Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    boom.xml

  • Size

    589B

  • MD5

    b4ef4359b2f85a6594ce804b36b96876

  • SHA1

    62deac4f0087d7e7486a5c725ae6588407c9f258

  • SHA256

    82dafe3ff2010e88478ffc68934006b9b6dcd6efc8d58d58d8e0f38adc35811e

  • SHA512

    8ddb0dcde339faca1cf95eff030b924e242f6b071f44deec4998c91e04d28b98de20c415070fc15b88fbcc36d04da1cd76259e3d9a448de6ff3e2b976d1dc699

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\boom.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0826ec0e1f23ac412de8f21abaf6dba

    SHA1

    db4d470fd07236fbcee12816d2529e4518613888

    SHA256

    4e7df1754e16735f454aeba736a74c7e68fc2efe3e7e328af45e8ca901bd8bc5

    SHA512

    33845ebb73aaba30f39f4adec02aa9a9dbcd13e77ff2fb64bed811dd2650cea15353e810e221e00a57b8b7c2487c3615164121dfa5c5a0d25c9636c84164ab1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e1d25262fec47eb8f7f596016bbade7

    SHA1

    02a54e1ee0a676037174e2733a442673b4f4d307

    SHA256

    1d1410cb1739ed21c4658dd7308af521bd8b0a413d0dfdd47a77090fadd14202

    SHA512

    4d65e6c247a6a16e5e903ec18f5c89247f7dc9b93e7214653fa6ec4157cba6185c78b1220a622e2b766db8d79f1be6a2ace64315a7ee35958580333e42f44d5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2712f6e4cca2189b74adbe390e2f67e2

    SHA1

    77f5a8f9d9cbf4df33924d6d7f622c0aa902e790

    SHA256

    e98610777c6da14d4a1766a39b7025c90c776937f727b635dcf63d40d396190a

    SHA512

    cb56316bd1051c7a57810b9c6b35564a59e227f32e05d9f5d4bf7a6794d0dc3cf85941b4f8263d5d1d54a6ab860810eeb86e7c426e111eae907738cc4a58d74e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3760e602ed90921f5993aacfd346ebbc

    SHA1

    ea5afb0ca109779e0459365d862269e79943ea46

    SHA256

    f43ea6c1a920ec14cfd278a390928eddd9f8e0447d391cf6f6da0de2ab6ae2dc

    SHA512

    7929116a6b5405d4a635ea5f1a0d95688f627d67a3e3069ea5577efd99a0cf8bedb91cb91fcb242a0565667d08288fd0b9957280e2b9491b0831d3a101aef82c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    923bdeb16801ac4300bc77adc9f42ca3

    SHA1

    fce3e0eacc905f2b9997a0d190aa3ce372afa815

    SHA256

    511d4102572adc09e041f716c9265f2ae05284c73a57c1c57e93db3acf043555

    SHA512

    623a3ac7a93e03032268738e7bff254611c3ba4bd4392f8d5717644439968c2ef5cae98729d8336d3b8a1bfb6f3ccc216b93b8b2966280d124179e39d1e28c25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e14971f8d90abdf7ee45580368e81564

    SHA1

    ea0155df9ae116911419f8db6baaa4e878f73f65

    SHA256

    c67b455de75b4bf410567128545094057922c2132ab07b67070460b10d30f0c2

    SHA512

    4ae72f68fb23327521ebe469b2daf2bc05ec6299abfc6c2876cd253fe9b3c207b6a409d57f12ec6a248bed78acdf8d82e93ebfd1975829e5d1dd750319c97681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1ef1f0d9419a003ac07be488232036f

    SHA1

    a080616eb717ed8c6c9cb58800d8659b025ca3d7

    SHA256

    39d6bb7cb5b0db90e7d2e2669894a69fb0a49b012d4561ca055297c7b75ca9a8

    SHA512

    8c6f3cd41e4b8958db13ff7925eac26ffc90d0ac76c09f3789fa5276d790a44260af38e8906345dbb1fca9626feddbc29d66640fd758f01aa2220972508aaeba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    629234e6fe40ac7a91a097d3a92436c0

    SHA1

    5264c14d58290419fb6dbe75ddbfcad16b3f2d0e

    SHA256

    6a99474bc1d5a3a409fc70b108335dd98b083772e3f3ca7e7adb15fa4dad9235

    SHA512

    e24393d6aad161bba705b94b8c49ebd9cae5a5d4cb83e40bb9ec2028c895c63bf5f50435b444dfb7fca9d408600b47117d089f20ad72c52d158313d57332c2ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    254df72c4e7ec979838116198cf50f38

    SHA1

    18943bc2adc6e9d5d154ce222f25728f9582e37d

    SHA256

    4908798652d78524dc80521cd6d8ff5e863955df95455fbd74db8c34d2d497aa

    SHA512

    27ccf2af2b5072c0058425f1837010a8f5da1d747b37d3f138ffa491a0afd65dd52fffacaddd9cea1bcf91bed2a327365562ff85506e4557601acc723c89da84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19fc161485674c4645e2487a16b7a634

    SHA1

    a6961b390c232490e2c5ea2b244e12ad7be8a9db

    SHA256

    d86c4c11ddc4f0c7b86c24c1e47039a73f7172f2a587faf0ec545a43ad99c96d

    SHA512

    ac8174fe5027f835918795a3c8ee582790eaf6cf4b091a5181a0220b83993756ec3dba3b640f9527ead77f1f23aed253bd7782d61e4ff7e1f9f63b5550081560

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d7d3ddcd4bceeb30b87825c42437dd2

    SHA1

    b170ac4f627f23bf14b91735503ea94904c52cc5

    SHA256

    2b02f79717b148071c15a2feb7364834be98dc3c7d3ee55bfd568260d0cee7f3

    SHA512

    9cffc30d974dcfe07d78c64278e5df8c14d5f817115e9ff884b5795c5d6f574603d07a17427baf673a6561a3feba4b0fb39b106097b4f6825af1653ccfe615a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c93175f62992b9b1f7904a1cecedbfe4

    SHA1

    bbf67404a7333df899937fbcfc77e1b4d8f3b856

    SHA256

    1dcf0dd44a57c4c3145789ce0b46897a73aac24deb8ba54eb47ae064d0974ac4

    SHA512

    8f30fad6d8cbbbd5c0fbad50f9966ffdb925a79e1280717224238521c1c5edbaf3168c255c4516b055b840c7a212ed4254161d4c637fa84eb1b4261dd5a9b32e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c212ced1c1d4aaaa273f797aaf7a7f09

    SHA1

    9051c1834cc0e55d6af7cc8a9e617eebc0bfc41a

    SHA256

    137f6f9afad9f5d361b1bb1f8e359b35c71d4fa0fc03702fbcdb9b1e8814823a

    SHA512

    28d17b1b129cb5fa250842c216eed0e672685341c5fb04a0b00413615ce20af2078efe2e01afbf811876d784c3ce2c53fcdb5eaf6359eedc12da8eea555b16f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e749602ab6f9b670d1e53da8862c2919

    SHA1

    2778f70b71dce3da0e847759ec4958c838cf9c5e

    SHA256

    e1f7e0d82818a692f9bcb0221520a63812bf2533693cd63230e6db681c1fe7b2

    SHA512

    68ecb494c9bdc5cc5559fee59476f0cff14753dc6d2007aa041746a54d27d1a55d9b45d63d3b1e65ad49b70eca692ec5651f67269898daefacccb1d9882516fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67c97da606c25adcecbb5161db74629e

    SHA1

    14dd8803f0e56f02588a4f14bdbb251b72daf0d8

    SHA256

    06d7baf98e0e1aeeec6dc9b748b7dec290bdadcc9959ec8472316c498510817f

    SHA512

    4c824f963d63730e55798a045aff3715ab98639fee272d7bf7a3dac57e3b70fd3df4b25c0131d02e48aec1450cd9388723f3aada58efd3e479d05e3db7dec966

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a188efb391ba97f3306c03c73903553b

    SHA1

    e68d66028810aa2fa2b75d3f0af5b46ee9cd2207

    SHA256

    be3c31aa0f7702b2ea45324907c432e94546a447c47bd451a35643006ece5784

    SHA512

    5435d11422325c93c465e64981f95f2018906e2560fd8e9a644282da6a058e520bf968d2aaf15fe812a33e44ae2ad8098c3d2c78c4917baad37471cd283fbed1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e815dae6b7d58d3ee928f45cd1fa372

    SHA1

    c684d0e4323b26731428b7e7bd90afae2a4778b2

    SHA256

    f8de604676d30878d0e32e072c7d5abc42a3469a1aa46a8375a0bbcbf59c4411

    SHA512

    e33eae177f818cf349452a6df7c161971e72a4e0f0e1241655d86c69f1f4b68de909085668b27e85b5fc6ac3154e717b879e26740f9f5ea4117e67ff1dadbf5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07a768bc857168a68a6672617d0a0eac

    SHA1

    689d853913f18d2a9b5d3e61a63e32ac4f63f38d

    SHA256

    2b24a5e64fefc3444c41d739b2acc6c137662eed2b1a35a2e05fb21dea9c486b

    SHA512

    7ddf00e25ee5f88d97b99a162bc00b6105fb19fcf56ea32b16da73752ffbfd8118b45f5d4feb335371a5f713c5d34b475ec72c414f2bea90a34dad5d0b500f1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3334c9d5091fcf67a0bec430a4947a5

    SHA1

    4265d9cf91ae5d659d5af7ac49f0ad7ad70e82a5

    SHA256

    f6c1c68546d63dc9864b7eb60af428ed858c97ee56113f027c2bc1c75ef1ded5

    SHA512

    3c2bf2cbd641f81de0192aa35e07c8933e603765e6a97c7856f55df250e022122a419876710c0b554cee112cf6a69de7b81d8f7361f1e6c4deafb7545dc06d21

  • C:\Users\Admin\AppData\Local\Temp\CabA43E.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA5AA.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf