Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 04:26

General

  • Target

    PTModelAtlas.0.connections.xml

  • Size

    1KB

  • MD5

    2316daac9e41103c9a67b2439f0d0d63

  • SHA1

    fd013aa4d14270911bfd20a54b513cd975981a15

  • SHA256

    0bb74b9cfbe599afd5f9c8d11d8a13b0f112b0a5098f4a07c443c13ab637656c

  • SHA512

    dcd6cc39de7fe42b8d8b0836b9ded21f1c4a5c8a93a33a5c65bfbf0c5f9a1474ae5a8e65d28e0bc192df9986134f54acd88ed65196ba91afa96c9f0a5112393c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\PTModelAtlas.0.connections.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3e53d7c4108c5346f51ccadcc466958

    SHA1

    6f631dc00e6ec4c99d0594f349d633289fb9b98c

    SHA256

    0e3bf8b2ad345275cf11cae0192b88a4a60fddf60c2acc7f7ce74e95c6f24870

    SHA512

    e0d1039c8e82e40829a1e32eb5d545bc670a741e6205193be2ebd9fbd4b59561100f6b8e50f92d1fb8a750f1f608736329acc23e04b82cbd24e6ce1ea3cd1270

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92ca88947083fe41da8194cd81c61836

    SHA1

    bad02361408ce84c17f10d9dbfd6b6a4177df60c

    SHA256

    900180b77482e989e66bda2560c6d25b9e5323f0f4a188794935ad844df9c188

    SHA512

    948314375424f67473b492d385cc869f4089df975832e6ce5a9d32d843dccbf78e0a88005ea0aad8bf7ba0e2b331e6da0c5b2bea5b4fce3d8151f012cecbc3ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34f44cc2ce977d133f07d99b680ee1b0

    SHA1

    aec28a6852295b47c08d094d7913f6036c4045f8

    SHA256

    6472fe99defe2df5ddc7c9661878929979fc84e72e5064961162ead874334b45

    SHA512

    848b1469524d2361c87e84ff50c6862dbe43bd5d81f17f45ecc4645856c702f2043018c371c676a3b4407468c2faddf1d3a5e12da9602067a046472333351f73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88410e1571e1d597520a712c8acdeee0

    SHA1

    3b6e892eed9a4bf5181101200a041f69f13dee3f

    SHA256

    48d3e5c0621b25c55cc519df770def5c389186620a5dfb0b5b1308c6d1a68d91

    SHA512

    2b66888c5119e946661248070ed9f78ac4db22ca7d2561abdacf50dcf8a6f3a9d9d884e3ad10ab93bf0eb2637e64f481609b293d9b1fb22934355488d6d34a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    342cebd5355a298902eaac8026340e43

    SHA1

    65429e2aca4923265e7389d503c3a374611b8fa0

    SHA256

    c086a9befeafb68148a45e6b6dd87b7bd6bf2a1ba2c5ab1bcd76d578baac5e7e

    SHA512

    8781289af23e4b381d8c7e914886516a3b04e2c6d8978239d342976beb91409bd05043f147005552b38108af49727ddca8a5c28d9d88b81d6222ec06e2301939

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7bfca5a5126540b14878f16e6e88413f

    SHA1

    2dbecbdd2e19abeedc1c8586e8d59ce14ef3b729

    SHA256

    95aaf269a316bdb87b8c7abf80ad05a5aa97b1ca17d882c7aaa07616102ec3f0

    SHA512

    8e7a7a9ea9ee5062ac572da5419d94fee22496a97ab78c15002c71b93f015f0b8f185993338590bf364c66b206cfb27bf074ee4a517f8efa4bba243fc5e7ffc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eaebc73b83db79cddc2428db75abb46d

    SHA1

    18af8950759de96b673c2f3face8525e7a6fb3ba

    SHA256

    233af28be3af1b311ca3986a88566e1272e8ec0b32070ab6196597883722dd03

    SHA512

    1ebb567ce8217ca01732c2a2eb98b76f4498edfe3faed9ca5fec6115fd094bec64eaf9104331a6bf4c2ac95cfa927b390341b6bcaa1e9949e66f138deb407f4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78bad9b747fb22624a78d7bd090c46d5

    SHA1

    71d8d16ecaf492dd2f4598bf029ecb6a623a9a31

    SHA256

    632ba204e0e57d409dc1ff83680827ec26f427a223a82398b0c30fe0c5cdc656

    SHA512

    82b0c2b34efbf8b4829204a16cc12f1a78aa6b447091c8cc73a94e96bc7842a4208fa32604dfb7e20ea9527675ff285eaf6d6beedb86660cb4f9dd14038a41ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a45c418a528c1fb3405b3f13d4898c8b

    SHA1

    19d4fa53301f8ae25224c9d5ef1517f533de9268

    SHA256

    3b37bea4a0272156901e8117e8fd58e2e34b25bd4b2ae95a59942285d06b3e9c

    SHA512

    94eb80389653ab56c2d99a2a464a3c3c57853987f65f15ff2ce3cb8819dc5a6590aafda4c4951f827d3d16e4fcb6372d3543ab3e1a59da9cf015b62843d7691f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af0e99279e302ff14c4cebc529c7939a

    SHA1

    e383ed28651be0a1e088d17b556de421c9019828

    SHA256

    e1363974a2dfe307b48d4f8bb29995e14b922f4fcb927a9c7c5dbf4aed621f09

    SHA512

    ce57c294d22c5d412545a72589bc54c017823779bd4c7b932f687978e5d7134ba864eae2d11041a95aa9494b8f406860021d259ccf1f09f7ebadbc07e81f34cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    930de30164280729c2d4ceaad46a1cdf

    SHA1

    8a80df564e03879e453eaf1dce4fa6b2fa674e79

    SHA256

    cf25ed71d67dedce03bd4dfdf432d368e30420ea443bf7024cb12b35dd3d31a7

    SHA512

    8aad9328ea38b94d86b66082f0d205919371ab25f64773f39b87134ab9e4c7b344b4a7ddece5a76eb4a7022433c6580efadc02058e1533188a2c9861ee03ad29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e9f4b8a1e2cdf169cf4ebec2d3265d8

    SHA1

    3291e1b9fa08131170a8a987cea1b8740c4d9b7d

    SHA256

    56a496d225b3a3542cc141a8c9264396e3efb7c9eed27fc7ae3f014fa94d3838

    SHA512

    f68d403f6a41a0e542d07b55a44c4a977c6afeee91596bdc75fda04908447881e17e617aef0df36e4d1b1777e4ede62a625595c975019a28a23c5ec4c2ac1443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dd57f075ce5db1e8195d2755db3c492

    SHA1

    518bb97c86058ecedb2a4cc8662dbae99364c90c

    SHA256

    12b96f843ef9f121635fdf5a3c2618b28800d8b53f6aa3d6e0e63838b6fa06f3

    SHA512

    8367c7d5f16937479fc4c22dca47e4f475c072b9a9a060d3f64899444527a4c74b91aa134378764088b3edc6a3346959fed80642e0aeb180d243572b988b48d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bf3b7fb69ad22196e40af4f87f804dc

    SHA1

    5c871f68f103baa14c29daa97dcea0bedd4bad57

    SHA256

    2d46d1c340d148fc842e3841017e3f41f793c6e9735b361331f56d6cd4875088

    SHA512

    ca1bfd1f65299b319954512292b1d5a8bb8ed11ff09861610e78778682db2d43cd8e671a437d98288ccfdaa9a3455c5af2615cdd5fe12ceaab26bf44f7565845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1b9e3843e61d4f88e6780086456bd91

    SHA1

    e5c4ba2d385e617f81904550676b160eb93f4334

    SHA256

    f622681eb381741b7c0122e54d48c79a35fa7cd43aba2f8925ca27936c331eeb

    SHA512

    c00f108f4becddcf2a072f3588f3eafe75d0c77497ab56c2218ec593c593a24771336a077fa10ca11c57460a30f11b1aec38134defb071b1be9b9a4854cd93e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    483da9b1d02f6c109899af9f80af223b

    SHA1

    8a1e3c2f8ae5bec5049200ec7e567c023b6822e3

    SHA256

    921e13784ccd6b70194b94a98cbe57ba49be803f8d68767d115076387b3d58a9

    SHA512

    d1a840b6354722483a109c5e242176cd0618f8f9cd04326185b990b50dc10ca9e9748b66416142a695cf805fa5bb68fd393324d4c2b90c485407ac8c07b96f69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3e6ba357e0bca131d5a8192394a5949

    SHA1

    ad5103fc3724e9cc8a1e9bc4d4d906de4af00bb4

    SHA256

    e9a3cb27ea25d1b591c7a86ee6ddaff0e3d067b1801357a540b2605b5ddad58e

    SHA512

    52b3da57bcfdfc6a8adaa3304e3169d5752322f6eeaee68adcb32381b6ba2e4c6460c099fdf05f1d78bdd4d166c25b330bdebd4fdb692a19247e0ed0c91499da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd9a2d92f3bb21f5569a0e2d4cf68490

    SHA1

    7e32aaa9c042c774109d2523a5ecdaf6148beb17

    SHA256

    6aee830b724da706c44155baea12fbb3ee33c5b3291fdc3f50150298476c1b41

    SHA512

    84b8f0fd6aa165bf890aaf7c83962be405ce3b6aff8b1e2cdb4f536dd493717a1bcbb24a8b0ec120249655e1a368ae9bf7dc2bab99dddf2489fa61470f949ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a182d647f914aa93ddc53d171507ede

    SHA1

    c94ce28e97f655f7c996d77962a7852d3ff84ee5

    SHA256

    a9fd822767bb45e78a3d5ec5b7e39ac51eee9e381fce01ccec58e2f87aba5744

    SHA512

    8f73c73192c00bbfc39481fae2daa85e7f6cb601baa0afa4637e47496969fd920080e8194b6c99c13cb99027c42d830c1c185a888f013b3450138c3701374c46

  • C:\Users\Admin\AppData\Local\Temp\CabA3FE.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA4D1.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf