Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 17:26

General

  • Target

    TGN X V6.0.6 - Microsoft Store/bin/syntax.xml

  • Size

    3KB

  • MD5

    06c3876d77733fb64b8ec472afc77133

  • SHA1

    10404820f6f7b1b3eba8be8ed11ce3873cdc1199

  • SHA256

    4fe8128712ef9160e233ce05034046e90fba572a75f253853d8c21c8b1207a9c

  • SHA512

    f7f76edd231772118152d3d6a3c2b0668adac4055057d5989cc17da9b15f76695a86debfe327ca149819b5478e89cb9f0ce51fd70753e5e4cd2eb4cc0e42a691

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\TGN X V6.0.6 - Microsoft Store\bin\syntax.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a9bf8553f9b78b5b4b34f8ad707796f

    SHA1

    91f09f5161e85295b5d976fde8a88a64fabb0aae

    SHA256

    081cc49fdb3c5a86e99a1993e3cb2cc0b5db38f89a67ebb8cce6d32b6cc9fb58

    SHA512

    d289ceeeff94772e591d4995c6a55a5f8cf3b97e13ac419ff9a0df8ec10fb1613c6ece0121932c636f11ecc4a03ef415414b88742701d28dbc47291d79b299c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35d258b45c76368d06b8a6b08cd95937

    SHA1

    01b2e6e590ce60a8758d9793f2ba389c0f8369ca

    SHA256

    2733ec74736876b02cea82336e718af2f04a32c7166c5bffa0ccc5c29265c243

    SHA512

    7b1a831277a75fd30fb712c8391f843f800331a68ab877f04ab6a6f19d953fe9ff35a3a573c54252ceb8bbaafed0be418fcfd7612697093ec367a77a4dcbbde1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b94c04ddf45b23fa1d53bacadea35926

    SHA1

    278ea5141a04ed8bbe0d2efeaab4a5b6426ccf52

    SHA256

    8c45771b63bf8bdbee1012b397f2557b2f25c224158aed3ec0e776899e1ed630

    SHA512

    4c7d0ca87a7fb2eb7177d4b320f2d26375cbbf4742f6bb259ec5a9721a6fa2884930cd519e903312b5ae8221127a6e4f3f5ea03f547ccb32d76ee83bea90d4a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48c3f33b0000e7ff9173b708d8357a40

    SHA1

    4fe799905142b1ba8a18c66cb0d59e2bababf06b

    SHA256

    c8a97a82c1897b2340988c2dabd0f153221b1e278ad91a9dd59d68ee4176250c

    SHA512

    4865e26a50ef1d70530156d9f34eefd5b964ec402881266b891a48e294f5367a224297bdb414e8087d496d73df307ba052e578bed291e3ee4f92b06be51791f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    997310187e96e44ecda9feb367e25b78

    SHA1

    7ce2bbc15b06b3bd19e560388f1f1f4b567f6cdc

    SHA256

    0265aa4001f88165c27d4cd35b0297e44581e5df288a485aa4fc1bd3de07226b

    SHA512

    a48f5580f780e590c3d212b880f4b983f564a15fb68d14783c1b56ef36b0dc6fe125c86cdda6680d8f7bae184c46cc899871657752c30d96a75aca884e58ad8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89477427a443f82747d1426fdd1a311c

    SHA1

    8ddaa5268a6cf80204cdab8142755f41eb9801fb

    SHA256

    b93bb08068ca4f2d3a26620161e2d88b46d1487df8d5f018b3b9de766cc94429

    SHA512

    4fabcd0fae4c5372e2207d733995ded9fd44cecf0c3518766f8847a10009e05098daa07aadb1c99c0aecdd04a35bc1a634de3cf229850bc51939a2d4c3916d80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07f7733c927f76802fd2ead2270c4bcd

    SHA1

    edaac27eba5579b2056131a1284d22d5e9556799

    SHA256

    565a61b28fbdc653470542f64e4fde2595b17d203426276aac5ba99c15f27de9

    SHA512

    b3bab98779761693b0a9de0bd6671f1df44f508910e5f82b02a38ceb5173906e9090afeb5db267479b4f988d87afa5c59e6614e2ca047fbc544a8eb081591449

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a072764a95a0bc30338d0ca672d3050

    SHA1

    c7b17ee3860a1ae8d36af2ea17f50df435746ec6

    SHA256

    79762bef04eed2e72670b9525d87af88607b4d261ffa8916edc071d2f01eab93

    SHA512

    7e39e6025fa18f01715d3c496b1906214d61329bd6952b0281663eaeb770efccb8d415053da255c8f112ae689385a7b92b36ff4c7f0d2f21332d0603b4197117

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    421bf884209f5482ce8a279cce8dcf11

    SHA1

    4c5919560db88deae18a1fce6707aa52967fc3d8

    SHA256

    a2fbc9828174b28019663236cd3270ecd27cb46f0eb6e69db0ebb5a62dd367ef

    SHA512

    62b677f903204d49887c8ce9bf1e899148b4aca57566585a4065c6a5245b90e873ba783c0ea6ca3bf12fab26456d47b3841d1720b45e56921fc76cd57d3c4b20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ad65e4669e26112d842e0611baddbed

    SHA1

    8e54d54e123d6a2b12b04271e19c9e18da01886f

    SHA256

    166bbf27047801fc4777c2e3ad8d2f1c98a4b5e210e97f8bdde8020e8102e78c

    SHA512

    e4079953f7a1929bfa9a4dcc35ad8cfc5e5973ff65239530ec4045a9945d80fd93ed1eafedb40f381627ff535c16f466fdd29d685796d11a356181fef3dbc5d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f81301970a9b0b095da649ed085aa93

    SHA1

    8f0b38a7337a7a959270d0148ce099265bf67b73

    SHA256

    1f6753e0756847149d3d154d997b4110f00d01d50d4ee9fb6a86342517d32bf8

    SHA512

    1b00165008df8c7c1acd6f1f650950b19571a90d8ffb9729c1eee939a920bfa8fe4d5c11efc5d3d895db946f9cdf54205bdce7817e30514f981720119cac7659

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    864980f38e8eabfe8102e910100fbed1

    SHA1

    ec96aada2385acccff27cf1e11619afc87d6cdae

    SHA256

    4e09cbd73e2c9bfac352f707d694737e12434c98ba7d63f40822bd7baeae7bc8

    SHA512

    a2b532482abced92a54c02d5b08a1fea22b29f532d782ea98d524ca106edaa9425194cbeeab158bed33f974789daf77b76569ad5cce05213b6ec6511bc4661f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5096e21a4bc5c93371f6e428b3653b9

    SHA1

    8add06065a6153533234b7ce17cdb977ba87f918

    SHA256

    5ce5e7dae72e5d1a1393539a6613fe16a2ac9284203312a1ed883a6e891b4eb3

    SHA512

    b711919e6be9b67b1630618ab029107653571d7a2218364857cd8f68c2c2a80bc48b8a8150db48bbcf11a55ec8f976d0e818cf5c772f2b62a053cf0076ffceb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44b038082402295906824d14ee9f3e3f

    SHA1

    e86f00b184c4fd8e7a9008c1e45bd36b01eb417d

    SHA256

    e38c58bbbc6382abc96c98a635bafa62823c7c0d999439e299cbc3683e1ecdd0

    SHA512

    aad36e2bb342be7a769d9cc46bd7a464dc5ab7c8fc20458dcf26ee07211b578ccb06eeead6f1dd8557b4770ebceee7485c9b7fe620e335992576a44cf72026aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    310421d51003021db4d7761980ae5ac4

    SHA1

    b06bc0c14a421a01e188e89e7cd5a169ae627b8e

    SHA256

    75a98a87246138261f0c9271dd5830b4e99c63a3de78b218822e29c1fd562cdf

    SHA512

    a29f66e5aec82db96cd0a75f710d6ec2d8ea01a68039e16d18979b3161927391165d5ac607285d319bd03c28145f6e861eac597018b2db2bde7de17e917d76bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5d454b7268a34cbc0af49f2f4f17573

    SHA1

    d9bc75b2ee283e5233e44b4e054e46466996d3a4

    SHA256

    1f0395b4f72d6c504edae306c35501193406ad81f98a24205bfa88b3615c5f81

    SHA512

    c915b37cab839d91aeb496ce7ba7f342c012ce5cfd1ec49f770296400404698532fd2cc7cbf78aa5d9fcd2b218e4713b283da0ade3df01a30fc5710d7ef7e4fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    542c9f00841f933c4fc311357dd0d459

    SHA1

    61a7251b7941bc3ba964ab3071cf0c76ab3b2a5c

    SHA256

    bb18c9b4623c7ce4ac32b0abef19420eeb4e23d7355bded81127f4bf62389c77

    SHA512

    23dab23ed455c8a4fc5e9715916f2e41e4104ecb60e5718249c7617dd33ed1ef396b567beeb6dccb1c6522be3ac5dc3fd5ff0b1552f67b4f58b4b7d98b5e99d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    026bfd01812f83fe34dd8fe3aecd7762

    SHA1

    9cb8a3056646f778e3547c0233edc911d313b8dc

    SHA256

    ab1a7b665476b3a40a0588b3e29ee6ac3a41c8f24ee3a3b43f8fb7e89e98f36c

    SHA512

    6fda502efb395704a6f6d1a2d1cf275fe1787a2e5eada5676086b17b209e5b4de0e697d7ebdd7d2c654f310e3b0f258e2af13fa05ec13306b175fecbc38034e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83c97cc1cb55c3e307d7bc1e9bba12e8

    SHA1

    6fc42ded4cf956e2157991acbb43bc181eff5169

    SHA256

    f41079a8468af9c55a0dedc5a71d8194b0fba652d3b4d39401070fbaf6a8a9f3

    SHA512

    e4855bb4efb1da50cf99a89f5a98ea0b20ec776916ff2f5551976e8138cf174e2f212593a04823b765e674db873a42eebc4065ec19a09dfb056af417cd4c7e59

  • C:\Users\Admin\AppData\Local\Temp\Cab5F43.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar5FF1.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf