Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2023 22:00

General

  • Target

    configuration.xml

  • Size

    360B

  • MD5

    1c742edf3beb1e4e9933feb3d8a9a2b2

  • SHA1

    02f221277aa3f3c51a9e4ce59156a5538f25d3d4

  • SHA256

    ece464e4c3843c48a840d24484a8930bc2ec7a8a6b71842a35d7de551a19ca73

  • SHA512

    a094ee17aac8ec3705b98135b5d7a6eb4eb1a8ef97b0d42c69e564aa7f98fdc9443d09710b4dc51f1b4bba3b1b76be055f2621bc81eded388a21df19d9941f89

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\configuration.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31e86cfa99b253e02da36d23c86c68ae

    SHA1

    4c97f90ed7f52167fb16b380a119f6becaf68c5c

    SHA256

    0ec6c96dfb1aa37978f35caec728d4bf764f8167a61c3618676c2cb9efc03f7b

    SHA512

    f92f1d88d764e45451232ebf1e72cf5ee9f0f6790656343dee35d9ce7ac6cdd318c717502c65dc054ac2956799c90dd601582c16dfc1440d5c3f908e7c1513ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4902e36b2cfcf1c41570b16b1886339

    SHA1

    8765a3d87090b63b0592ad830dc34e5e0c992f4d

    SHA256

    a7a00c811fe2d80ad4ec6ab13dc46bb9e227b14cf5c6e386ff4d14143f816938

    SHA512

    afef3231417de1417e1c1f5d74240bd0e8c601dd2608f4794fd7456ad68802def95c7cc5731291d578c3dc17d5cc46a543ce46416d81ba2a026f585d3a1e5d1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    031c9d4440cb437b81c175d6aba8d774

    SHA1

    26c2c833463854a580f885532b4ef1eadea0471b

    SHA256

    709c1f07cb833e3f1d25259f98ceb8dcae0e4e0a5becd7920307121cb0b37733

    SHA512

    46bf0b7492451ef910473295f4ebbf614b35cfd673c1ee4c65c0a55b38d29c498d02107932131bc9b0367f441f53a579351a9146f856f0134947d1b5d3025bfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d934428daaecf6f1fa2c8ed28db071d

    SHA1

    5fb6524e4a1ac7621122b76a643f3074381b9d16

    SHA256

    02602839021f14c0f64479e99208caca4f677a0ef6691fe02d5a41e85c7015d4

    SHA512

    54e799f3b822f8cf9f872ed7f6042323dd758ae433c78c5337157cc9a35a6efa922f4478b25a418f9ef6de35045369e1574f9da6d70ef1e860319a678b308964

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    373f19ff4ef9a4d4c7705cb3d8e68e85

    SHA1

    778b6ed8138e61774ddc39b5d8d3935e56dce831

    SHA256

    50ed05d11b9fc4c94466cfcbe3513f47487c7e95adb48a94ac49384146f4d38b

    SHA512

    1aa3a6f750637293b4e242935120f9984c3af4544880306cef708655e2cc3dedbe0412f2e070bbe4a1e46b456fca0fddf33fd8221060b54911935eb1a2673775

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8668848fedd0f96a3578d00773dd23da

    SHA1

    d9f61df8cdbcbadc8829223da4e7206a7e180a6a

    SHA256

    6ad53a8ee13adc46052efc37bd0c7c9449224e17594475c0620a64f295c0e152

    SHA512

    90ef693f52234a8eb56242bf1ce0c21a636959c086624576adf32f55c6240a3a21ef1e68c718ca3afc0b72c23cf8adf321019abb59aa8c28a83155cccbb0ff93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b172c745678887e344e470cacf51b2ef

    SHA1

    55ca70f5fac6b656d3b78b738119bc478d0f58f9

    SHA256

    b6c84fe18b42967e2076f7b453e7f8367c9892d077bf0844c31178c74e40d872

    SHA512

    96a3a8d9dfd00692b07e71cd5541a451bbc15896bd075b37c2a5fc1fbcca94ea64984ce67c1b912650b8f6d83fefc1d7adc18c4c6d82d27c7857b63ca652a81d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af88178be2b2437572e8596f30043896

    SHA1

    28a5502b61590afa6edfe5ee45c8a97d566791fc

    SHA256

    0cc4d31382bc23ec95e5110bb2f60558308aca467c932b2e783b9edaf669e5d2

    SHA512

    4682aaee13d95bdb5cd76f320e8d57c2a71a9158defee90787bdd0319660abbd37954a0f3fb05561637674a2d67e6f4f6795459a3e65edd21dd2646656db038f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38428c4b80da6564429af8cfdf64742b

    SHA1

    548014da8de08902784148a41916960cd2a34b49

    SHA256

    0a01e1aa75d842d6e211e8804378dbca8ad0d1985683855bdd66df441f8da7a1

    SHA512

    ec4c252133033f0784aefa6f3390ddc9637aaa4022a74bbcf83a1d4e28325d9e4bdacded3b6211a2080d41453c9417380b1c42cccbd962e465e0b3bb7af63d52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa734e6341b311a5c85787dc03a6beb7

    SHA1

    2c248b68a4648ed8c5ee1364f161f53a0d16c439

    SHA256

    a6a19c4548c9eae8774863cd48b77176e9b395801d1dae3fa67ce03ab7fd1a98

    SHA512

    7359cc9786a69bf4446bb0752b92ed57ecf47adc1555b6395960c7bef99f5d1c7efa43598eac0c2272862c4e3c5eac131a4778c606b3d6e6d1e30f72fbcd16a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e7dc792867af0fde33c3aeda5f3788b

    SHA1

    905fb17dea5c1e31c4b8b417c11a9ba3f2428bae

    SHA256

    83a2d83696cd124f0b114e35b8a2910d9706d6ac4cda9592c0c5814ff6793eae

    SHA512

    6a4bd5afe3a398eb74b1a39c147c6f08a25e11e22dbf3a26d0bc34ffc035a95ac38a5f9f7519983f2d1b443e34ee25548e182ad916d3b29efc9f248ccdbba183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5074538d08e6b98ed96ab8f50bbf884

    SHA1

    8cebd4f02fbe8f73fa5bd05d89ee958f8708d700

    SHA256

    107fd7dbfc1b56ec57e2deb8a07e425c6f49aea8ff16a71e0163f75e854a9c1d

    SHA512

    6e63773e57260e31b909f96994d5e2cdcecbcf17cf101676edbfe813d66e6e8a85a3e35f3252637a3c37290d91b8eb2e09d8c33816a3cc5c0504f609c37f186c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8369b8133c6659bc13e56d5c076ed32

    SHA1

    7aa936dcdd96568761fee8d4206c24270391b45e

    SHA256

    eb2da541e0d85be492c1d5f66c73f34ab13ce3383a7e210058daa38ce1866c88

    SHA512

    88916e2be07d5220f60a1b1ef5c83cf24619fbfed92dd65b2e3da352077ebf3af8c9442b4760aac9aa30d130257a7e0c33b4c71e10b5d63d3329038fcc139ba6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c101c16a808d604158c75eb377b2669

    SHA1

    806ba2c169c517a5bb1de981ea9f8cae529f4831

    SHA256

    61f9042fb51ff04abe6ceb05db366ee71f5064d3e178e60dab3c3371f2abd975

    SHA512

    425a396bff18baff6da097ad68bb72741713fa2c600f79f6990c81b92f42835e3df7274432e226d90c802aab2285931fee100cc19c978c3f159622d2ac837e50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    869858bcf358c542a79abf24a8b7da90

    SHA1

    481d10cd7eb2cbcc834309ed9454e1127e4a2734

    SHA256

    15f0f1bfe79673b80a16126f1d0ba25131de9900adc10d1b5e26a3d2226dc6b1

    SHA512

    fca4ec794bdaf46946d4ac879a21eba282548cb33a36967db571797362e50e9ea084edc1319391ea7b23ab57fca068b5a43973fb80851b5a45a5036f57670d7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7eb0ce09c2762a7ca6f5e545aa71313

    SHA1

    54c266f899d5687f20b97c500a215945a83462fd

    SHA256

    34f536a004e0eb86985ba1287bc17e8e75e573b881a6f8b44a0b9db9785fdf44

    SHA512

    11cb95746c37024d3b7d18145576fb9f78c65fce715e8e79cb9db4289252e1451303b9f674b7c6b776abb6492dbd42181d6963a4e63c4a033f9ce30784938672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1313026e5c81e9e94dfb35bb0aff935

    SHA1

    dc92b2497486f1af02b7a11d4e71370b948bc9e2

    SHA256

    ce206fe3988ad36164c00d3f1e33a5c5ad0dbe7de8b1b8c98d7282989d92dd40

    SHA512

    9e0718d274cf2b7f8f7872c6f18a388158f67ead674bb731a9f10656208b78904d3a5a7a679545ed607ff7253b79b0cfd06f4f62f34aeaedeee14e84fa236677

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b916387a16067955785aac45f73a0a25

    SHA1

    dd1db1e19525982d2d70fe1017662b314568e887

    SHA256

    87ebb6e61b5b1dc37dd4c7ea054cce5ba02869da593bf18fa3eb57b1eb33c7cf

    SHA512

    7a4ef0976a44a74b2a5c94c0c474d56adf18137b20ebed51ed5734c131c8d188dd67fd6c6e78cefd3a85b4abf04965c97e85250442b98b6fd00ad4818aaf3d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    774738648b21b164e760790c9a91c7f5

    SHA1

    265dea9a852369f8bf589ef5cd840c6e0314bbd5

    SHA256

    75807c63af5bfad0254df187321dc9fe7556ceae6d4924af6e095ed7489b52cf

    SHA512

    b9c3065d4ec01acb56d420c006a7c6b7c345f228c1c2e99aef41291755b8e439b6f2a8a589f3d9be5431a220cf9eaf8f5dc2be493cebb5330ae02960e0f03e64

  • C:\Users\Admin\AppData\Local\Temp\Cab56D9.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar57C7.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf