Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2023, 23:23

General

  • Target

    word/styles.xml

  • Size

    43KB

  • MD5

    f85b9a6d77f6b76f312595f43fe2c938

  • SHA1

    4e4d1daa1ef749d3cb3a566176bfe7c2172e55fd

  • SHA256

    af3f6650a56185106ee5430463aa63416075659e74228f8dcafe8e2bab786438

  • SHA512

    4069528674a714fdef121cd51fe9e428d0abab1225a65fa24aa64aafa1bc7bdb10d2733880a7ba3701bc6c19d251152eb6af202b70f0bdb64d2592bcbfc3021f

  • SSDEEP

    192:v1mmmkse6HLKUhVehPiYDuNYD1CYDQYYDJFYD44jUNjp8jPJjb0TpYDp0pYD/tYA:v1mDkslr76yO9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\styles.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25c6446fade1f989faf33611facbc0f8

    SHA1

    b88b3ca1faf4eaaeb6514c0ecafe78f58e0e245b

    SHA256

    ad55901aba87a2f23380546bc0b2d245d3470daf96793ccc364d0f1466220921

    SHA512

    5fbde3397bb8c84b00f43496cf0f266a186cb9673217b9138165902584f6875b29d7cbb9b72f84742b7b92524d461901f3aa6514cc4ba0873af9808a1246502e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    501355cace48f734cd4c36a93bc28f6a

    SHA1

    c87c3d246382709811fafc34b4ed6496a243f436

    SHA256

    3f856f5ae51517694586dc08a2d47295c35390b45044d3cad9bc398e32474381

    SHA512

    2d257e6072f4e5783b2f52e087ac4066a79a1a123e701114e4e897cfb2dc395858f9b8c57698a509b1158b70160a566c22a9608cd1d6777c5a1c1ef1504366c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99d69c92f3a3b746c8bdcdd876901f1f

    SHA1

    255bd44a567091b2abab9d2b104bde94c3514908

    SHA256

    928ed33d411aa3ada012a19cd1e6689bdc05076d9a40f2de86bc6c342f897cd0

    SHA512

    5c7596a37e8330184cedcff529587444f5c9a0cdeb798abba0b515ee6b1f99fb6498a4446a7036360248e868f52bc8acb7ef0c1cde77114edff2e4f6b82035f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1e7133dea188ce509334a13b1e5f12d

    SHA1

    e5e0824d8d6b7c153e58ecabe64d001a4c919862

    SHA256

    1ef87ea641568e4b0d2c87a635ac3e66dbf59a0537bd41cabf833fd3550ecb5f

    SHA512

    beee79f4e0fe73045f4bdef7b9d6fb6fb6aca9febed9f9f094a64a6f49ee4de781625fb1a85f587047fd88a85a1ed6b2cbf9ea91550d92c6c49b4ecdb85ddb7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebd544ae63e1bb953d434856b6fe744c

    SHA1

    318b08b57b1b40af184f3f0ce19282589e34af78

    SHA256

    e35ccffb8b51ec641572e47175d2d145370688268b40c57b1874a9e658153f5c

    SHA512

    07cb8ea515a6aa4325fef2465a4115af1fe12676c2ca6c0b2c2820aee238828eed428711198e8dc516d402549920dd21415328837c5cfee49596ed642748ac70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    988890bf0aefe951d8a9316658f37575

    SHA1

    8ffd1657fae50c15c470227513924abc0414bcbe

    SHA256

    51e12696bb5782814b32883bfeb340947d3c8e1d795e40bc4c4a8c27d2a282b6

    SHA512

    74d37e924a4aa0e7161b40204a29742232ac117de9e1599ba4b64f44c4203d70431e9fb4bee49008cdee0624d5a8fe16e3539021065f0355377754c0d38934c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51b07f6f3e207bc53ff7f76a96adb502

    SHA1

    2689a4ff04b4a52f55ed3f79954df9a3ed197408

    SHA256

    6edf38d12b9891ba937c05eadfd8b659f4a7a7530de1f04083de68822d8cb24d

    SHA512

    e75ef835afd3633cf562cdcfb2e05a21c116dbc706835c02f7e77a34b98a18a2149215983e789a330921f26c50d8455f0be0e958922a72d22bf83738d942ad13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af0598475f9d218bc90b6280179714b2

    SHA1

    76be9958ef7aa36b34f791dd717a4b884b69e20b

    SHA256

    ab8bd68b546977014052b0f9ef050a56cc6f0806008ad2cad981ee1a8e178419

    SHA512

    bfc4a79dc4641186b25abc170831ba167ba492e118458c7e633086ab5db3d1aaa5f1a681a103dbb2e1f54e25ed8ec0757e71bb5a81f7d105330c5bef5b31b00e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0c0a45d92b6450821cdcc33d30e77a2

    SHA1

    5732a15e02c1fa2bab2b23bdb21fa4b65051ca83

    SHA256

    2b0d4326cee0f3799bd8ba43b7c1d408af457a8468aade392e1b0ac74937dee0

    SHA512

    7a02b0519d18c45bb1b4a61ef7e903809bbc60a8963d943b8df4a43675e88706db5b160c679a0ffe50b6e8e2c98d633e8f1bab9d88d83b5bf7cfa7681bbc6db1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    403f4f0b5691b4b1b156bcfd08b2bdd3

    SHA1

    fa558c67242d4fbcb35cbe28517b7d12cc6e8e14

    SHA256

    efa839fffb67c624d509be5e36793f7d9898eaf54d021aa8e1daba9f0b9fcb75

    SHA512

    3971b90349d503601d03f3890405da9d5d6e9a58f61b734cc0cb51b1050d676281e9d11d9b8bb9cc27384d82bc7be8931beb78aff759c100595d8977a3b870ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb552f9f6c58bb3f89bc1e5c934b2ab8

    SHA1

    527217face1fe476468beca56c4a05c9f62066ad

    SHA256

    cae9c5bb4501acc7da36f16196906c3aebd7051e1a3565ceb948092a7e0bbfe9

    SHA512

    5c40719ccd7183e8bc2b95adc945f8e8e7151b233b5b571c8764b64f6c605e87ddd845679cc0a83a820e5640689943a0e1c673513853dc731bc427d7e3fc1e63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a48e31284d7ebb78654bc5c753397ea6

    SHA1

    3183fab553852325351cb5c0f162d5bd0ba13e3a

    SHA256

    124f4807dda11247a7d95a579d1a3ca54548fb99dd264c23da74c9a8d115da19

    SHA512

    d7bc55393dd2f86667066ea5124fb37b2b467da70db912a92f259dc2f9157b939da103f6bec2a1117fadaccc9933aadc0c8c6afa229a007b96a026ef406bd439

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ff3953338e8e5839c207ff113e20fa5

    SHA1

    179326db67fc796f01646699293864c1fd954ee5

    SHA256

    643a752491e74b12dca9e16a6000a42d238307ff26578e381d4a5587cc32660f

    SHA512

    902e96be78b41a6a854694562ed5e788e33d911e83d1f0f1e7285668ffb3224f3dc5fbf4e5f024b1b6d0a121326866b292461374c1de538e5cc86d3a2a9abfa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6d7a3b234cb3e84205bc673dfa89416

    SHA1

    052f0bfddc783590344064c4ed164138e26903be

    SHA256

    d0fef82da5098bbf3bf6b91d7b945c67c594481727e3d649ac03acbd264b75a6

    SHA512

    004cebfcaf1d40e74c6582bd12125953d32fa5175e13f80a34951da95497504e6688d280f75b5bb4d61b907c591c421f4a60a4881fc3e94e0b4ecdaba7fe6f2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    235c68bf4c4aceff8cd08eec8a150ceb

    SHA1

    13aa12ebbe96a9ab1bd6e1636f1bf047acea5556

    SHA256

    c2ac8911f6933a3fe0b0720c536d2b05d6edd14394894cd85094da66972aeb74

    SHA512

    cc93cac3cdc878ac228330912506ee9ee856c735bc915e04d8af7859565d18864a3f849c5bbfb15f1ae712f2c530053b4a69a7389e8f1c40a5a6d021186d72fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1ba8f06e1c0b63b81941c620c022123

    SHA1

    d868d12676dcca076d34b5a4be71e165ac795af2

    SHA256

    9fa504526fda26eb019fe2e3b5f18a0637bda2746bd348c48626a1031d77409a

    SHA512

    fd20e78d8d4798f181ea44455828fbd129add5656ddb8613c345dc880c6e2cb9aca0970944b293e11fc96ddfa7ca3161a88ef15e4351de6cc3db59df2bb1e4d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3b3ff0b8b608a8b143e416ebb138165

    SHA1

    e4eecb62c2bc2a4303501432ace989e641031cd6

    SHA256

    03171a0ed27de40198472fa6eac31fc4e0d9be930ee6fe7d5ff111b8526d1174

    SHA512

    e21506e0742af2d45f7ce3ca6ace9132f9a5f55092b67de7099b465d961a2daad100673da01f516e1a964465c3f3f294236179cc3c6dfba98fad5cd3bafde372

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cd47b3761b17aff710e3c4339a097c2

    SHA1

    e12c98404ebaf797b259d442f10056435e0eab37

    SHA256

    cbbd0ac04d7d7fea08f59db18d7e05b6e236246fa6a41521dace86028ff0c789

    SHA512

    b5cd6d5179f00682bf8404d89119dc70f061ee4f5964e3422885be481da7f8fe45aa7e58d1053f5f081cc50a4e3c1ec25002e96450c01cbb2faabacb9decfd56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f8fd2691ddfb08f33abbbfe38175a2c

    SHA1

    c9acdba0e40192e812d9c4ae42cd30ccbf637277

    SHA256

    0f6730d18a060f5168076bf392f0bf74ad4387907dcb4695558bb2d9ac69e76f

    SHA512

    527192aec1fc7ab4533d4e3cd84c711615bd38a0e125792da1671dcd7985cab0bc62d4a3c11eb430736b7b93955ac8e30aa802eea3325ca45d7e06581aec19f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3bc45bb1eba4c661a9430e3831212dc

    SHA1

    baa48a55fa4e5c236f4330142d814b9f2e09859f

    SHA256

    7a685e500501545d240048aa6eb22b47736bb76c7031013e32cd2f61d7d9242a

    SHA512

    2e115c22a08f39ac3eaccf85f957620b0968fc4eefaec4b76e8bf9a02a11745ed455e613471b374e4676eb8d90d0a94dd908ed92432d2de8c7a9cbd187ab40fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72597dcd1a76ffb44c949d9b595124f9

    SHA1

    5933d7ff2ae5e43e35d9d11ec29c9f680c105e35

    SHA256

    d3b153d820831bb998d69c68d6f9ef8c8eff9c90fe6ecfe884a369b13886085c

    SHA512

    8cef5c2a4960bc5246b81a6cf08a0a8685070e3d649b0c191d1523eec5e5b6884a39d8d1ad1793d0e89f5ec2a233da86fdb524d327b09954daaa449d45c910d9

  • C:\Users\Admin\AppData\Local\Temp\CabA805.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA856.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf