77e488358276e

    SHA256

    38e55f8516dde50363c7c9af46df21c68ea023cce714bef85037e5856c334b63

    SHA512

    bddc85af2751b769c04d5360b2008b2d00750239d3b19f9cebdcc69d6c910a42be0b0fb41bdf96b6d02cfec9d0f1c9ca6f956b795b085ca751d6c822e10dc174

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d774a2c4795545c52c2d22a3002a24da

    SHA1

    166760b045195a29278ee7d399c2af8d4e0d396d

    SHA256

    7d7b97557bc6c385116a1c8a03b85347c176d2f42ba7a0a340b0fb7433e853a1

    SHA512

    43b5931b2ddbb1ae92b45537e41fb15f6128733828b52a329e40a0a50aad211c8ce9575af2c208ef9bb596833b7a825fe5c6b9f3ff93a79fd2926be4b3b561a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6ff0f1f57890b0cf1c9af0426a70581

    SHA1

    5500b4070553b821162e74bd4c8bbdab7f5f4f69

    SHA256

    970b50ad9329c5d7ff4e6a7bd2c9f8c35d0292e3eceb7a3b286ad813e4ec83f9

    SHA512

    969934610890ec7c429251d93f52e214ed3b5de8c1d72161b63f9026bbd6be4ea13c8d7f7c69f340e3b2bd2b0c1d2ac98a00328a86e807e1a2ccdcb9c337392d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2de8690c539ea812ab0d44cb0d934901

    SHA1

    fddb036819cd0231e57097ad71f54ebf9c9a076e

    SHA256

    59651572ac91215664ba7d2692babe587bba8cf5f7b003862ba9c68433566bea

    SHA512

    e40d6a3d981045e9f67bb937828e2f7461a8363d80df56e8f108a62cd027c17bfce36d90881fd72533526c14f910e7fc0909990542c1c54dc6d02f0ab60ddf6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da3dc1d91075a13d4ffb1d859fb47e89

    SHA1

    d57e44da1c5e1046f472f324b9bae9604bc2c48d

    SHA256

    2f9a3cb05142050c10263f094f94ea661396e1eecf35e8b42ebbb5d4263ccefa

    SHA512

    08d33d2735b42dd7b135935211552c31b3eebcd617305e2d22012aa477d458f0b3afa1e3567bc96aaee58486a617f8bc814d52fb26c9f278768a868b1a1957b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09311675363769c5efed26f8664db8e3

    SHA1

    af688ecf52d277c39718d038add8d1b009205f0f

    SHA256

    c3de5962cb26d5dc2c0f43de7a88adc0964a0e426917873402861f10646fbfe5

    SHA512

    3f10826f5ad5f7c48ea7a37dae9c69569a1e1e51711620679106ccdf4571d3ee53dffdf3a8dec1c8bac634bd4bd9f30dd67a0a4d9228c25cf7c76318fb6ba7f6

  • C:\Users\Admin\AppData\Local\Temp\Cab92FE.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar94CD.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf