Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2023 23:23

General

  • Target

    word/webSettings.xml

  • Size

    14KB

  • MD5

    9753d3dd5908d03780976e9cdc226eea

  • SHA1

    058e8770c5557b8b6cfd28fc54462ec1c0b16e73

  • SHA256

    3a759be3223c8a6be0aecf77b734a84f913f204415dabbe19fb463140caff320

  • SHA512

    9adf3578664bd81756cc2928d14f1a766fc2284b4974c36dff0ed0fdc30be87aedd957db3c3c503bbab2c12d1967adcde8ca81bdb01f4342ffd7b4e2bd2491cd

  • SSDEEP

    48:cU41mNYmS+B1+6+T+y4+B+P+NDUuBTUxDUuBTtDUuBTJyUuBlgAUuBTHDUuBFqDb:e1mmmSwH2O8Q0L4Jh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\webSettings.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ea0ff014f1e3f48a8cbb47f7bc869b9

    SHA1

    35e53e06dd5f8b2e781b24f4b8a79a2326489cfd

    SHA256

    6f00244368d247a76ceaf20619c089d239149278f1d93d02e4e85bbdf9290008

    SHA512

    df5e2c6032778b75d9d1900c48df2a06d0c7f926fd16ea8e7ae3f9b8e5c402878e72d3c705db91c591aaa63e13cf7c991cea88cd7b03b38699bde5cad5cef60c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74c5171ec7d37d00466050c75d8a0292

    SHA1

    eaf50fc7d7311008fd6f9245ffd55c830c509aaa

    SHA256

    ab9cc17a1bfd0bc5794e2106bbcc675adc64fba0ad18e47e647813d636b956ca

    SHA512

    e7263e9949588d13c9a3f465c7e341870ffe83388f0956ae3c88a97a48e6c14049e0c257a571691ecec9bb2db5dfda44fcc62715d2f4b8af9e08fe1f80eb86f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38ce90650f45478b1f98be00eff14d6b

    SHA1

    1b8ac185bce227a2fcae7cafbf3aa6b58a6fdad7

    SHA256

    1ff3a0e4da7badcc5be45b24cd442ab25113ccc21efb8b5af49c9fb02df5a462

    SHA512

    60a6277ff32680028e949e3552a98cce9bed1a21ac38d1c2970d244f937dbbd8af469c2d4c330536413f01877b907afb2048ac28799a653137f991d6ececd5b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d61ffc74cb9804da863900d498cf32b

    SHA1

    3128cdcdec0c939d6a75330d8b42458cbb40aa97

    SHA256

    7a3781f8aed66327aedd548f4067d76baf116e18eef4a4d25070028edf9b3e9b

    SHA512

    545495d0c78ebdf5dce0f4f965872dd95b66e1ef800de378e1cf2e0dac211c83b6a265cc72dd4d50772196d5e06a8aeff62223f28e51f7233807348d4e7e7a6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6aa0112eb3c4a06e63ea3fc86781539c

    SHA1

    bb0592dcf4f1a0f3a5f816aab374238baf6b88ce

    SHA256

    919e461ccb44dd1532ae769b3e87e8f163d8cc56900d9e63d6a9175a7dabc4e6

    SHA512

    08d4ee2c1855434c29dcfe858c55e73819e2cb818d013939d9933d2710923ba62defcffc70a8d7396bce071eef054cad91e22e439478aa62120d1f1170221121

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26bc8b7cff9f72beb896d898b054dd8c

    SHA1

    95d2762888beea2321869c7fea49105a95a1b035

    SHA256

    234c05df6ed71b9eeaf7e88700b33e28594cdfd65bca881429eff487cf31ba5a

    SHA512

    daa38217b98efb89a1cae73ad465ac22c9c68b8a801f385e36b78eddedc8ee5a002f40a4d4892e13f32bcc8a5026e9137e8eb221c5bd7cfb8a5c3ae2a9e1f540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4d357a003158065d0a52c6d1d257e1b

    SHA1

    454f98d8dd0b671591750e7d5ba7777f2125c83b

    SHA256

    2a1f2b6c77563ac61e6a47a6fe3d1e17d5a584812ae1418a76e0444829d42f08

    SHA512

    f4ae4d64398912376457d587d31a3c4da532fa438f2ec4fae27f7492f57d00885d28080dcf287cc3e95f244e073b1bab5ce013254cf42a7458d8fe760d8d53bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    983b797c40285934ea07482ffc19f494

    SHA1

    f2e2c522a4993320fde610337f354596550419ae

    SHA256

    72bc2f3f62cb32eb155f92a973eab020c479f267e4f2a6627b821bca26c8255f

    SHA512

    bce8de2ee01c3758dd62b403669c812cfb8ce89f333a32a2cff99c3ab25d493d489d3caff30063434ca228242743912a611fb7a4b656601660a2161c6dd58f5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6c93d7a205291c6228013d2e3897d12

    SHA1

    ffa22eb45f76a313c5ea122fd4e6e89b11f196e2

    SHA256

    565dbc2e9642ec0ddc46091257adf3bd5e275a4c4affdf19c5b30178a391dcb5

    SHA512

    628f92fd051354bc4df4e9394324d0d454d4a961192a8e126970dd1838d2ecded46b98745e70c5da46a5d7c286f5e05298ee60466a2810f19818e50b5e0ba7d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f0b5f9e7ee8427c5b96b9e8558a3c3b

    SHA1

    df85afe81368b523d50586ebbf2b7d3268c685be

    SHA256

    d4f434f3275435d9d66aa243438d1df331dbae449d1f1a8eebac9d69cb6648e1

    SHA512

    8740cb451b1fb93de5dca2e3e18763aa199b3456a2a4e11adc4f77e36c735d35ae7bae067598edaef745112657c80611491cc5af0e035564913bf2a6fee3913a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3bf03a2ad31143fc4119e1e7fe7b507

    SHA1

    e6e95e096a56b7c02bcace06fdf282e4771ccaa9

    SHA256

    90c0f89d5de98736da67b25e259af36858cb86cc22871860b6af8db1ea5db9e7

    SHA512

    49cbdf08d23678745a9281d9b5887d5daba0727f51cfe591f736139c245927573951ff69dc008b6a1adfadbedcedbf65563277349be1d7b178a4ac8ce8521123

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e5ba1fb58fbabfe3b827564a3c0de00

    SHA1

    b7b5d80469ac533be4bcb37002665ef049d42c5d

    SHA256

    5ab1e050a50389c1cce6a236dc74ace8e2fe70b6a1d5637fbaec3ff23a4f438d

    SHA512

    70643936787e6da52d5bf1413df129516a1ae7cc8811446d6cc309ddebafe33ecbf7b35491af9aeaf483571c2f3218897438d4bd806726218a0fd7ad772f25c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4def32940a9cae7bd8a83624e9a1397e

    SHA1

    50dccb6e8bc92cdb5c73e37dd0c8c336f41c6a0f

    SHA256

    ccb800c6133a69be82f479e914fe56048dcc080ac089ddd941416c444e3ccc9a

    SHA512

    2fb6faef8e770806e2036f05d9158d074dd4133b2bd1f170220d0edb17b3f061a15832c8b3dc65066c7106e175ccf079cb2336eaf247c5f64050f7526b515fa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7c4a40396e389c56e6b753c17c433f7

    SHA1

    8f1a1338c1e81ad5c7b92959e12fc9f556a8c2a9

    SHA256

    e157d4e657162c62c2014e4bff198cb97b02456be4ddbdbf842a00e32eef6169

    SHA512

    ece7822e66578f5572dcff9ef2d4d1bff7cd8f60e13efdef04c041988d693ef38bf743aef46184b284f4d144c0c986ef33b012ea0e44e1bc5736bf577b61c0cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f54a22b6c4bc8adba9ff2d282dfab09

    SHA1

    a1c2c66dc602acda8631c0d256b4b13f909f465b

    SHA256

    efc80cd562e6902faf6811110d21414deba08303fc7dd8deb1a55756001082a6

    SHA512

    914be57d3b9f3b9571a4fcbf69c7e94dbfe3537e8d8209dd093944989e793d4b2a88ddc789eeabcdf0048f4d88f83650edb0b4057971bd636e37a7bb2dd9251f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa3252e8b0b9e97527d8bf478b458a01

    SHA1

    28a905fbabe219db13414311f993837c8c0629cb

    SHA256

    793af347a03e379509f200bcb3dc1764a27f0a7818de0ef4433bb829102b596a

    SHA512

    ac5433bd23877d007ce2d90b94ae18dedf564934e830aa0329a7fcd0b167bb96553d87dfa259a262d77f7996656a777a548d865e8ea8cd4e21b1ba8a0307b746

  • C:\Users\Admin\AppData\Local\Temp\CabCE0C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarCE7C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf