Analysis

  • max time kernel
    197s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2023 06:53

General

  • Target

    config.xml

  • Size

    25KB

  • MD5

    f34b330f20dce1bdcce9058fca287099

  • SHA1

    936520d5bb5c00a1985d7a4c4f0ef763a9031862

  • SHA256

    0c56e34c69124510fa8c19e7b4c2ca6c1c4ff460ae19f798dd0ca035809e396d

  • SHA512

    d6d4a8321eb44c117755a41a2590296be86a0568d27a5347f9d7f32f2d151d8f7e169675c83faed2dab5ad0f8d81858f8cd1167e439cd4bff7e68c243e3544fd

  • SSDEEP

    192:Bt074zTxASaKp3T7pJsPpPT8B13eeaVonGdEBMmhVbeyeTfWDBzmAwdavahmhNIa:LAMDp35JyPCCu96yJwgag

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\config.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6b8c1cf48a9e50c230ab1c3197626cf

    SHA1

    6960a237184821527324d3701243080f9ff75909

    SHA256

    75ff75a629f5235c1a4b16cc7c0619da62e6fe2acd19d50317be503118d55bad

    SHA512

    56d88ab0dbe955792c7a57f5cc5a300d6579c4396885d5b47512f43be2d04029ed5eb274bc6b0643ee8813622c1aed40b8b5c84f6d91a060b3e08933aa67a6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd912ac32f057abb32f88f91633b0be3

    SHA1

    459bac1ca056992eb8ee181d9ad73746f95907f8

    SHA256

    557f5be47d9ed51790df65803ab8037f131fd3182c66aad9f5e34e5b66c70194

    SHA512

    438eb622c97700c1f33cd076d9f84e5319ce0c8c72e1e87f44a2ac53e1cc3af13070f404c19d23d84c1117f6b29e5a64187598dd393a8445786fed6bc44c62e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf13f54444bacd210c044f7717d64362

    SHA1

    1513724d4428b251c22e8b503777b53e4f119736

    SHA256

    77a0d7a0aa9a37a2e3424be59fd4c3ee38035c5731a2d45ca7213b49fc23421b

    SHA512

    1c2837e0016d09f3a8fbf5f93329b3cc16b7555ed96f4bbaab45467cd827397d11421dc674753fe6b08a3edce79ab0c821495b5b4bb6963e3dcbd772882bdda2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efb7f9bdfe29e070607b22ecc1d323ee

    SHA1

    eeb7de8c62513f57e89d54895ba66ee94e9eef96

    SHA256

    1dbd1520208cf1b824fe490f07fbcec2eb051401e9cac96d3322efe0f775e0a5

    SHA512

    4a59d744f45587bf8e3d62998fc11fd6450de7a1e2cbacaf9407a06ce077ddbefc64d23251721d0ae4c4ecff419ce573c2b7ac1ffcdebc72630ec7bbbfe5fac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fda7a45c63ea9df765fba60cbdc35bbe

    SHA1

    d7d22d33f3a70fb8a9aa79c2d7e4c01429766ead

    SHA256

    f0e2997fa850201d32e2b73cea4ba6330477299b6162330ad15511e96e9f1aca

    SHA512

    46f26925d81b8efaa3e89663d63b05d4d281b0b42efad2a3720931047dd201c9fd367d79df464dd46c6a6c4142f14f596936d45a8f347fa15a645ea283e799fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d39dc9a32085464b95503e39d71dbda

    SHA1

    61802d2a40e77ba1fad516da44b22b7246c83cc5

    SHA256

    e6b1a9426a4f886cebd56ed2608f9f90fa1ee0e52ce3487eff6eca84198f7d93

    SHA512

    e1b7186535ebef593ed90f7d0b530bf0c2852fb3cc197b447ee19c3833abc61bae6337a3fd8d798e099df25e73a139439985e069cb1c2b5cf95bb72392adca73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b00b1590fcd1bfc1f66b14a0d1f97d2a

    SHA1

    704e5590830c23cbbc7420cd26ba8699adae053e

    SHA256

    e05a429a74c53de3a0934bb036ff2ebe4a6faac42babedbb403957a0bef6e9e3

    SHA512

    ef68fd66da7e08788238ee911d0625dcfebf7aefa62f26a08ec4187bd7dc2b011eb9f5b232b8ed40e67549e9871ee822e55a8e7d8ad296a1482868dfd82203ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bbc0766ec622ef4ba667cfbec336f0a

    SHA1

    9f4c752f9d91bfaef1094c68a1d7aece13eb13e2

    SHA256

    5c0d02fa4db5d15e8db0dcd95fb34929bdba1c8a2f8001362a5a781f8173bb8d

    SHA512

    0d94d88c412a55f948c0e1c56f9f2485463f3d8c7169c0177fe4a4533080373090f96008ae8fc689b702b7edcf32805250b8a43e853234a2ae92ea25056279e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5820b3b475f6342ac65d84490d31b38b

    SHA1

    2983e553b71c57235e29fe860352ab813e4e2323

    SHA256

    31961c0ce3674659c8358245618924f84b9521df8acb3d5df564bea56b20138a

    SHA512

    9d7c3563ce0ce53ae34e18139623843130d63647ff5bfe6461674ce6f26c9b8efc7680149fc3433e4b7fca06efe37cbd07503fd7ad060f01364b1ff33bca09c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    289071b867ce1b5bf6ee28e78d223b4e

    SHA1

    0e63e1abc1b8f5522a7d01215c09e2d7f1fd429c

    SHA256

    8d9ca6d407163875877025855149e3c65c71d47d966eee18fb005b4e894053de

    SHA512

    430ac4e2241c3403682e02450a966278148a5e9058b36a6060cd10eb395516e87460be0fdd40710b6ded9108c79702b242e335a9cc2bcf72da19f472d5620546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa6a215e4ab4c1aa395f781fdd4efea5

    SHA1

    075236db34b5550c2e8ce626315ac494c7212841

    SHA256

    b161c2b6a4de4a27792f7d955ae832c05c305da6b51f9868de547f38ebc23e8c

    SHA512

    b5bef16ccf8c8f43f195e20465eca7d9cdfbc6d03cb2a5fac51036d061a677ddbaee9b1f939cb073022629ec45fdba967a42cbde9a02f16c39e451821bd52b69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce25e0450c8a4adea63e039e0c4416c5

    SHA1

    0dd5c10bea8fb74032c42edf75840f3c18a672b1

    SHA256

    69a81e7eafb2019b4f89515002bdf276eead8977976d7c50eac721f385087e28

    SHA512

    e5a2bf7c8b4755740a6b8ffdf65f78df0a272cec8d0032aba1fc9ec332bdd62f26056527b1f7b1ede34be7e773f6bf1a52064864648406eed4a3e862f7725f13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    782f56e80a95d76cbf0552d46dcbaa02

    SHA1

    9d81c6eb371728cfc9bb8b93c023b1246336cb59

    SHA256

    721c49922872bc86c8f7b91ae759c244e056e8c8e0eec0704f6392727b803621

    SHA512

    435f9a672f34a41ae7b6562fe9057302050f8ac621f7aaf583bcb516a1ca52be55f445820ab8f6bc526a1eefb57cc17952e0217edcd898e29d921cc0124e3041

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22515beefdd903830b592668893a1768

    SHA1

    745771ada908b5fe80fb35178cde8d976ead82eb

    SHA256

    50894a2d5342edb3dee4046a700dd578813e49c7dc4e00349d87951fba41018e

    SHA512

    e1b898f2a8c84fec520b57e10f822466469d41fc7c89c1e6e944594aa0d792c6f8c6a8658c5878e4a674517cc85f43989a15b2194daa401401669d1b7077c819

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05b3918c733ef76274be12c227c2903b

    SHA1

    04b14928a3ce29fac0398cae166a401bea3c2b4b

    SHA256

    15b2c579234bd642d9fac4c9735182af7e1e3622b726d2d18dca05b27de533dd

    SHA512

    3eb108e2e453057c6144c39e419f008ec870ca88cea6bbaf345cd4ef65e81ac0be5311115c055c4aedb288a8cf52b26b184f895f39aa45e6e2bf4d467ddfbbb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c75d7cc5bd324481bfbfe97b0c2577c

    SHA1

    ed7cdb8265ca2f9a295b1ec5f95bccc52bc96654

    SHA256

    19c5dc1076373d35014c3659bddde3f095cafeedb383a994323ff6aac84c719a

    SHA512

    c2f625193a98bc5911be984de56734f618a577ed1b79a4ea085e6074ff3f476d8d3f789b5d639aa91eb8caaf64ec88d8ecdd53b521ccd2682a153e1b466b39a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    301b30312684ef9e86b4d0c14df93521

    SHA1

    3a924235182e884941a7dd0902f06c2f7d179d52

    SHA256

    ef64973346e55d595c79b8ec9a706095420f57687716eeb8ef407e91b8e1b600

    SHA512

    68cebb5d61ba100715659437fb9eae701801d995ecf44a570585c2cc8115e5b37bb0ab04dc17858cb4ddbb13861a7c6466e7d31c90a138ca6e23810d2a233979

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c117819439543cc595f3943e54d008c

    SHA1

    30ed27bb49664cd77df7fc76f057d6953b3e61f6

    SHA256

    d475cb48045e3418c6431e64834aed57d9e0eccc2f5070ebcedb05365b17a46f

    SHA512

    5ca8287a6f055e6eb73c0b8c9b1d5cb496641a0233950c399432845dcf9e909102372dc4c7fed4dbe90ae69c751c6ea441e5d3a94b14f1333f39101cee7db619

  • C:\Users\Admin\AppData\Local\Temp\Cab77A3.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7880.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf