Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2023 16:01

General

  • Target

    Templates/Schemas/SchemaDoctoXML/DTE_v10.xml

  • Size

    227KB

  • MD5

    99698c6701e170558d641ce32c8068db

  • SHA1

    b375c216832e1746dfd4bb29b2371a791898bbc6

  • SHA256

    7ce52bf95354489f52ce48bebde9c70f3e16a575e2524caa13699dbaf3f5093e

  • SHA512

    1f746c053881ef2e58fc3f066d49c8c5e29bf1f76f4771cfb7068c76c2e9c801a337a924a7240e1cbbbc42fe92a72aca4d96486a7980640cea68ec3a12af7bd3

  • SSDEEP

    3072:3LuRMZhM4KVlH04tytiOoHr5oC8n1uq5oVmThObx49Vp7THmQGGqSCPuAJcbs89/:j

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Templates\Schemas\SchemaDoctoXML\DTE_v10.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39fe27beb25e25466584e8f0e41164e0

    SHA1

    ce0bf405929dfdd4ca7865406bc1bf3068ae896b

    SHA256

    0c8e55efced83a076c754a212961d2988fb987b60b5c90f689a498e5d16f68ae

    SHA512

    aab25e764695b2d97ee647da108e53756cb54d2d158893e84b83919ced49cd7de9814409a0ec33c15454b44584f9b184a54becf3d73ce3d5120ccab7b3a5ff3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c0d7346b28c2c33c95423ce05b61c1e

    SHA1

    5a0fca49d315b2a449f6406d33b273c862ecb77e

    SHA256

    dda6b9ef4c4f1c3e4bde07939296da7c536d1da3ebf959e77e63c82f556fa267

    SHA512

    05a06e739b3a17f1b994206c42023681ac4b2d44cf2d834ce32f917cad1366eb2fcfb7a3a0f4812b17dd197d0aa15cefc7f3839ef9f9e7283adfea3c7376633e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7084677ed6c4315805d71f1dce1d50fb

    SHA1

    8ce1c513984ca02c7c38702950f4d4829563b95a

    SHA256

    0455264743c9a1ed99591ffbfbdd2e497be21e50a762849f2bedce2d30f078ae

    SHA512

    864e2ad06ec7e6685591c5bdf8a4290f1a6e07e1be2299a8bfaeb6d9c3a058447269743ae6eecf873dca2aed4747ecbb61639ed03da41017951969af079599c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87c4127e7ef962387a44b4bd273f96e7

    SHA1

    352fe64d5d96236d332e44a16f249e99262b22da

    SHA256

    c237c216e5164ea29e3aa7f25337759b341e1894ba950ed5992ef24d82a920b1

    SHA512

    15bd71525794c3b7d79414b12cae01617dcf6186dcc891da6b63d53bac2c3101f3d49c39289f3b3ac8e298915056e1e50c20a16a0f26b186affd99d2d61636e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2457f1cab03391d4afda8910f47509f

    SHA1

    41f5f608fc71ea070224c0b51387f4fc360b226a

    SHA256

    1b44f160a27bb469553eddd99b8d24cf9b89a76461395acbc22774b834509e7d

    SHA512

    5c9179287a494971339b50d8495a29533a91adae97c39b5fbea182e26944fa34317d8c33344f5f552a8da2f3c67b4db728ccbfd42d597a0dad554a3aeca9669a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb39bf1d4322327bc395bc40cf765a61

    SHA1

    876be080cb3199bbd76e3ac32dbf7b58ac2b1fb9

    SHA256

    d8e391bdb364a1f8f3728b81376a2c050eb380245774176670b0166bddffc7b5

    SHA512

    3d9b05679b3239b0fb5b5dbd6525fd63b5a3c71280005e611b94d57bebaeafd3e9961cc8f45872cba04692ecd726913d9401db5c0e21b94881184d774414b6df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f961df78bf55a19856dbe95c0644c1d2

    SHA1

    225f905fb43f6297fe56605cbcca1e4493e8ce6d

    SHA256

    725f4c3046a08d4804edeee79bb7154c6939319533c333585e0bd345fb7f7ce2

    SHA512

    7ab6761caf61bd3423e6d37baef96d141035bbfe9fb2056b9456d662bd06d6dc4f148bb50878ba6c36c6d86c0e6ec26cd9434e8f2c6f01f58e8e9d72906e84b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fb71717e5273a912a17b9dbfd5cce88

    SHA1

    44939a9a265ec4d352acea270100d0ec1e4d5054

    SHA256

    1ca35fda36adbcf10b3d97e3b558e8f33a0cdc55b323052b0425d6f9bf2e40c8

    SHA512

    bd08e56f43aa40b697ff64af354d507054557d60e93e9624a9dc9667fae2b6c1abb9dfc16a9c23d161a32e91ef97605e4994a86ce292cd14b6ae17fee24c42e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63ad859203d2550d6bd264765a8cd9d4

    SHA1

    7fb74ed20d89a72984953c636e696933e6ec8bfc

    SHA256

    68a4df172dd9a7164038ff48ffba0df25716b2081dcfbfa5e54cfad6a86b2bf2

    SHA512

    64510d1ca6fb995425e5ae10b983a3194d7233a21d0ae6409bfd541e3879b725465aa5bcff356d5bdfacac2c1913e8e2377e9cf53243aeb2cb76a2858bbac319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dca7c5a989b23cba385edac116a555f0

    SHA1

    2b74276d3066d4e4334e08f4b43bffb4f8e5d00f

    SHA256

    f020d5b10b1e27fd6dca408cab5e4a6483f95ec863e675ce70b4455392fea684

    SHA512

    4d97e4fa5fd3cd0e10b2ea000a6b525ee43da1a9955e80c57062746b9a8c2fe22b33d1fd4fc38f509d11c15fdbf2dcb49dc6765e7522d4b4061b7af286f44278

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b7a32da3c14559880b9b7c3760978e1

    SHA1

    6860c3bfbbdf041c0e75745006a2e4e61f958fe1

    SHA256

    7156e2111b39328f25b66f5e55682ef3fe7efc8b356361bcd1074170f11913ce

    SHA512

    858937e6bc38f0728387ad552d012ded1294bd367a614b1830b7407c9e544bdf096f677bdb8db594b0efe386f543a70b876780abc2039496bdf7c56363253f35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1703b2499cd021864b652383d890129

    SHA1

    c87ba063df46e812b8f840dd4a5576c4baa5d719

    SHA256

    b9127d8f83f0788bb2c90d64e000480c94d7447f964bdab7d7267deef883587c

    SHA512

    452159506a77b73ab849bf3054129b3c21e60a3cfb4fe4eddd51683851542a7885216693bd476048d2d48b94a643fa9395ae0bbf0e05154e6a1169ee7608b66c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ee945742e06abc47c3791b16ebd78de

    SHA1

    c34b8e55ec748ce0d5c96a3ed740a3de8d199f28

    SHA256

    18aa85888a1e38ca2da7acbb96edc3067d9e05b1ec1457e3d6e244f45988057d

    SHA512

    931640ed7706f8beb50b9fd1cc1522e1d4a37abc77ce0de5713c517d8bb1ee6adec94c88bf6c45eecc142c43eccb9a9784399c13307bd63df1532a0c66f1fc24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6828c36c7a1483b114c356fdb2a8f37

    SHA1

    490e1a344fa09fdada59cfd42f5969cb326e9549

    SHA256

    d9dc8935fa29a39320356df37cf6347ce97572545c58b2473355e0adca8882e4

    SHA512

    bb0746477722cf3384a186cf47aef2557c840c3f45a5f0f2c5ef411664271c511696f434adad243427e60443cce2e486d6ba8c573bbddeacfad61d3b80db2e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40a198a6f2bf063f14b93886f21014c6

    SHA1

    cf287cd8cb8dcf19018cd4cd70bcee5836c0bbff

    SHA256

    afc8275a6631f32db64dc377545d64f1254c810abae7712408d61fee619a64d8

    SHA512

    009048dfbc03f14032ca44a4e19402df66e3b75c019cc99d03979f2456348b642c60a6582d472073951bf95b35f3106023a7e470cea29be3a6c01bc7b2689f8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    388608419db82cd395714f31c3c95ac0

    SHA1

    f4fedfa85e2889cc71cec98a013fe50e82e71b59

    SHA256

    ba6aa6e9a9eec7a5b93bf9a69ffc47b308f487ffb5b49266c3fb1cc74f6c667e

    SHA512

    7c833657ba0e41ea3115cb657a78395161375af389fabf9a2c1983a1e445385882ed5dcf2dc1954bffe8593395df341f68137e3fe56251fd601a7c4b9478af87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9efd0a181102243a826e6ffca006e718

    SHA1

    ecd42e6d511d1e32af357d1f026187cd21ab7b1a

    SHA256

    8635babab7f968cb42113967553ae11dafa43c6470da834ef2e6deb32e80daf2

    SHA512

    7d90202013a97a38ddc06973cd29cbe93e675218d28873b2c0a80d0385aa149c5aa072fb945244e1bc3cddedeff329a7a13581d7a77e7e2598e4ddceaec0c7c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8686d2bbac93cad9b8fe614adc01548

    SHA1

    d89dd7d43e86ff324abb3db23d399b2143ee0e65

    SHA256

    3d73bff8c3e25d4dd454095b1b76d028c2e07b04e1728f73128b6b068740f568

    SHA512

    d7d5e00f1549434413dc1279062f816ae3f6df5c10332bab438fccbfc0de82ea36d337bd4c584620f3dd8ca7e3d1e7026df26ff18121f86d7119d00615be60a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a85ecc89ac65b59d4bdf52353abf6f37

    SHA1

    0308d2cd709d41f582bbd7738eaa1e52d02b69a3

    SHA256

    207237f669d429609d5b8e6f6916745a81c7f1a6c4fec4f0b33f9ece68a2548a

    SHA512

    9d3b4eb648c15cfa8b786d531f3667497346020853153e898b2b2bd0bb13ec410bc5247ce7877a7ee0e3072764692abb53e2dc8b4ae02b3df0e72f3b0415092f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2eb772764d311c0eec764cea40ec01ec

    SHA1

    5c110dbed2822d8b54b8192189920fdc20da96ef

    SHA256

    d14f38ce1a5fd73b7a658a2079b257c6acbdcd8a255ebc784dfed454f4e408b3

    SHA512

    b9d9c4f31789e0bb177802a478b2821ae9b97abf80646526e04db7975948670f0846990f95aca8787ce1fe9214293e739e50b2b1909faff07fbff5cec576a8d2

  • C:\Users\Admin\AppData\Local\Temp\Cab9A6E.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar9B1D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf