Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 04:26

General

  • Target

    PTModelAnimation.0.connections.xml

  • Size

    2KB

  • MD5

    6e8ac425825788b9e0f1bbc5d8d47c65

  • SHA1

    3d0587cdc0d591bb412b376102111c97f7d18f7f

  • SHA256

    b2f55ad7f643246814834fae241dc099597c3fb48bbe01be0644019fa7ff3214

  • SHA512

    a2ca019c34115c12ff400272f28d89ff6b1f7dc5b11ad841d185e053badf9c4a7723cb9536a85ff46e92f771dac767665131da3eb88341ee7c0efba465b2a85d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\PTModelAnimation.0.connections.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df11581e4f5a759b89a9144d48221d5f

    SHA1

    367703e301606a4d3de32e870d4ede6611971c26

    SHA256

    bca77c68076643692491fc0f847758f088313a339864579fc9b20e33af6527df

    SHA512

    aa03663b0ed5199d53fe5d2e34b52077f18377ca3acaffaa7eaa29449c396a25914cf65258a70edd5ec08539019a3669b76b282c9c15cee9ec748f71979c2cf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56968063549dd8117ea145cd6bf75968

    SHA1

    05f11544903b0f7b3c13be9beac0187bb8f7933a

    SHA256

    18af04495131ffc598bb9d0daa3e55c30121dfcfc5898bc6af5d25bb8893e7da

    SHA512

    8dad2c010e51f7c8bbad7413e423c8c8ec546c0742ad2f25a508496e7ca46d370f5c220b2322441d4431f28fb015bb4ac02ab140e3b8811ba4d0c978d14d676c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b46ce241f5f903197af389ab1e2e538

    SHA1

    6c1be5c96302480fc66b58e8401a06c526b45e4a

    SHA256

    3200a904ed6dd1e66cafb0c42016f14c7f2c9c34960bffc345e5d79066f5138f

    SHA512

    34f74b1bbea75a1f0b3cd4d3f3b70415cea9ea3d7ca6a54e91b88a6932bd089d396803e495b5a52fcb43ef687e26a272147b114c29167cbaffffb43755b1b92f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d40f1bad5a6ee00c6a28e1f614b53a88

    SHA1

    f2a20f7bbb3c7794ac98f85828274142e940237d

    SHA256

    68ce8c08594f3224c9d7d8848c065d496b726350b586ff2bf8a6d7d0bee1d644

    SHA512

    5c0033954938a1c16f68e78f29c3eb17fe0da8e2c65160725a042a165f31038fc90c00171a105d1f27954614966f73fbdf33ead932fe1efb7070ab6401dd6fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e368c6a2ede73ec468683216701c13c6

    SHA1

    4312ea5cb1b0d08558a9a0f487091f7c85aaa35d

    SHA256

    d2e0df8ea15097c1e8c7ff75316ba344d6ee6a429c9dd761de862df3db3e0bf7

    SHA512

    416cb511a76033bddb410f87fc06b8105a4e3916b13aaedca0c62d589a483e5febb4e33bf153884c966f55e06e2c859e81e2a9c67a808d1ed98feee3b8ca7a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22e138a7e84ccecc3ce5a68c8291b579

    SHA1

    a0144b477ee1e2660ff8d2f2bd3e7b8d2fd38157

    SHA256

    84fadc7637741ade11da3718562ecec5b70c0db98f97fb3d1efac1b17bde4605

    SHA512

    2655693e09e69d0868b730cab20caacebf700d8eecf16d2a16aa545a41b0c97ab8e02cf0e88a7decc75c9edacd4795a4a8f6be03be51e7e56ab4b46bfa444374

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a7024058f313c6ce1906ac00306ff8b

    SHA1

    c87fed0498c66c1f6ede14ea284cb24e3da2fba3

    SHA256

    6e5bc2cdcbfea7de7dccb2f8168fd1a2d4b457e5300462a93e339ec4e7a3b3c4

    SHA512

    b6f9864c0b8adafb1ebb8b8b304fa56070f528dbb939e736ffd5c15d96dea882bf14d0c72210302561c376d0dafccf4562ac4eff323de5826d2f0cfc1d624de4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ccba9807c3b6b0a541105d6aa65f376

    SHA1

    c809ff1d23496f46e92a7fbc0d3d7914b30d7474

    SHA256

    31d307066a9e893987448c8b3568789679e494381cc378c94fd8c1b031f6cc3c

    SHA512

    e91cdd9a02839133cade480b0a89de2f8b0c6cc50786edfa4ba393a4de653cfe356ed7544ca0bc88a22341adb54edfabc4f702d35858b69cba1a021251eacabe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    deca58c041f9c6b525914ece566c64cc

    SHA1

    41c88fc1d5e431cc62ebd384670a305668c35f71

    SHA256

    57a825c42eb02688f14b1da9e3f72dd24371e2ff11ed0e64fbd2eb12d79c5906

    SHA512

    e0d123a88c07f7df2fc04dcabd042706b79dbfdd68cfce5c7ef0c74ac1e94d90c1461db1840c90908e1a0c6a083e1ec51b2e95c7f6f0e2506d8fed802fd208f0

  • C:\Users\Admin\AppData\Local\Temp\CabF163.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarF7A2.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf