Analysis

  • max time kernel
    121s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 22:13

General

  • Target

    GongSolutions.WPF.DragDrop.xml

  • Size

    79KB

  • MD5

    526c0760696f5cebdea9825f59060f07

  • SHA1

    e40c28b1053d4e20eaf7fcaa0d85a5b0eabc7ee5

  • SHA256

    9a2a25a77f086d0a8678f5fc63fc50f32691f4a4f6ce0c774befb2c917274d42

  • SHA512

    0a1241d565e51ccaa9bf9e9add0fe186faacf482e7567c5ee1ad26422d441adeac6f8a1ef00ffb8374d09f32a4efc46ccec5fc5c48272afb07dd7acddff77c52

  • SSDEEP

    768:dK46JuJJ+7d7BfmXB9DtbI8OAM/6YfDnnP0nZSZII9nUt/gtzMHKk:dj6HZoB9Dt+6jSZII9nUt/gtzMHt

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\GongSolutions.WPF.DragDrop.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    478ae74af88d4f1e52064cf6d9e03650

    SHA1

    e8cdc851bf058c7e20987e11aa9f3a91ff26f3ef

    SHA256

    a4b1c02d9eb8cd25505172be5e01f25b32552ae2855f8811206975628a097bce

    SHA512

    2baffb470b7eb070ef6ddbec504fdcb9a1ae7d10a9a29ead2a821181bb080f8062ad1d514b53e5917213370a6d8fba57e819e01e98051cbab4270f70cd46f472

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ae16dab4212703893d62803e3d812c3

    SHA1

    9b5f1f1800daa5afffc86a1c0d9864f05191b37a

    SHA256

    0ac9e9ad583a24d93ec1aa6c34949da3fb288e4098538a72bdf5b4462ac6d6b2

    SHA512

    abe8ddeeb00114342ace03eb60a3573558027c3938245be68843c0c01e7e34e25aa69bc99e955aa9f0d74dbbb983955e177be0eef5c5b12f50d58ff8171fb6ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    351504b7092937ac1dd1a4946043fa45

    SHA1

    bb05cd46c68278f91760152477cc2d70f12a6e06

    SHA256

    ad772020c7a3f9f6e5f45106fa3055fdb91cf45f056ab63bdb637fea420a7f69

    SHA512

    0549d6a432928da4f9fb728444bc8174f9bed0249cbaea0274b5e73d8a36e67ce9c24e3d9aba56521a7b10969be3b090d32832ec9034fdb65e3dcc7ce58b3d42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a8f41ed3541063f8e6e963172157a44

    SHA1

    8cea4c8fa57348a0e1b8974df44936ed1087bfa3

    SHA256

    79e69c91196b1113dcccad2b6d166af1d0f7ec5fb22b2afd01714e4dc6993a80

    SHA512

    17dbd3ceeec4c1fb2a3d8be351485d50d200b6225994d5c984f6e26e41abdfe00bb9bef09f04de9c8ae1be4f93a33b03d7609651c20d2527afc05b8e3ce14914

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ccd54010271d89b0786a31a322005caf

    SHA1

    571138e81598273743987a6494ce9b9945acb073

    SHA256

    eae2de279fc0b8afa61c203eb7a8acb5d6c7948a896e816fd83533c5925709ce

    SHA512

    d92ce75a3014ab90fa8cc18414f5789c318a0e847e4244b81cb2f7ff0e9f6a38f3df988b70e85cec7ef01b4c2e98a1637459a849ce2f6de830f3aef9895cd8b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd8de01564023e102c3eb44e70139eb5

    SHA1

    cd7591414d84b4c2346fa301b723479b7a30c5df

    SHA256

    1692946dfd60ae252058f211c3296f7972bacefd2de2c2ebed8455ed852cdc18

    SHA512

    3cffb508f82d6e8ca9d153c6ab5df03960947b01121678430879935d5e462ccc45db2cfa9407af9bdfd8a1a656b5fcb70c2747bdfd3e6bd0dbd4908697a2ccbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fceb6ebadd365e494c6436f24d05d68

    SHA1

    52df417b385dfc087c3915e2cf4db5aba6ee38bb

    SHA256

    cc19dd483640d0ae0b159afa8ec2b3d5100a38b3f9061eaba4d383382d55c46f

    SHA512

    c16ce3c336b258586cb17f903d02b8485f364fbe7e4d49eb7277bc234e217003a96a62cc8c8b5e22aef2f7b4f72cecd9d0755176054dad9f740ff7ad618751e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f8d0ddd7b6c6a5943e84cb31684638d

    SHA1

    c78827c8de6f09bd6ceb3ebfbcbd8866fafc11e4

    SHA256

    84128426987bbc1485547763a34bb82852e8c4e9a1006b6027e8843bf4d6605a

    SHA512

    ff3a870bebff2fb1570ec63f18240bc9523e8322b8f88c3ba929ddb43d9130051c6d228197fee4014c14dbff020aba725e94fb613e7c133512be9b015b780ae6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fb133017a1faa69434536748d7e0015

    SHA1

    68017303f8b3f774e76b471d0a139386b4464975

    SHA256

    5c510cc7bb60b7081a797866452c2b224c18e05ba94acc85178ff2396b02d35e

    SHA512

    8ad89bc89791f0edf0501d22037575a9a1eacae818a3b6569f9a1442030184f9f8e61edfbc727adae8908533052a0abc607f685f90ef32e647afe2367138b749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a1369b9b8617fd3d7ab9fc8df5b77c4

    SHA1

    78354d84659e40b5b4e13405977e9db6a7984d0d

    SHA256

    712aca72ade2c4d32f98157c8b78c8f86dae9181c1244d7824c7b70104ab45da

    SHA512

    cd34f6c7eda535267bb686cba5898bc2c82951517b9b645a402c24e2c202a39cde9ee3871ed1f2a4e7df4dcbd683d106cde7bfbed29d365db3bc461587b46237

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5256e2386de5fd1a350d05009a37cba

    SHA1

    85091234f16ce1dc3ea9e11d2c803701ab24eefe

    SHA256

    6982588947d7f431bf48cb7605a3ec4573c282f149fa44e9c366cc58904104c4

    SHA512

    d44b37bb5ca3538bade388e7e5ac5bb451031a45ac693bd63e2fcdb24c20672915dc4f509ed82bb5713b1e696034acbc152128e580e8e12bc9469f6c08e37956

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ba609a153eab2b69a60abb353d1c407

    SHA1

    8b0c79ff62b05e6cc43d5183e78c6b2af3760e63

    SHA256

    cf306e24607835cd075ac9fffe73b7f5eb48f1013b70aaf92e8fe6cb8cdb162f

    SHA512

    e704f5b1eb4cef0a468ecc176efb9779bc85c13b82fa424766ae9e634887d2cd57eba44593d1de1979808706827a85b115adb339deca32f771784e6f84c08347

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38bc86b427b27ce9164e633cf537c2c5

    SHA1

    2042ebde5273b64c1167a40c96454ff6ee57e6c4

    SHA256

    6d02cb79bd8a9e3050f12b448a775d47a91e5b1d8104607b30f667bbae723f96

    SHA512

    2a9f4891d5b588e91d059c255b2fdddb11e421acf2b6fba8ba1aa7e57aed28d0922143430bfdc5fdce14ae326f95021a0068d14345cdb1440d0ffb8fa41c0575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    894fe00778b86af6ee6f158e54751e27

    SHA1

    624ce81bdb22c259378b83995be5c8e7b55ce611

    SHA256

    0dddc6e0af8fb58e63c1968bcba770814806f1abb19c7f30b582550c5dd522c8

    SHA512

    d03c737cf8c55d77195ce9deb6cd3db9954e1b35a95a18a4907a96afe5fe104a42e6a643d73b6f4cd3f3bcc7ff0593f2995fc9dea9ed8f2b37c6d68576876761

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    14c66f84efc72e760ce5872e89ba6cbe

    SHA1

    7adb03d0b4821ca5d312c61488075e225dcdc9bd

    SHA256

    1b7082147cf173e436f6e7742a8f05aef955b9019b956b4071def94847d3ef5f

    SHA512

    fc163a719aa488efbd7f6c843f11a02908aecffefd6aee53fb8764938093ab924ed84f00487ed8f3c52a38ba4d2a03a088b1b30900697158a06d73983b81e665

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    897c6baed9c87668de1bb1735785c575

    SHA1

    ff89550b4dce9c92e18d840f37252eb3f7715397

    SHA256

    5fd30ed9d8b68bf7bbcbae0b54ab68d7ea637f0de2c9ec0a6cf77264c8d33f9d

    SHA512

    e541970b819b30b2ca71a98ed6db78ccd36314285547d8e998fad8ddad2d0c26d4996734c574e767b904b5cae8354fb1cf3cf600a097ec316bee3baad6d4aac1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70d91288685aabf961b7e8751be44a2e

    SHA1

    01f8a99f12f918c2a8af8e6c07b6408674d0c30e

    SHA256

    56cfdf85e08c844996977eff0e61c290380ec261e86cd058adc4baff7b669bb3

    SHA512

    f13f8f13f3b15cc488da750fe06f49ae35cbe3f25fda932f752b08e6a0ac71833947a63c36e3f4204455b28fed346615df64f051fa929aae65bd6a48daca6e3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf3796dbc57afe076ce069a604c9a99d

    SHA1

    3a3ce6106497db4861b6d15e99e19141fc37e20a

    SHA256

    4d9e6b823b168d81436527348c76d546130f071d3c1f8d2a60c92fadb139bdc0

    SHA512

    8f8bdd53fd8fea4298ebe4745e690f1fd0b307ab533bb3eb5e5c65f021feb5118e337886e51141704da88676937b6525b9646b691d439ab1299c9c5662acac8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    73fd00ad6aed5172a3f3931a9fd35447

    SHA1

    a138273b234921af13f8e23c6e7a06fe9243aba8

    SHA256

    b89e5abba97a7062e17aef021b002ef5ca47fa99929084f409f50d2ecf1c078b

    SHA512

    99a557825cd2f84f34b2bf4ecc8924db818d5fb152f34b135b0aeaefa8837287af64e20af23874a20c5fa014f6ab06c9c3a047bcdd2d0b274f7ea6802642998f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce34792afbb1c05693d61b6123388f43

    SHA1

    a792306b1be6f718e6b1db39b0c5b09ba17d8157

    SHA256

    997b869308176eb68eba99eea9274338c829fd8b45711b01fccdfd44eb5db2f2

    SHA512

    954e118a691b720116b33b0a2b95d4286533c6e24bb85c83c36202b3960a3d02214ee4f2aae9e784da8813bea76af11d1fffbc12b47ce8810d080f6da9f36f3b

  • C:\Users\Admin\AppData\Local\Temp\CabFF29.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarFFA9.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf