Analysis

  • max time kernel
    149s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2023 15:47

General

  • Target

    ionic-push-notification-android/android/app/build/generated/res/google-services/debug/values/values.xml

  • Size

    824B

  • MD5

    2b6b47dd1419aeb4d5faaeaa5c4085ae

  • SHA1

    76e5436117d78bf743006c412717d1bd583effc0

  • SHA256

    387021480296ad41612e53807a0bec5ef1493c0e4501eec321f2ea5d8fe74e6f

  • SHA512

    527ea8770419422627241221f3b7644411467ead9d62ddced1f7f04a9243f72daabcddfec8b836261859e71ce7d8d07d3b69666211de2999545bc4f15cc1088a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ionic-push-notification-android\android\app\build\generated\res\google-services\debug\values\values.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3bec1deebc1ab043569b6a7639334afc

    SHA1

    d4dab4d9a4d0d07ca64bd51fa62fb34f965a1ac8

    SHA256

    26717be240cea56767cc8ddcd8e8dc4b3305491f2a6e11cbe3609d0c8d05361d

    SHA512

    9b5324f707506b2d4ffe1386c74398766f20e107273ae64b6f673105d665f9b9c64b6e4f5c1cbb4dd13e4fd9aaf0dfb143f9f8963c965848a957d72209cd2080

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    75ab3527c038792815f014b1163884c0

    SHA1

    2abbe6178aca43f967d4974d154d7e84b93c4ec0

    SHA256

    f9a9f1a967473c9dea50ae63ca4721e4b1db5d454520ca06929d8900ba359f34

    SHA512

    839220c15d3cbf2777cfb43377bcae448a96c5f5fc263b24880097def6271b6c229af904deece43ca7274e2b9bbfb9ed1db52f3c16b14783c06db5fc94a1c57b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e0e1eef4a0ecf6e8b89e5f9d1cd00bc1

    SHA1

    fce7e41154c51f44b78b548c6c81f45c323f5e7f

    SHA256

    781aea080bc1daf6bf2fb06fbc40ca1a8b672832f6dab87783886482780ba2d0

    SHA512

    c9c3883b8ee1a2b3f814cc7cb5b9617a28caa2de0ec2d9914a8a3480d59f999ea2049f263e20e446b0bc5a2108d8f4f7c73fc6fd269134b90659565c436dcc83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e0e1eef4a0ecf6e8b89e5f9d1cd00bc1

    SHA1

    fce7e41154c51f44b78b548c6c81f45c323f5e7f

    SHA256

    781aea080bc1daf6bf2fb06fbc40ca1a8b672832f6dab87783886482780ba2d0

    SHA512

    c9c3883b8ee1a2b3f814cc7cb5b9617a28caa2de0ec2d9914a8a3480d59f999ea2049f263e20e446b0bc5a2108d8f4f7c73fc6fd269134b90659565c436dcc83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4a47b27af31e56d7c02de08b21524869

    SHA1

    9c550381d74474884c8e939cf0a33b9ab3e5d323

    SHA256

    f673c1c472a819831b3f305229fd945e4661b83b18fca0d1b28e8fecc9923749

    SHA512

    b6d6182e98d753ca332916bd43cb2ea9c293b4f95dd40beefbf1930ff9f5db6a4eb9ebbd146cdafdfdeae9383beb07c362197b8f240bebee0c765e34fb96f609

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8c2d035c4fbc3bda6c58a7c9b8e78240

    SHA1

    ddbabc00eb204fcc5e426534402c7e595a7a3689

    SHA256

    75ab181c64b7f1a5c42cb86b6b70b9141ddb986715f80137468d1339305d33fb

    SHA512

    1077334762e2ec704eec2d27b715e3a1ae4fc5ee2d05d7e560a604e2e0152feadf8517cdfa7d4147c4b701be8f053abe656a1f02dcd061bf721c968f58205348

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    acf91ac9254c18691ed2603d832cf3e5

    SHA1

    06c366f52a628c701ed1e1899702bd38a33a2f2a

    SHA256

    53a45eac050074a02c21306da3e270bc2c99959e435a906de33a7ead0a8231a8

    SHA512

    4e9f5f4ed9c7dc6b1e0cf40e2dd3fed26822bbe390acf8678940fa165e9130b7ccfeb6638799035145e59751f940e6fd2ce1c9ba203c358b9a8591b74ff1b7b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    90fa18c328ce39c0a66eee071ce5606a

    SHA1

    4e723774f92e9ff51f076207f12c1258711bc0eb

    SHA256

    c3bb5aee09838442210a4f7474e85a00ae3d3008c27e5b33d9bfa811f0e45300

    SHA512

    14ff9b42cacd7b855f9a6e1a68bfe4049a32bb76325ec73e914773d43c4fa431526fd4a7619dc6748a7a2013ebaaa06859b34c6a01cf09cdeb564b0846c74799

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    794062b96e739aabdb4d365726e600ff

    SHA1

    6bcc86061e780ece4eb40e2aec99493b878e3e7b

    SHA256

    644a0869257c05eea2c845d8faea57ee355bf6497c39617d4f05a395f83e0e42

    SHA512

    ecb12033075a29e19bd3bff705e7e6a1362f40f668d9986241ea539ebd54493f167c793d696170e1ac5fc6147e019353faaf46dc6db9671a7fc957d769a1f169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    20f3612f5551ebfa0531fc2d4d23269c

    SHA1

    b34aac2de3fe9625f5d08434a447afad4cbb13d2

    SHA256

    9f537c0541a963a2e3918833a597010f3ab51b42734af18f02dd1cb318788ef0

    SHA512

    eebf156b4562c92cde89f1e436eb873a808c76dd35fd55c747b71eedbfd424bb2053ae510235fce07b08aaf1e5bb87b7fb6992ceb1dfbc50ebc6d89558fa4e91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    eb11ed5a1fb0cc3630fe2ebe6dbd4baf

    SHA1

    4ab9a2243ac4653d6ac16e1e1469250ba7eda5af

    SHA256

    683f8a38495d985a24f7bf9d989651e9787f43624f3aae12e6deaaf2ce9be8c5

    SHA512

    42546b5486ab0a6cc238a9ad184b483e09ded35efa4e2ba3f1b108969338aa3b83a965ccd2e6587e2e32735ebfb1a5843cf4abdffbd0054323a4115b1ed78913

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ee3f5b05e25ee8d2f489f47e135535a4

    SHA1

    d735668358f12c63221875e0e3a8c9772e8e2a87

    SHA256

    91e7e05df116718b6bbbd3b190e5ebdcece16e106a16d84da95af73872a329e9

    SHA512

    df88a1323772136a7f9b269579fea19fd7537ae29ab788411b62d618f2348e18e0424ba02068143488d02719ad55c564a14586ece1f37ced61dd250b2e1de6c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c549979f0606cf4ed681013cd821e86b

    SHA1

    ebcf250dd13a6552ae624795f10c5017cd04a513

    SHA256

    453b5e46c682bd89e2535c02e06c453d4506db985b35d8ee64cde8d3cd98f6e7

    SHA512

    55cdcde7165160c2f0eb1e008b1435ac389fd1e2b81d498850044950ddc578dd03b68c8090717c269388774eb13ac07eb561ea42d44b730b0bcca1dafb03302e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c09f057ff2af10013ed11f9b30de86b6

    SHA1

    454e7c34cb35b810ea125f33f07efbebf328e276

    SHA256

    9081716dd632d9cf4e02290c33ef998a5da45d98747a2527c26f1071fe11f292

    SHA512

    af14d9d38a2182be2d0cded40a6c0ca026483ed98aa5266189c8aba98ef8eff14e6adc4358cbb3b5a293bd5cd187778858fc72c8041916b3aca6fc83afcb425c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4f5af93fe0f06e0c1030b95307afb054

    SHA1

    69b204bfc133551227b53b4101ce0cea6dbd35d4

    SHA256

    4bebc05d4c1541f0362e3c7b77821bd560827029108d6e81787907546cca7937

    SHA512

    586c434ae8f6a68d4017ecce2173f3032e8250fe4c59b2b367cefb0b7cfda12f22e6edb3f460422cde7071190713e33d5f85b849f4719338c3a8943db05b21b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3bec1deebc1ab043569b6a7639334afc

    SHA1

    d4dab4d9a4d0d07ca64bd51fa62fb34f965a1ac8

    SHA256

    26717be240cea56767cc8ddcd8e8dc4b3305491f2a6e11cbe3609d0c8d05361d

    SHA512

    9b5324f707506b2d4ffe1386c74398766f20e107273ae64b6f673105d665f9b9c64b6e4f5c1cbb4dd13e4fd9aaf0dfb143f9f8963c965848a957d72209cd2080

  • C:\Users\Admin\AppData\Local\Temp\Cab18C1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar1942.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf