Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 13:53

General

  • Target

    realmap.xml

  • Size

    222KB

  • MD5

    6aa4a73f18659bc6bb159272bbea21dc

  • SHA1

    63177847f23f92ff8b12d6beb28da137f5abe163

  • SHA256

    fcd3e6f43218c152cf687df9ccd70ae2d3ce49cff61a037d9f284247351e374a

  • SHA512

    bf7848364e397c88af7043413e581738b1c553fd0c32e054da9151235ddd9ec9a414a16ef3accf8ae112fa4d877a2f282bf3d0dda99d724769146f8199030286

  • SSDEEP

    1536:6y8sdA6mSgAsYY6sXK4WSVdv9Xxw3ldzq6Z9p0LsT5h7L4kPSPxEbd/YZFapbNZs:D9WBLFmT5fgs/PXS5Ep/YkbL8RDXFI8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\realmap.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed49b01e817cf80a5b887bce3c853198

    SHA1

    c28cc2950c71c16ba0e93ff9b8e280a6d271b9c5

    SHA256

    21bc2d0abea910abe60c0e7eac91964ad27b8903e5d14543ef3ee677562412ed

    SHA512

    5effca8a434b9c1ec4205fd522c80195635488e0c0c5eb0ddbd956dd5247e0ee8e6698d6f108a3cd599ce5b1cb6d4ed9d446da8eaaa47e7484649ddede02d696

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88d5397d09ffe8d540d538e1ed9cb5f9

    SHA1

    c2148e562d75521c3a6eadf1cae0dd552adfaece

    SHA256

    1bc1025e5014df223619875bb19e8aae06f3e59201937c1aa4939eeb240668dc

    SHA512

    c4a271ba99013e17f9b70e3a7b71c32b02b61d813762d0a6b7e230e9a6626182c5f7eef5139efaeb6489716a57c6d3d6ee93bf233fd71716014632a9c40efb6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c88dffc6a10160950371534ce57e8168

    SHA1

    bf8d10e6202b87d9443d02d36ea2d2b7637c52d3

    SHA256

    4e2faecea628c7de6e6380a445f188fb7477f60d768639b9e05cf3972342b077

    SHA512

    77f28ed76c693b8637a1276f7ea8a3adea5087affd3722774b5eb8de3439ae2d0b773ff8318a2ded884523d3af447c13c74ce8c02ab9b0ee32482cc4addfaed2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b709181098d24382128a17a44de8cb8

    SHA1

    d0869661546e227e9d887f6c8c2a69ecba095973

    SHA256

    2a5da2d17741fb9c2838af0d5c467f026cc37bd7d2377cc5586162a7063592e3

    SHA512

    7f0208b83336578638d5712846780c0d6da7510f1b8d0a1749c0e4e62cba2ebfba61265e91f2d7707d2801d437b46cdfa3438c5c41d950c4cf250e758c762294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    73e5c5625947c80e8e77314499278487

    SHA1

    0f8b2029688522094b48f77743b9430bb04bb072

    SHA256

    5abb9fd193412734ce4b67b51a0ca7df58f8972e6d15578ff22083deb59a62b7

    SHA512

    24ed92499240c357cbc4459dfc3274662488d1922d6c248e99467b3624d644aee157375b50b00ffc62c3e2f883d7b788f7de60ab7daeeb5e95eaf63a7448b170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8e28790a0143e2605ee154d64cf26f8

    SHA1

    6ff2ff4012308395d5ba6c85351e7429e319b320

    SHA256

    d76b4fa6ec362aeb45703747af6c208a63e1847ba29b63b895713663962e73b8

    SHA512

    47beb45b8f3fcda9acf8ec55838ac9f33c33aa64a3cd19ef8e3d3dfdf2bf3d9c3628913edb4d635f5ae236436aba45c28a2d687041263e53482f9b8359b6424f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60957a0ba39e100e1725a5252fe93e4c

    SHA1

    a93b4782139321449a9a7c897fc09666e63fe3fd

    SHA256

    3c253826e5793b94103b3fd62c25c0ab9598c776c0ec76661e2ab2d1e8502a9c

    SHA512

    f961ef88fa1995c9eefc27f54f69d95fbdec6c34748d0f0ec3d790ab83cbe90ada286b343d636074a594eb27070a3d76595c11b60a2e6af01b0dd69178286466

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1b69481eea918d80451984943c2d6f9

    SHA1

    78286b74dc7a6cd778cb7bd6027ff281dbb9f690

    SHA256

    a4cd0116a78b4d8ca828f5616791bfcbe211c71821998d1c77b533d7592c6cf6

    SHA512

    a9030e306bd57fc4619f819e0cfb725dd55e959aaa321216ee7fc5f72caf4da42207c52db6301ad5246c74ca9988b4ee4f317e7b5b84773001e090a5d3041777

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57a2cbcab7e5e0e527a8cce280fd3773

    SHA1

    060d6e7e8b7467ca6efb223b9300ed73a3457a33

    SHA256

    139b3d83f8c0278f74313357f6fcec231d301a64154a7ed2b4e4c74570fedb55

    SHA512

    798746b99a8040f2c824d66e5bceb1140dc5c5d1df7de5268a69558f9da3851f6434956d91785364f07fc01b84a9be930b2cb4789ca91dbdfab1ea82701ffb58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c68f4ddb0976a09748c68d52d9b7a3cb

    SHA1

    5e624317369c46c6ff051fbf940e8dd23fe9b2a0

    SHA256

    e09d52304fed8872af32cf011c12952676a2744f75466b1261d957e9227e370e

    SHA512

    35d9e88310339e3a28d0c8e36886f30fdb3e2a8558b68bf8b0d2b598157eeb3ef53fca9ef12f3a772437367bfc7ff1438614971af822365656d1625a0cef1655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    255a1c2313da43a2994f676e7cc533a6

    SHA1

    1c5ac6d4bdbdab4bfb7bb49313fb67fa101c2861

    SHA256

    dd3a1cbb6e510d7a0ef21428dfb4ee7d55c6f3d3579336137eb7fb940fb44e34

    SHA512

    c8c24c5a6dae68d8bd8641e7b753c4192793f2802a5d598595b244201ca2f2829805623788867f4583682f12c147438fb06352962da2b6ef8ac6f209b224dc63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3955440e93a6cbe02bd0aab34311c70e

    SHA1

    a30ba62109d72330a78162eec1a49b4b321d22c6

    SHA256

    f504f347c0f37ec67d52e1ceecf3ea3f9c3b44feb288cbbf8d56ce215ddd416d

    SHA512

    6ac83e3aa694802a7a01e27f90706f41cb60471c30863115a3c7f5a8444eb498f10d32ecc48f76a8e0bac588b8fcf6a8bac9359ad12cfc1700deb559c882a7b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    482d4382a3628b5ff05a3a993115ed84

    SHA1

    7cf7cc0979c5b5eeb2c6f5107e58048bf37ee835

    SHA256

    ff746b6e30f970c41c83eb6fbeccd9a19b6a33a5269810fab29205171cb4c342

    SHA512

    3a98efc292376220586d09ad60d65369cdd3cf86a84287f3f61c778bd470be88841f2226553ecc0e7d3091f808c79bcf0814a49fb58f372bca5b920906f36cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d52aae2e02b82e26d4e79e473b929321

    SHA1

    5b7c77ba699b88337d35eeb1c918891ae6795852

    SHA256

    b503271ec5dda0875e0fe5a15f65a89a26031a9530b2993bf4df8848f5d9f1c6

    SHA512

    0a6fc847864d92080493dd2e6beb4ac5d852757fdc6976e598a87c9f12aa56e4ffaee3cfb4312fb9c70f52292ee3d14138e6a499c65f29378a5d70db9c152387

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bc5d7dd8db468994d0ab08558fccfa4

    SHA1

    733b8962cac9a59178d9fa46c739158377d71353

    SHA256

    a7f239639a984bdae607acbe26081b8be60bb0c97ad8297ade3385e6045bd609

    SHA512

    f15bd7db42597f65035d981d9422d071db0965bfcacbe6149bd5a750bcf76497081b26bb172515b262f9066fb4624a5d9d2bb18c5b9a0dfd6334af453cbd8239

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a47f3caedc58a64eac1090d72186396

    SHA1

    34d7313dbc8bebc4dbcc39c5ab38c30d95be47da

    SHA256

    8ddc1efc2e3e34f3fb12f84cc704c6ea5b524be53f80780f4693896ce4d34d61

    SHA512

    9f6e7bb0cf602382f74a913336d6184cc7596e8df5fad528c9dc9fd4bc1f4a1e80ecb2ae92ce416b9286bea5dc59fb3ac9d87fb048f0c51439657c61aca1607d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5186ba17521b164479e02a3c5c319784

    SHA1

    476540fe4d11ab79c474ad82a2df0198d349f02c

    SHA256

    1c563ea50dff2027b5177dfe574127d09a32941eefff0e93958420e4fa4f76e1

    SHA512

    f4070d132cb99bd0394a4b39cabed804a225c3dcac99164eb35d80666941a1c9730dbd51114bb12e4e8b6c9b4e9f4b575a1d11cdf96aef11161c25dd79229a15

  • C:\Users\Admin\AppData\Local\Temp\Cab2C6F.tmp

    Filesize

    61KB

    MD5

    e56ec378251cd65923ad88c1e14d0b6e

    SHA1

    7f5d986e0a34dd81487f6439fb0446ffa52a712e

    SHA256

    32ccf567c07b62b6078cf03d097e21cbf7ef67a4ce312c9c34a47f865b3ad0a0

    SHA512

    2737a622ca45b532aebc202184b3e35cde8684e5296cb1f008e7831921be2895a43f952c1df88d33011a7b9586aafbd88483f6c134cb5e8e98c236f5abb5f3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2E5B.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf