Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 16:54

General

  • Target

    word/_rels/document.xml

  • Size

    2KB

  • MD5

    6d05b1eef06ca8da1b3b0b08d8f1e610

  • SHA1

    b6bb01068a5ddb31e2d19b7b9d102ce4dde288a2

  • SHA256

    b42922ec7480a4643244cf7de8bb698e748a86293c50c3f3256f5f8a2d3d788b

  • SHA512

    9b136ea0fc4056ad0723ccba8096fdc4527a3cbf5e3d93b6d77d4c06eac56913b5b1884e772c872ae51200fbab65b2c1fc0465cc356385a9fadcc1c9bbd49dc8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\_rels\document.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7a48a1542588d3c577d5a7d332c51966

    SHA1

    334854795fa124c93f0523da4986369192dd2459

    SHA256

    af40fa8c9b3475cc9b53c2212bc88e894040243f7b2c7a6ce86df6bbfcd020f4

    SHA512

    8a4d11d242603033a57d298c3b50098e60e85bc15aae2c69ff5c33ed1b2dc8b5cb7bb065ae530b0ff86ea3b7072ccf2e4bf210c186125d22fe77b988cb8f6b64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ee981135506d863118a2f05f20dff16e

    SHA1

    3efd478a0a39f5984766c567144dd04c378964f1

    SHA256

    28271e8cde78a59ddff56a4a9b1452a763f44975f9958bd391178ac7414ae4fa

    SHA512

    7ca947264c93c3369db7d9e1dacdb2829ff6954ac1b63baa466f2932121be5da10e23c3ec2651a877343ed9f3b25ec66b7e45fc56b426c815fc47b686f0e556f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b32619237dc831148078e64df3077de2

    SHA1

    65de686f78745f63360bc0a37c442194b2a59c2a

    SHA256

    876dc1fb8984c40efa5706d1109ae0fd738ca3ce41ea6bd9b19466608ab00bf5

    SHA512

    edf140f774dfd830bcfad3f39837a9c5eff18e81262cdda9a08f079975825fb8dd5e3c0eb33dbd3fc7969522dff90bcafed46b7650cb113e6fa8f5150a898af5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    285bc1854fda35bc74dfd6b0f90f9746

    SHA1

    fddf75fba0a16f53e91fff354ae5a9125adc4e14

    SHA256

    101702a31d58ab830f97c1875ce37e518ee2eb80997508cbff4bbf52a06d2627

    SHA512

    6794054db082038d37360351f2c76f9307f33d09fe65e22c249cc505e096a8d6dfa36c79788f54d680594f8631b8fdf0dec5b039c71d188475c488fa83f0b1d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a747519385c0164d214ddac6b1af9f2e

    SHA1

    83b4042f95b857168dd0492e405793a0da976f47

    SHA256

    2f23d88c12bbb8b54629232e53e3c24e3f77f6478cb5fde2b110c9c4851ee757

    SHA512

    39a920864c6194e32f2ddd1bdff17743a1e2168146caa2f1a89b595eaa3c16e210681bbf6c1a7c8c993371b3055c39fbd74e499029ab39b69403adbb53e6ff90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7f7f50439f48e2239d7c5395e148c45e

    SHA1

    9625619aa7bbbfc92395acfc5db601d659af851c

    SHA256

    75ef917fcf124ea7c463e5052283450f94d4a9f9547d80c0f4b2fb4c7d35ba30

    SHA512

    8a6ce04ac42e8ee1d3b61b8a9325c6c79e52033b7a1349b3a62516eecc6bdab62cf506274ee8905374d5c00eb7c64c26c710710d0645fb4aa963c217ca1bf94d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    38d4e717a6e80c4d63483980034fc7d5

    SHA1

    f83041cf1af801a64797411d188fe8f6ae7d4f93

    SHA256

    b5d68ee1240d0442a24e6b8010aeacecfa8e08d877227172aee12ea5d18b050f

    SHA512

    11433e1715e7397a7f25fb79689467b3eab781ff0567c7a1bcab50c43829c046bdc46f5551c128487fcf50f876647962f1601fd2ec81d854659b156441e33618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4799c022bbc3f9539f5a2de3f3bd453a

    SHA1

    4d9122d23a87b315e33e99ad504bce487900c16b

    SHA256

    2ed883e71f7668f719f6f1773a9d8ececf2b5bf143fbd9ab080a38d9d9e01b86

    SHA512

    25af8f15b0db751f9e519fbada671c16c5fbc9f03a287aba233883aeb13114a9855686582b5db9b095b9c2dcaf0d01dddfc292a83d0ebede14239293f13ae7ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ced52ffef108feeb30b8c03832ebe5d2

    SHA1

    e391253bd1d1e508e482b2dfd1500cb5135dcdc1

    SHA256

    20933488cb0ccdfdd5d34e24a53901fede8b353ebad54ababda11ecd90b25c08

    SHA512

    f838bb1886d09957bc581bc2b44edbfde59fb44d9cc5613d44939e3468ad3d7c0d68f496a6aebe054834015f84865975bafcbcf810508cfb889ef98eaf3127ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    968a0869d346c10a6bad744b4f009184

    SHA1

    556a5296fa92a7efcb3702ba09c8abf38ebdec0a

    SHA256

    32fa98f5ea3a4f606f965a4373a3f57aa3dd0ac51450b3c2dfd33054b163578b

    SHA512

    41fef7669fc776e044494d3e25285efa7cf237a885e752b5eb0ea0e582bb710f01d3671bc0b2a75af241368f4b94980ba644c622a2c5bf841258432af887919b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a8f5dea4ebe46d75ec53ec460eedb53f

    SHA1

    0c4cf7235be7ec88b61f9fdff8a84f7d1c6f50e6

    SHA256

    a3dbf376b3dd89b36b374ee29cd5a3b25576274b0628f7706599df86721b772d

    SHA512

    0f836e0f75f85cfdfc2dde3a8709f822b51c501e2867dd1126c9ce5967080815c215860490a09540257ad9505dbcb613ec9f20312698c420852ac0d8bb47f83d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1ffb55850c92c5391d5483e3b608e5aa

    SHA1

    baa69a50c6706ffa2a434920e187d61db24c2ef4

    SHA256

    82f0e35c5e5ea17f2aa2276572cf1c9addd9f0f0583d93dec3fd635df64fa206

    SHA512

    9839662f7ce62a674de48a804679e9ddbe0e889355c488d331d42cde8792e4134d128b151b03fab2b89f6c1b9d5af6d798d5e625777c503c33aff488a4c59352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    550785d3daf7a6e982dbac7e1a4cca43

    SHA1

    571ce3a3f01713812b81ef91a87f2eed22a0b282

    SHA256

    1a8e1867c6c1a260f099591f1a474bf242d1dbfdd8bd7702ae5270df797426ca

    SHA512

    956deafc5ebdc913707f96649d1e777e327b66c9d4ca250b0b849fe7f683cbae4978d80fcae62d914c1c1881d4be2b27584291eaae0d73c826fbba8c10f7d725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    39ffb03587706b8396777aded7939950

    SHA1

    0a87e5ef781a449cad50a1579b8e1cac18bb5b5b

    SHA256

    c7cb807a729c55939c1a1735c5f93b2797158434274c491f1b89ed99146f236f

    SHA512

    fea2ba2b6b446f8ad5936d61ced40193a36f5e42c1e61c780588599366347fc6dac03343e3e513bb778c41a46e172195f9d0ba5ba4287a71a2e71c907ee25f5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    edb1536b601ad1498249788d6b377cdd

    SHA1

    9017e38c7e09a5a7c26dd4c7b9a32e5005920043

    SHA256

    a33a61d8909071e3c32d111256516aa38f2e785db67abf399cd7a3b29cc05d57

    SHA512

    cacd4627242a9e6cc9857f62e425ad75b12057a6588ef3fc94009ef6101ead3223c26eb25358e289efaf584d88a8181fc90778db1581aa01eaff1c0ba037fd41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8d5f77f64a15241876cfe8fcbb46e2af

    SHA1

    d17bd2c7423c898a11b275d520b9a9c26b67448a

    SHA256

    455f1307b9754bc536d6e185e155bae8622e763ac984f3d167035c8c14bc49f3

    SHA512

    c037115f1a538e438f2084b070f4000af3d1a39eeb371bd20c071794f6034a87f014c1212b0d89cb78234fb8ca9d483e74d8f991ba52fc6d0c61e9cdd3ea06c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ab5f62d2c9d793e9ea9b2b716bb1eb78

    SHA1

    02c6b33d989cc0c51b8a7f2b315af6e940293f45

    SHA256

    3ee85337ae06666851f6bc9851b2b3a3464c2486fe3f15bc06ac6bf019d3731a

    SHA512

    51e566fdc2c6e32ccc7998f3355771839017cc361c6cb718010f924064838199418ec47b5319e92acc83b5eca946bcf5cbe0b867defb7284e7d3c09077ed6653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1360e6bb49afade6faa8a10c807583ba

    SHA1

    5c9c0a8a088fa70758497d7b47466048e4516593

    SHA256

    6493d2f4eacfe7f8c024cf2117b7c766b1ad2bb841bc273bcbb72be2ca755a78

    SHA512

    f441b7d97c2b28862f4d9105a039390560f0d2696db16dc5da51734cbebbcd967447f32c5e745b43a044dfd806ac9fe94a76a88317a6951eb8b074877f48285a

  • C:\Users\Admin\AppData\Local\Temp\Cab7CEE.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7D41.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf