Overview
overview
8Static
static
8tragedy_redux.zip
windows7-x64
1tragedy_redux.zip
windows10-2004-x64
1_rels/.xml
windows7-x64
1_rels/.xml
windows10-2004-x64
1docProps/app.xml
windows7-x64
1docProps/app.xml
windows10-2004-x64
1docProps/core.xml
windows7-x64
1docProps/core.xml
windows10-2004-x64
1word/_rels...nt.xml
windows7-x64
1word/_rels...nt.xml
windows10-2004-x64
1word/_rels...in.xml
windows7-x64
1word/_rels...in.xml
windows10-2004-x64
1word/document.xml
windows7-x64
1word/document.xml
windows10-2004-x64
1word/fontTable.xml
windows7-x64
1word/fontTable.xml
windows10-2004-x64
1word/settings.xml
windows7-x64
1word/settings.xml
windows10-2004-x64
1word/styles.xml
windows7-x64
1word/styles.xml
windows10-2004-x64
1word/theme/theme1.xml
windows7-x64
1word/theme/theme1.xml
windows10-2004-x64
1word/vbaData.xml
windows7-x64
1word/vbaData.xml
windows10-2004-x64
1word/vbaProject.doc
windows7-x64
1word/vbaProject.doc
windows10-2004-x64
1word/webSettings.xml
windows7-x64
1word/webSettings.xml
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
29/10/2023, 23:23
Behavioral task
behavioral1
Sample
tragedy_redux.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
tragedy_redux.zip
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
_rels/.xml
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
_rels/.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
docProps/app.xml
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
docProps/app.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
docProps/core.xml
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
docProps/core.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
word/_rels/document.xml
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
word/_rels/document.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
word/_rels/vbaProject.bin.xml
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
word/_rels/vbaProject.bin.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
word/document.xml
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
word/document.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
word/fontTable.xml
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
word/fontTable.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
word/settings.xml
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
word/settings.xml
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
word/styles.xml
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
word/styles.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
word/theme/theme1.xml
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
word/theme/theme1.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
word/vbaData.xml
Resource
win7-20231025-en
Behavioral task
behavioral24
Sample
word/vbaData.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
word/vbaProject.doc
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
word/vbaProject.doc
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
word/webSettings.xml
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
word/webSettings.xml
Resource
win10v2004-20231023-en
General
-
Target
word/document.xml
-
Size
25KB
-
MD5
515b8b95348778f069717cf78cb6ef30
-
SHA1
3a37cf9538793068e697048fe91df94bf83ace7d
-
SHA256
9f35dc286247e7d3a03e5b3d7b91f4ff97447869876236f09fb06cd15c6e8ab6
-
SHA512
b96d61f34c49f8bac7a115caddad0745a52ffb35fc37fe44cf867c191ad16645852ef9bf6f4b771929f6c2a92aa42c7b23fbc9c02914e91298585f4734e4b974
-
SSDEEP
192:sFmmY+ZsAZbpL9TI9QhfzmTjCYjpDe1+gyeUb:sFmRGstd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "404783672" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009159649b912a9140bf53d83809c5b2ac00000000020000000000106600000001000020000000240b416e87fbfb5c0ef6032575803913c4d04962aeb226e0fc43af655c75e004000000000e80000000020000200000009b0ac3c83154213750823dc8a54c882e585315a77c756b4a906036407135341620000000cf36a086ef37ba791685771557f93884ba1b66217d742307185347f255ec00f84000000044ad1ef8cca02f805eb11c1c358b634097b6b2bc71d657fd9af0674e728a9bff786515abefe4e635aa07a9158fbf8b69db9b1ea84e1f22ea410e3e584e153dcd IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306767fcbe0ada01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26CB1DF1-76B2-11EE-9B61-FA6155A1A6C1} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2732 2032 MSOXMLED.EXE 28 PID 2032 wrote to memory of 2732 2032 MSOXMLED.EXE 28 PID 2032 wrote to memory of 2732 2032 MSOXMLED.EXE 28 PID 2032 wrote to memory of 2732 2032 MSOXMLED.EXE 28 PID 2732 wrote to memory of 2768 2732 iexplore.exe 29 PID 2732 wrote to memory of 2768 2732 iexplore.exe 29 PID 2732 wrote to memory of 2768 2732 iexplore.exe 29 PID 2732 wrote to memory of 2768 2732 iexplore.exe 29 PID 2768 wrote to memory of 2820 2768 IEXPLORE.EXE 30 PID 2768 wrote to memory of 2820 2768 IEXPLORE.EXE 30 PID 2768 wrote to memory of 2820 2768 IEXPLORE.EXE 30 PID 2768 wrote to memory of 2820 2768 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\document.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5440056f57b63f40d2277bebf665ef
SHA1228935a3b6ebc5889699c0e4ff69dee8f3530914
SHA256b1d1248f680fefafc6f889555ab87484598834bb94534c33f8389ed01e1c9082
SHA512c0ee0951f288253caedfbd256c97e088d4502dd49991af47ba3b536d713119d589a2664c122efc8c0e85c039c8d08096f4266de980067efb565de4c83ebbc529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4ccd014409914f0862a11ea3de0f8b
SHA12a94cb749166cee467f01f22245b2d25333ab3b5
SHA2560374444fd00f2d71bbf39b4416cb71b3768381f51b02cccddd092fae91432c03
SHA51241639996439747c909c96ab22f2024324600ae52cca6eae44a6bbdffdd91d71d92f69546a4c9bd5a2bc8ccbe74c6e012e98df61b02a83ea429dc0de0b9ca3151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55124557cdf625c1fcedb08a35a9b0b4f
SHA1c9c2153fe9a647e97a983e388b84fabe044bdea3
SHA2561f7849bf90ac85bc253be7e10ab4bb2a235a911678e4201ce8f5fa04edee4507
SHA5121239c179af04b3ac8eee4a067e8661b1ee361e4d6ec6a295c4c3decdaecdc4353c92c2d056de62f66da29ae424f11eff71619aee2644e76ec9fb6a2bcf385d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cee7bc83fdc50b6fa1b771f6ad88e4a
SHA1b2ffa2283ac3a3d572b8fc582100b4ac771db44e
SHA256377f81116588abee1345c984aec3ec0171641d2cd6bd7b262494f1b4bf005aed
SHA5127671fc5275a8cacc0b4f10181c32786ac1ebdd457d942ec17f98c0c43d8fb745de289fc1b94d2059a218a01294ce0a43eb77b200277c840aaa09d971a238878b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e805d1ba03e95e07d3845324b310652
SHA1c85c927fa0c3ff6ebbe572d2ede0270b6cbb149e
SHA25618d653084803350067c1a45b4cc7bb77055e3f04ae784a9ae0f9f7493e84c964
SHA512f758f1ad17dbf4036142b398fe75bc474732d4e776cf263e632196cefa9d1a71f0f3ed5aecc86f7a5280fcc6715b0f884c4fb6db60956f3b16b1122d8fdc79b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb41ed21b09e9363ce5cedb64fb7a76
SHA182da99054bdae3083c69fa62a09eb7c1f7022449
SHA256c738044f3e7cbd9a4685eaada367bb115091f6932f20926a9081238a48b66435
SHA512507f77a9ce28d0a1dd4524ace0e4fa0814ae8082c1f36955ccb15d22d9e5dbb03e50d17a41d78b90e213b604d1488c525fbdc2013516cf11c2da2b10508ba45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4bd44d0a287c1e03510fddc7f8b81e4
SHA1816b5999c11866f1cd2da857a8dd6fc39e869cd4
SHA25608c3c48dcfb7ab99e670121fde4f9068e259f743169f9f2ff1784fee4506b7a0
SHA51294c0f4fab02791aa5c2f0205ad6952030d0964a82795c1d3a1064f20c300f83c022d35df9dc899e336d4460fb24dfd36683bd1b39dae79a23e632fe687d318be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559921c398bdfe06b6da754f970f939b3
SHA18a2e121955bc48314c573d48bbdae1470ec84273
SHA256b8dfeb9cd6bab186ebfecea757dd11094e86e115acd2ec06e782e175ee22d4e9
SHA512a28cfa6e45c4ecd3f107aa80327be5e7ed8dee345fb6680016186d808e5cb85679f82512ea314849d11202d0800cb964a73c3de0b14b44068cc593ba41da2514
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf