Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    bird.xml

  • Size

    1KB

  • MD5

    564073fb36287299158db87208c3ef4b

  • SHA1

    d9ea8d3bbeee99b3acdc1fbd5f779d329783852c

  • SHA256

    888e1f6b188d57d2bb5c86656872193e2dc882672c67ac53a1c6828ee95f40b2

  • SHA512

    77ad8ceaa1784c765eb3ac3cd2d8da442d5bcaa8086e67de4baa929d020ffd90895fe61710f285d6668235188b9520203b86c986154815cf5de82b29c4b3ef1f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bird.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:792 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    86524ae78e930ea4b1837f6bf3b69339

    SHA1

    929bebfef86f3f2227e65746bfb550efb02658f9

    SHA256

    c6326530988bd5bd0b6a6bcec39e17348e16f20a9790d04dde0b4b7627b7113d

    SHA512

    230db15254891236f0206aec5ed8332e671991185b92739759de4497d7f12ff4c0680fad5d64c32d842ff6d382a6e628545f9642f6bdb1a4c4fb167958c1b87a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0270791b45c0534ff57c90d56a28392c

    SHA1

    5c8d108fed1a7aa65cc7938f0e824d5b534ebb97

    SHA256

    c484e0e90ac00453beb4fc6c6ee6627765bc3fb97adf3db82942efd74b38fbb6

    SHA512

    64ab09dc6581caa1d6a650d299e6b790c2f7e955db914cd17ccbdf6c22f052004d1458730c53eb5a30855420b23cbf9d5b2e1fa7396ccb749ffcab45070a4cdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1fad191874c54b88c23d3d8bfd07922a

    SHA1

    1baa2ce44eebbf0d98d1e7ed1de9c0a76b5800db

    SHA256

    0df5f84ebf1357c0c816b0a237ad775eca6f905d55db1d2c98498bb0733a201f

    SHA512

    822b10c96a2d458d62468786eb00874fa33b8edb5655e750537c6e95d8b7b08869bc127cd6282a0186393423d63dcce648759abb49417555923ccab9e815f05b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c96197e3af4245d6168b1f892caec8a2

    SHA1

    02117057c62b9b431ad3c7ee1cec1ee80ee4d159

    SHA256

    5bf404c2918f547870fd351e2a1844ff4f13709f68e2023cf02ffc7095ae1908

    SHA512

    db13c045bfaa7dbd5bcb4e5ed38508dc735af7b33afa6827ebc1187161d092633bc6898d70b04deefba6eadbbe1f1f56ed8f39234cd42156eef741f3eab22bd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    99bcc2bbcace8102cbb0524d93caad8a

    SHA1

    0efd9f6fbf2223c70496c2704b3ba121a41253b3

    SHA256

    f6fa8c581e0e3e1fba8b1365557171039a03a631512e3f9f024efc8f9dd8a1a3

    SHA512

    9d1b7f57b50f28ef019faaa77d822f9564a1d2ffad56743a13fedd5934a358aa4fb41b70148e419b033c7c0aa9c7a59ea5d1170bbbf581807ab73c0060b06032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b3a57ca1f2cf2c9f1c23bb5b73edf8e0

    SHA1

    7e8ce23295502f7dcdaf66ba0ef613bb645b8ba9

    SHA256

    be48cbd1fa50ada5c532e12dc14eb6c2e986638aa23dae7401fb8cb7e2e9208b

    SHA512

    b6403e84777c1eb51948f77ce26f73dd2d0210e91621cf6b4635b5626eeda712cc77cbbcc3a0a17bb7f24f6f745ccf766b285ac020ee714e863b8b6e69cb1612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    999bb8c896542a31ce246dde8ec00562

    SHA1

    b7ea574578c64859ffbecfe55d6a2b757d47bd98

    SHA256

    8d50234f136c6a2ca856b59275079f942d644937567f0ca5541a022b56960cf9

    SHA512

    ed6767193787e826395da814d35366914f8f8bdbbedd33bea0e8f8cb55d8d33f63c68322cec213f8f303303bdc16cb01023641d26a4cd9dc2a8f7ec0ca678e0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    32e8d26773de5ed893427fe58e2aff71

    SHA1

    da706073f8af0a759b064138102c9953df026619

    SHA256

    da23998ee5a0bcf1becc88a201274a62a67fda4dee80cdbbf6d9b0724fcb4610

    SHA512

    f5bfbd889149277e81d233599419e1239296d21af8b0231727c833571a7d8d572676d8b0d716b6c3bb0fc739673a601abba0b5280db9833000127009a6d64598

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5527edd497f4c672aabdd0acdd1c9778

    SHA1

    4aeda889d080e631eb75f2db60d59ab65410bb2b

    SHA256

    a64240497c80a0f79de248fc6298465f5a6bea8f27a29e690ef1d86e0d461c1b

    SHA512

    1dfb41315f532fe32fcec6e7c86ff397f841e47282480ed1430d0789c100badb3a10e30417bb628d831f07a7d3445c6cb12d7e81596ce7896735f0f036b24675

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    57e8db60997787993d41546e0bb67cec

    SHA1

    1a907ecb12ff65ce4a31ce088cdec7436bcee33b

    SHA256

    5db527f4b943bf5c7847a068a19bb8b4c8db5d60c847a015534a72f37b338178

    SHA512

    899345150746fa739679a2d6c90464bdec898acfbf06fe950d7050a993029bd580460d864c1738dbe64bee7b4bbebc22c87c4ece673c488f87d97c40629ce276

  • C:\Users\Admin\AppData\Local\Temp\TarE661.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf