Analysis

  • max time kernel
    117s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 16:54

General

  • Target

    word/_rels/vbaProject.bin.xml

  • Size

    277B

  • MD5

    dd79e6440b0515bfcf771c2c5286a2c8

  • SHA1

    40dc1e00e2663cb33f8c296cdb0cd52fa07a87b6

  • SHA256

    c97833e6456aa2bfe9be614f9c3ae41a8ef764b1cc3af92c6a6f273c62309122

  • SHA512

    461bcf63f03a733208cc31a97c649b5dd4e4af9f8b166e69eea8094ca95c4189f5691d7d3ef4e63ac3ccd8202b46fa9afaeec97a03f99a04205db9ab4ba16148

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\_rels\vbaProject.bin.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08b8190978acd2c61f3445599d31955c

    SHA1

    318cf2a425b4064602b4e085c402bd77a2c99748

    SHA256

    46407cbe3fc7592c500b18a40cf45d905c1e8350d5036c3dc8422180d35b5e79

    SHA512

    d471ac54c1879cac7e41a7ce4d0f7b898e227c9bcb702b9d63e1ca02dbd60841e1fc630cdfde09c094f892c802d2a73b339d34189eba365138338d450b5123c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7457fe517a69d102bc3d42b929748571

    SHA1

    2e240a2740afe756e106c6533c5dbb4c6fbf7f90

    SHA256

    5e8ea56f0860c767173604b8b62269a012067a707296d7340f728b55e8fb6713

    SHA512

    71c0885d14e91f8fb6ce43a88886cec1b2cbe6333a724047e83e9183a2ba1446a5a277414cb77bb70c6d164992b326370ab8ea152534ba8213c669fa5fb35b21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0096f1c38efd72ce5c84ddf0a8dd65ae

    SHA1

    615403eb67cd9f8e924e2650788e1eff228e8cfc

    SHA256

    0e7203342962e8213f10f0755937af94676aa86b8e8dfcbb37438f42f1e28ab6

    SHA512

    d6cb3877f56f25776d5caf0fb68939af572d23957f989b5a5f1826fe965ba9b077cefa905b695aa2f5a50460f2339a053028fdbb7a624ffb0e0bebdb836eea91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6875b78adaa155fcf5dd1cc68de1a5a1

    SHA1

    23da72ab8aa9df7a6e622389207ff57e6413d503

    SHA256

    f61c37e2609723ea534beb0803b74e193c4c2d0aa1de5947e0655edcf787e96d

    SHA512

    52f3e95b8f54dac884a0089aa988a36a9617be2eeb167e462dfd916a26810277d84742ed9528afb43008542d46c895fddc9bf70d1e6223fcc4e95ec26f273d34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9e283e729dfcc2f00305c3dd9b02b9d

    SHA1

    54d6d827685fa78814ac87c7d76b99e9922209bc

    SHA256

    471ff3112f500a5ffcad7887d0b1fee5f239e516c20a41de73660af5c690ccb2

    SHA512

    8c025ac84159ed6b4ca894a6b97cfec3412dd9dfea7bd7d18ef83659c1d4d48e2d9645a72842f48a2453950187a84ce3d014de3c318dcc201d19ad541cf49164

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab0c70ff666e35b31ae7db65c216f40c

    SHA1

    17de094fd87ef1e3d395db25636b6b94ea853c6a

    SHA256

    15aea43dc8f9988eddc3170baf1847234d80407402d99c159e7d2771df67549a

    SHA512

    ca02a19feb203b81c69464e3d222c4cb951c4243082764acd97b107352d2f6f698850d3e4bb339b986396a514d835352ff2291d004d841fd3fe9838f420fd4a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47c0bdf4812aa4413067a544549d4133

    SHA1

    23835d41135448f58d3960bc112ff81e4db65ecb

    SHA256

    662db262dda2f9765e43315cedeae935027e4205f8dd803f7bebe36b1ef7b036

    SHA512

    87f4983e41a1fe62561e67052d0697fc34187d4b8445558c622fa2926955c94efc9f0015fcc5befc804009f781100c6182b9c058cb7bb1db5dce5f5882e4f1bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    519b829b67fe2984e6cf0b1fbf347061

    SHA1

    0c3a42c2fdefe0e5473907aa33f2772a28a2575d

    SHA256

    5a6aa07159ab5c6c19902be38d9383dad5d1ccf93048df1c5c07ac80f936468f

    SHA512

    95f34e437057a3b05a5821352d4862adf732b9840891648905b138252a1b6a5839280f28a9ea98ea735b7809c08bee07028a0bf88963611a434011c75be4702d

  • C:\Users\Admin\AppData\Local\Temp\CabA24A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA2CB.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf