Resubmissions

25-10-2023 13:58

231025-q979cshd42 1

25-10-2023 13:54

231025-q72c2ahc87 3

25-10-2023 13:53

231025-q6ywhshc46 1

Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    25-10-2023 13:54

General

  • Target

    AppxBlockMap.xml

  • Size

    338B

  • MD5

    7c1b108f8a1d6b86cf1b37e1845f628c

  • SHA1

    25ae9fea16811c0478d503c316f6deb742911486

  • SHA256

    acbbe52455c1edcfbf7c489e6dca3591a177406a1a13a2157eac09606c635e79

  • SHA512

    aabd2fec0ac52c7f108ad63b43ae84e17da1efbf472e3bda1c5fbbe801a4813c9c3182e136ccbb92030dcacd754049b0cb85e05abe8a1801d3ee2856b0fb942a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\AppxBlockMap.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31c532dd3497aa522e81463ac9fdd10b

    SHA1

    fd8a5e6977088c890bd3d9c3a507e76607d62801

    SHA256

    93926675dad13f1087a861116948ebfda59acddad8ce1602687b8704f61749d3

    SHA512

    8b159ed7ac175f921c1115aaa50c745af4e955652c78a2fc356adbe9cebec8049911528a4d6dd285a502f337cd32595364e18e661ba7a089b83fe75a32e72010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0acc1f0855b962648a400f442065e40

    SHA1

    2c75c5b40b55c2bd4007b0de44f309b5302e5e1f

    SHA256

    ac92185adf7a1062af6cbf8fe399a3ad02e0f0f3a4c1554a36390f644cde4e71

    SHA512

    cc400dcf70102122c1a3536205d5ba43ad1c44ce57639ae7a557b7434c458357dec588c9e3f7260e005c7021d0ac933c138331c10286978b79640a8dca5534e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8331bb93c9f110b8839016aa0e379815

    SHA1

    807cc48809173118248c5fb10776dcc885239d5d

    SHA256

    5d8ff4f6f2f581da92e9d315baa91253204af1febc0de7343c3396d9a9e5c9f0

    SHA512

    105cdb9e194ffb657eaa1a9000c1f57a5fbd9b6fcca29bc3a829837978f98f332007f138ce7ee11312d534f17cdc4eb3f70635a7264536387a7824406fe889fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22d982fd5fccbb9e068db2c64a5b8f2f

    SHA1

    9e084615d45886bb2cf7077b79ea59f763d49e7d

    SHA256

    fd722309539f49b589f87146e7ea4c78a554c9b5bcc537ea0352da330f5343f3

    SHA512

    a4fe3801b3879996aece94e6a806de81eae8625ab89c11b1a4dfdd1fe069e639b621d543748abcf2f0374514b703a0932a193edc0328e975a2947b24cc046a91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c5925b51b427ac65496cf212ef31980

    SHA1

    3d6332521dd70db471d33a4c707cf3f2fac62eb5

    SHA256

    b1d335e82ced8570baa2a5ec44c4bf682765ddded256e3f297bc10c533460d41

    SHA512

    bd72af0faf02db99d8fc73249c9b76888c741d1f7379b1ff18a45eebb80f061c4bf767734c839ad40eac60c9ec6469b2ecb57a9ca7df06024d65f3b4b87dec4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e605d595677fd718ba6bf358985327a

    SHA1

    3cb850424a4adda1467aac7aa87d4b746905aed4

    SHA256

    34cf99b78a77ae6d81dcf60f041fdf70629bffbf454ca01c5aede0158ea66703

    SHA512

    52f9842168ecc646faab719bc8367a241b86e1e59c80a68d6808ad5ae36004c10bbc622a98c435c65d2683a9288dfaa35e46cd0a5e1fec2cd9d6e92d6ee74d0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc217efff0c305a6fc58f36e038d95e0

    SHA1

    ff51898947ea92ada582a16a9ebbbf76c224769f

    SHA256

    b312e37cb65c59691e675078afda9e8071412d857532b20a90995d6a1aa1304d

    SHA512

    facb7a3378552d3f9e9c27e62f910ce45ec5ea3a3e000912b761967d3181a4700afa2a6be2db299545c7ac5c37c18007c7036d222ec1d4023e486969c85ef10d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea20e1813ce1ce350e7a17b30effe51d

    SHA1

    0036349507b1653cfcbd40f3fd0600ee8ac4fb02

    SHA256

    b3e6182dfdddafb425526b3b8f7abdb157296e27dc3b8ed620f25b20a9eb5ee8

    SHA512

    eb357927d1025532d39f047904704ddee44e4bef92cb8de2f0ea835e754c8b46d8b93a336105eeca8281aba579cb6bfdc4d469b0afc95957e6a0d8bbc68f55fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b29786cd7ac5f8014d088130efcf3f4b

    SHA1

    7596bcc2c3bc8afde3a2915f9f3253b5c385e452

    SHA256

    7b39db005c146d1447be2633744694fe07183a4c21f77c34dc0ad96878dbf798

    SHA512

    5270a410954aad41e878a8073cb989a85dbac4811bbf3e325a4c629cdbab7b362c23f7a8fd89265bf681f52fa3ca6d6d4b9eb9e3335cd86112de3dedd81849d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a79ae41b69d7c2114bf2bccb93097fd

    SHA1

    06e78159f4070a8114764d880e5beaa373ded897

    SHA256

    791b12822dd6403f952ebe10a91440ca7021cb1e97546805cf66be961c8dbbb5

    SHA512

    f171b884e21c104f2c2bb8abe643891fa91199c5adb94914dd0017e5c35062ec457a8d74854e08c91321cc93b560310b111d2d90906462bb2965b5eca1c51df1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac57f348c4e4aafc7e43049cd3c48fc1

    SHA1

    e30b3ce2853ddfabc431e0e52083b375bc7f3ade

    SHA256

    af88b031094779c28ca670f32f255adfe1c67f8e9f7278f7c14e5c92ad038887

    SHA512

    e94a7317e0cc8b5d97446bbeea2f9db37105663decbc33d85bf6f5af8222528558b3142b0d3044dfdce543c5240c4bc5b259f380fccd862a99af924f342e7763

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bac9d558e564874de6ce00d746b45712

    SHA1

    cff70418f0d4c3a8d300e0e28553813ee8180067

    SHA256

    72f903d0ca2c9daddbeff70d3e6dd2d338836add8d5ec4e1278c1c36c07ca99a

    SHA512

    243fac807e0dafda67b2adaa103407ca9274238e819d799e51e97aef4e6852e63895ffa7cb62cfb814946237f65d45e15cfeafa57ffbdb64d34eff383b1d8d2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cadaf487c90b8d4e83bb02736703d862

    SHA1

    6447883bee13dc23319386f52d55d9fb54b57dc7

    SHA256

    9d8e47e8a8b3bd35a0c6daa8b87ce5725bf8d3cf954f07a188f798b757d0be46

    SHA512

    2565c5fa3d4b5902385ec8332358a02088cbc1641b22248c996c4a96df5c7b0ee5a93defedeaadb18da31091ce4b337dc11caf270e94c1baa201025c19882ec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd0aa31670adadcc9e707c5a3a866887

    SHA1

    263ce2b02be45348e3f39620e21418c842cfadaa

    SHA256

    6139f88804354383ccaeb2bc68b0cf3e0965f74e49a270058a313c4ebe2a1ac7

    SHA512

    6b365e99ae1b248b56c19ba87ae9042471aac1b3c4ccc9e35db4e0b576dd902d419def21053d1eb3f32fd2fd7d56143ec469eaf3c6e975450e77c087354ced70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8167374105be3dec3427198720cc03d

    SHA1

    d4ba171c4cff86b0c88ea170d2c9f2d126a80cf9

    SHA256

    0aa97788b6ef07f2a26f9b8b07015b115fbb0254a12c01e70370aa2eb5246272

    SHA512

    7a2bb8c601dd2de8506659f057712e5709a572706656af43b5c3ec1d683a61dca35e67a80ce04eaabfadb3709134a0f58eb6dede8d5262de2f0e77db14dc94b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f6e68c2ae77e38f1627fe45030a414b

    SHA1

    e9da65847cfb176be3a4582a4302b89d73868179

    SHA256

    f50d89bb72b979df1f75692b7bf6951a8c8002089e0291b53a4512c342ae89c2

    SHA512

    a290a878d89e0690ed164f7c9544b40de027285ae4570245645b44d01b36ac285cc36f4d170da7c9ddb073c20949703335f93fe6d766737a7a2e117d865c1032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39638b42770ee77a1c09099561690320

    SHA1

    6015ddcfe2a9b83ddbd4b133a94b510a6bdb51eb

    SHA256

    414c41d52dc9c8fed597b82b6c2a103435929d5142d2858abbd4ed34d5754125

    SHA512

    1c21ffaa45db2ae5c0700917a74e4f5cb43d5b7c8cc3f34e9a43e5e445b881c1924d2b2df38fcf622c0fbd9af3001af20cabca5e6d41042e1f4b495fc042177b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8360057ac18bf3e15e64ed0151dd1750

    SHA1

    d17d9696340f56b9ff77eb07b84bc3a8b5e14490

    SHA256

    0d6c8f972617b4ef4f5fb22ecfb7e7074b8a67cdd0fc822bcf1ab018d0e74003

    SHA512

    3825f738a219509d4e36e40c878b43d8b2b2608c2599d3ce81f79c98778851b4bf3cab53a1cb7a93a8d9f740c5fed390016bf2f0569d1e38fc097d9de61ebcaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66aafbb02be3ac3c500f0bb806e20a04

    SHA1

    93e84df7dbc6e7df52ba8312fe2adf5178f20a89

    SHA256

    95de74e11c97d519ee998b56242ee670d0dcf7b8ae99465a1930f1791c760da2

    SHA512

    aca8d2b3a69b8478793bf2d3122c094fa19e26f5eaff8a16a50b64e06363447b1b06e9449b5d33eb622bf4879c5118f3b294e607d3dfed7078788b36ccdb7c9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcd22d110770fe0aa2f20947e415e044

    SHA1

    ce613237c00d3c8072469a2aa8d285b12603ce65

    SHA256

    41a067b7905b926c030845a697e61726f90ad8578b5db2031635f2720dbf2bb8

    SHA512

    379fc42a93e514be9aaef6d740d0a34592d1064dc6e54e7e6c7fe6f6502ab3c18e1215e7fb150969f338432fd1052689d475d66f3deff553dde0f7ac5801fd41

  • C:\Users\Admin\AppData\Local\Temp\CabA008.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA05D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf