Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 17:26

General

  • Target

    TGN X V6.0.6 - Microsoft Store/TGN EXPLOIT X.exe.xml

  • Size

    540B

  • MD5

    fd31729da79cf81ed97ded1abbcbf08f

  • SHA1

    3c89d16f02d7d97824c0360b6041cebe901da2f3

  • SHA256

    3dc4f51218236114607703cc128596fabd9c6a1dacc3dd5395abf6d7df18652d

  • SHA512

    1a38d14c464452ee3dd9a663a3ce51fc4b0bf930ab60fc78c8a17e68f7055f735b988a710fdc784a0ff97c1436b872e070a9c7b84a6536538e486d9eada847fa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\TGN X V6.0.6 - Microsoft Store\TGN EXPLOIT X.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32050768aaf5d271f91e22c69a6a7a23

    SHA1

    1e38e2b34be08eb90dd6f463c659ab4d905e97d7

    SHA256

    af0c62f99898a5ad5b7ebf70455af79e0e22882c3781c531e37485829b91ef40

    SHA512

    8b84fc757b5ef52b8edc237831ae8fa060c204b417dd52ee1ca11324ad0823faa976c10362a05173b2cb0c3ef070f3664a33d570a9364f1ad401c16e161f3945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d62e5aa55f6054a12304afd3cc02e488

    SHA1

    7fc44088c99d3b2258b9987c91a9d94196d23bdb

    SHA256

    66f312067e0efa081f4d6781a300deb0e2ce7b239ffc1c1fdeac43d7f94e6ddb

    SHA512

    fdb71c0a3ef0e9a8cd1b024a9a2169c626fe4cbafb6f85f4946ae3e621ff27def77e1aaa694b13c706633e451e7f18f3828b17ed856837430759152a9bbba422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09d9471098666ce443312eff7eb31764

    SHA1

    a7ede3cbb03aaea3988f4ccccc56368bc18454d2

    SHA256

    9cd1fc96fd78c670f59d4effee686e329d96f80f62722214fba0508b229f6d70

    SHA512

    723639fdf9a64babf023b1779fd0a8f475244d65f957d850bebc00654127c2a374e80879e9c7be728350b4a78859ca80d21f6b1f3d813584e54b57c5b0515b15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9882a2688fe64a5c43c1ad64dc75df6c

    SHA1

    ff3665979e3b64debe217e4b7e3615463a2c74e7

    SHA256

    db272348baee45b0932c36a87b541ef9be9dbb8197b9f582634594d96c23aae8

    SHA512

    7cf3981a66e889b90554da66c2c96ba30ca69b762224ee4a5193a4d3b35e2150f4b685914e962dc7fa0997b7343be33352987b399ac97eae5c87c51a3a2bf1d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffd1f8bfbe4678eedd2795025fb1de17

    SHA1

    c511aa17ef8729694d174892f2c19c1d1b93073c

    SHA256

    a6d418958b345b756f93920311699017d35ea803e1332f2a40dcebbfb47e4830

    SHA512

    c0f2795f3446d1d83ef7b2cdf13e5134cd9b9e83335d4deca833d2711a5fee6b9ff846ade1734248212b5afb7b91f022408b063c08b7425cd36f3354c984601e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a42854dad22a3d5b062faddaf872f975

    SHA1

    e6e5d3050da6c689918bc4f89a81c2607cc12882

    SHA256

    d54adc05d8fea0fce9293492f2111235f2f89ef8bd3925566dc2045e7d036a9c

    SHA512

    0abd4884f9b15e4ea3d3ea0a0b07f10eaa68a10becd91bd27584f286e178e0fe89da5f7d8c55fb3f591df053b562540cea94a27e70be777f490dab47a409eaea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30225122e9b570409875bc9f8a305731

    SHA1

    7507d52d09c4581e9138a189ea844f372c3363ad

    SHA256

    1903cba8654e0b95ad9ec2bb391b3bca15d2719a024805d39fdd8a18729b65cb

    SHA512

    0abe7e49dfb6a76d0d9bf1af9f99208a192775d8d7b7a338df4532d3a2fbae7929c7e82dda5fefdb0e2e8f881fc6d2b6abeb1bd3c38d84f4b2b98379736bc069

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8b62853c7063260bcc4e82950df5094

    SHA1

    ded5120a93503f134d0c9429138a605e0345c0b7

    SHA256

    4fbb679803572dbec977e938a9332b8c1472f8bcf23e0cd939d7c0d303f61403

    SHA512

    e4f0e2ba8e913e3857bb2f2f7a83434339662af882381d63c69274db2c5723ccb6a2c79fdb8968d19b51b19a2d3041fdd7f31c59c94dd8934627af3b1fa2ddb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a8e1787d06e2e7b19c7958db3e6f66e

    SHA1

    38e77e6204e59a9e1fafa6b4f34ef0abbbbd7292

    SHA256

    392439335c8e1a29c539e815a81fc1792ee9cd9e3ccc5e48eecccfabb80f52c1

    SHA512

    c7bf1ddca53b6890a879bb777d099cc41ee6cca01ad1f36ccc45dc99df8f54159c94b05a698290c338393a89e9edce212af7d48cc963b9be525bf16bad030f50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48089e86d0747312999406e16c04d703

    SHA1

    a2ec379d993590b89d97cb3cd09ed0cbb6fb9724

    SHA256

    088bd6f9f3d82fb24f92241a99a1df48eb45f5d062d0d3d2a8d377561180f5eb

    SHA512

    7701393473b798b54d435ea610682ba67295cb149785429075f3bf35fd909a2e1bf7b40fb9ff9398c77368cc01e298e0d0f1ae95ae25e57d3a3021aef0143ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b525d51600e5dfc66e57c8eee6da06cf

    SHA1

    f3006d4e206e7883b4453bf7ac6fee9f84d16ee8

    SHA256

    f25dd83d86b9ff2394f8674a0320c778dff6a57d186f1fcb0514e8f3f0c6c4e7

    SHA512

    7ad5b69ebba3de96cedd6fe8c5e4318e0fda30054f206f47dd4b040dcfa730b947573d3e1cfbf547d877ef7d806a7672d33556e00c0c8cf61cfb3b9eb33ed7fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fe563c3bbc6cf6a3c2d8cf5e39dd48b

    SHA1

    8e66535641d69d47d71afccc19b1611c82fd6c21

    SHA256

    eb237b8c73a1cb475732b15b3b17f335450dfc8d88822c1836bdf445ced90d74

    SHA512

    29ca1fc277e54bbaed5cdc70a8a0935b9165007571c6f6e9dac0df480f7f6723a632b573f059003123650e1544a19b7faccddd312de17939bc24dd4c2585c7c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ef670d46f8e4fabb4be5d0ae63d5429

    SHA1

    f7de80717cdefb722575e1a1eb26d694d92917ec

    SHA256

    401e451babcd05531e318043438272779c5239a874d06a56d54980e767d88bed

    SHA512

    8ac97c96958e1f1362071eacb1286268fb5100c6809976a8d7cb27114506d28ca0a490439b7c76b6644cbb04ec1c2a91e1ae680644f4177a5ca03ab13841fad3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7de4b207d45e8836cd6f1e219d511e8

    SHA1

    603886fbbd10b3015f132b37b95df0ac8551ca6a

    SHA256

    6f5bfe30384a83633e9b8d38842596a3ec7730ce0ad5d0178527028ef936b054

    SHA512

    ca225f708032570a44f816060dbdcffa601e96c66564a5f706f349771d343c8eade679194b5d475e2c3d2da1d1109085cc911164bb85bc9e15b09f7ea89e3c40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19b2653dba968277a84318ab5ff5dce5

    SHA1

    731f66ce24aad62c70aed9ed2d513e5ade48f8f5

    SHA256

    4dd66c49a52af7ffd6c65803cc3e9581ebfbd3e4da4eef50f7b17d8ca29608e4

    SHA512

    70915b222f5c40c76703146e7362080c7a0ae5c7439e065865584013aaa60b893a11b261883b03ee9363c84c52a8ab6b9c1b237f5d36b3e46370ac0a3f7a24ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d663a2ab9446d41fef380733ee081f81

    SHA1

    da968c5e0dce104a069aa616c1c35d38d92d45e1

    SHA256

    22fada72f9b95f0a1ea9d1125a233a1616ae105401b9a4d973db2752e47b9bd6

    SHA512

    77fad76e306c1dd0f55ccbd7fe4e1596667224ee23acc9eca254a092128fa91487ef706ee7aa3367792ccf51fbccd3b2c0b492dc447cafce4af6ba5ccd37c165

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c0d6949790ca8a4199951c2a53eefe9

    SHA1

    e037656a8772a202642f7c8f22d659b132849e83

    SHA256

    7dbd330835ec767744d0a947acef7f0783b2646d2ca4f504f58c63ea5d772b3e

    SHA512

    a4e8f259068596081121947bd8bb958eb7b958412138701e7e846b83f196b6cc6e64c387831b2ea312c61be2784e9abee30084b1d9c366e29b5f8d07ba93d066

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bc3aad679ca97cc752e857d42c8c0e6

    SHA1

    2b077c91109b1bef0d497ddaf79abfc1b6a5486f

    SHA256

    6ce22545c2a831ce552c07270bcca055fa766fb5b6ebd19e3d949cd64f41fe75

    SHA512

    599048a622b2a33ff35b963583759cc67883e7beb5cfb02a84f155abc175cc418a4e7d98de4b24e2c88a8af42b000e9506d6098623bfb2b51aa9bf13569e95fb

  • C:\Users\Admin\AppData\Local\Temp\Cab5ACF.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar5BAD.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf