Analysis

  • max time kernel
    197s
  • max time network
    227s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 16:54

General

  • Target

    word/webSettings.xml

  • Size

    14KB

  • MD5

    9753d3dd5908d03780976e9cdc226eea

  • SHA1

    058e8770c5557b8b6cfd28fc54462ec1c0b16e73

  • SHA256

    3a759be3223c8a6be0aecf77b734a84f913f204415dabbe19fb463140caff320

  • SHA512

    9adf3578664bd81756cc2928d14f1a766fc2284b4974c36dff0ed0fdc30be87aedd957db3c3c503bbab2c12d1967adcde8ca81bdb01f4342ffd7b4e2bd2491cd

  • SSDEEP

    48:cU41mNYmS+B1+6+T+y4+B+P+NDUuBTUxDUuBTtDUuBTJyUuBlgAUuBTHDUuBFqDb:e1mmmSwH2O8Q0L4Jh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\webSettings.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25b3e6a1f5edd9c2f40ed21c368e3f39

    SHA1

    8268cb533c402e13c4816e5b241fd7a8633b1c27

    SHA256

    ddec5c00f8152119781ed39f218d2f3d8fab91bb14fa20edfcfe5d0d38e1368f

    SHA512

    bbb5050b90e99bee2c6e8b855d90d996a98d15619cfee3a2e2366cb9b0e3c85fc4634ab26342b0cb4e8b3fab1c4d7c0d9692679c3bb9d4ec38f8d10a67993a15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26f7235faa9b6434ea513a4af094dc6e

    SHA1

    b7e85d249bbb26515fa09cc534743326c0e5fecd

    SHA256

    b131f9f19591b8e78fecd47dbdd6ebca55ec3da51e7289cc7d6565912fcae274

    SHA512

    ca137f3d6c769b6c27eaf226717b8e1f9423e27d4933b546f89dd24bcc522bae1499ca96453c4711b6ce20b98fd78364de28602d5e9fdecb8141303d8820e8d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34ed6e70792204b94aae08d004fce058

    SHA1

    e7ee7745686a293cc81ccb8587555d4196b2a8ce

    SHA256

    df711688b4a65b634feb7edfc22758733c201dda3ec1a1cd4695f42699961c23

    SHA512

    f84fbba2bae292024cc6b78c3cb7f67e886f30b438f0659888a413969d8dd8ecd9f5972c7ed221c4224ac4689041e8495d9f2ea13259e912dea791f4e8d37aaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d1b58933905af320c70dcbe2d75e4b6

    SHA1

    fd794334dd3d1cf214d645d4cdd375a0994fc61b

    SHA256

    f51d860372085a697bb9545a473393897e2c1fb6674150d36fa1132589987ddb

    SHA512

    bea6149d2565167d2949540e08e0d03253cfeafece5f543b0a4aa47849fbe0b20162dec98ec6e26aacb6789b01ba5dbeed8e68157fce7bcf89102542f092a515

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b29213a95d768178d7979a10f8e4beaf

    SHA1

    e450cd12f69fb79c333a1df4572c83f57e4ed0c2

    SHA256

    b7397bb838446f15de42be7f2ad475febe164260021af3ad3449757a0c7c95a2

    SHA512

    a4f88a319482c8f242f48f2d8a8e98b202bd7f55d41d7101957e6244d19b2cb59c8d6466dadfe260b0506d6d6d31a030ef6e68d916c70feed5333af260939146

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abe237c828877f42377b9ec8ec796ed3

    SHA1

    df3cbc7abe64d4f6d63671460beb0bffd971514f

    SHA256

    0637b184f0ce5fae55054c1e5ccd241dffd6cad8af003efd899b7cc52098af1f

    SHA512

    6e60371c008724cd081ca72360866ae59640e84bb966724127735a416ce095a903c2616b7cbbbf0976206d471b972a403b437ab612b4b6bd89f445826282ed49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d35a3a700c74493bdaba09f1475c02c6

    SHA1

    a930475f8fae5f706b0832590072df8004146e0d

    SHA256

    3175688ed4f13f5e54ac4c712466fc1585cb91554c0b12e7597cc1a7c39562dc

    SHA512

    3b26e6ac33688d3cf04e99986e93ea55de5a1532fd0a03f3a7cba9bc291e54b7b62ffdc6db98a36d41034127536bb41db5c88bb50530dca2c5856c823a668d60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    093360c992361c70546a222c73d6110c

    SHA1

    b15ee1f66e9520522e53cda929bc59bea6ed82ec

    SHA256

    6e4978d815ce20da83cbcdd2cda99c247bacbec5d63d37ed376c398d46105120

    SHA512

    1717da91ceb36080752675509584791b415db084385d695cf220e0b0b4d0eddb4f7eb51d874d446f01bbede70211d9cb655ee5d42aad521ee8e44d8f9df9e8ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc5c789bc4464ac97104077c81d74a09

    SHA1

    c79a8dbccbd2baf3dbc8918df31efa65761849cf

    SHA256

    4f2538a9a41d22786af71257964c96a02a04eb1f94430e387f9392f780eeb1fa

    SHA512

    3728f305e15cb645553a95c347149cf0290d7123eb11c1f0183d8a46427ad83eb1d026e4626523ee4f30da9204bb655080471c47f5b7f405914a9a1cb2322034

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34fbb75a019340c7afca1116442fccbf

    SHA1

    2e2d5af1c21842db4dbd90ec6fc5012256b1d081

    SHA256

    204d5a859087bbfc61a7508e88ee38a5d8f42f4c9e683dd05aca9a74662b073c

    SHA512

    c93ab6cf369b6557fd00db60ca79694726113b78db63df00a4845c66db18ea37f9739f22f5fbfda22ba28bb07592adb889422f8cd3c758cc98410c7b255629cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63fa7816a4f21ac2ffe7b4d5686d5351

    SHA1

    096fd1bed5bfb0b7d45acc02d935104e61918b90

    SHA256

    cc1ee54b2c0cd541313125f14e56c1316b868fd46d97fa09036093c20d742b61

    SHA512

    50bed0bac1993b110694613cd79f66da1ea3f25e4e180733b665b1e6f6c3250ae8cf4773e0bf482d607f77f08283424cd21d3a6b6388204312a153579ef8a275

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f47a96e21cebcf78c64dde00df436bb

    SHA1

    188164e774e4798930584ef9e93179a04642f522

    SHA256

    09cd46503e48e7fd4b90cefe042c14e1d6bee480dee575809210c5b9c16c78da

    SHA512

    1d50edae4dd82a6030cc110a12a95a02b90f1ed03f49000092db25a678977b0ef1163f5168cd7e04e2bb6bb5fa053b421e8f40fa7713d5dad7dd48a7374c12d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    55183d31a92cb19515a407615fed46a6

    SHA1

    3db7d6e56b927ab4b1bb49d8f523d2ce01d62ec1

    SHA256

    2db3efdcdc9bec7ccc2491797f75aa38e3351515cedf6a15a4e592afcbc0956f

    SHA512

    66011800624b2ebfebb8f15f09d5e086c0fe008158828f895fe0b29eda907fe1aaa2822a4725f5865d0617cbb4a814b93949e875f7c2b480ac5df5b108b95477

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29494829aef261843dbcc4f646fc73f1

    SHA1

    e7ed6aedd5d522eb8b2f417ffdc8a4650fde51cc

    SHA256

    dcdfa518fd50c3caf2cdd58dc701ce35324aac6e1e5a2345f3f72f6ee052649a

    SHA512

    716543604f162e46f076713ffa67426842622472c63f81f209ee8c144d34aafce7371f72d1f47f9afda0f33e4763da29cd964ed3a2b517094f17fa6ef18b6dca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87158a27cb5706246207c535ba823191

    SHA1

    a056be52492a352a67786b50e9d06c5258f3aaa6

    SHA256

    6d8ee1670a4b85cfc330360abbd6b582fb55cbb0405963804bd0c3d5accebcf3

    SHA512

    3f931648197c734bf3fcac924c59e1e85315e143bd198094039b84fceae9c81b6f11803464dfad1e38ed805a398272976643f8a7f6fc7e2c2036c46924a3bc2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79f5d56ecd339efccff145ba31ab4ce8

    SHA1

    d372e383cf8acca8e2390981344acb6e137ec178

    SHA256

    f5fa69368101f43947ad149ae6a170f92a939ed16c5447042d68537d5879ffbc

    SHA512

    28af0b7072020ff12cb94016c5c7d86df5e440ee9655fa1fa845ffb04120a8251d245b79a4f762e68a0ee73ff79e67ad8a4fe4c6021ba3a0be583d571c4a8a3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    424acc1f95913b7d23bdff12ea47930c

    SHA1

    58073a720b2b6e335c5ca39c5efeb099ef2939e9

    SHA256

    09ab4efd3c1013fe28d65d29ee48cae8cc482767a6e0906ec8e9726bfa2e109f

    SHA512

    21ab60347d6cc734a717a29be4cf2f9c31452c9626b77ffa77a239ffb12f8ac2c34df8f866648f988e84b6ff5d8ecbff4b4b2c23cdd9ce55e3f50d00be307a45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ae20a1cb149a9369fe1f6d81b983063

    SHA1

    3feacd56e91e004b937049f8d84fcb1614026e5f

    SHA256

    f440d36305f78d2bd92af517d13e68555371a7068b1ea36ed187e6cef77e03d8

    SHA512

    132dd476dbaa31d9fa27fc31673a59bdf745339a9b9293a7f9b7fdf9b7469532d0d002c5cd276072888e9a2ac27357bbc799123f247a69d1db8f01e44f243e0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9dd5e1ae47fe2ed934f021e87794725b

    SHA1

    d208ce58c5e09e6b62e396dea018e5ea5746c823

    SHA256

    1ce38cae8744ddf16fe26143e3c7debdd4402609d740e299dfce2ab72e52b444

    SHA512

    ed6e48968f2512d1978d970994073a541756e2f9b999893588951921b19411a6914378cf983037f33547be42a42e503e4129df935887892fd41bf68553caa701

  • C:\Users\Admin\AppData\Local\Temp\CabDBB1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarE788.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf