Analysis

  • max time kernel
    120s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20231020-es
  • resource tags

    arch:x64arch:x86image:win7-20231020-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    07/11/2023, 13:42

General

  • Target

    BOYFRIEND_DEAD.xml

  • Size

    15KB

  • MD5

    67829ebffcff8cca9503056f58a146e2

  • SHA1

    28c537b5599d9ed54592b3ae37c496ec3790802c

  • SHA256

    6ba9038ddc78875bf5f9cb07f18607ff842be5bcf7d7ce8df6d76ddca1979336

  • SHA512

    e873c0a380b940744038eb0d4377a69aa3818613163962bef5b1dca023d895857d1964c01524e24658f6787b1fb3d0dae5552cb83428f7d32e108a228b35d850

  • SSDEEP

    48:2MREeC0EpZo13CRkr2FOYcoRS3kuDm9HdSH3M/2jOspdVFfDVGV0VRV9VGVOV8VB:knRFzrjDblNn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BOYFRIEND_DEAD.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          35abb693e7ff3bce20f7fa1e0052af3e

          SHA1

          8820152c2a293a3a83ec04f5f1bfd06649205318

          SHA256

          a9a061e58166cd8f596df9e0bb0a3efd39ab03d0e2e30a7f209b0960498419b6

          SHA512

          181f9afb65de4748d77cfd671ec52e3407ff95bc424cec320168d71ccdfaeb123b46075c10516e1f635a64c0f0252dc32cecf8bb00b3919afac47e1639b9b7e4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3f46d104b2b222062e18e5b963f99c8e

          SHA1

          1e70be66d4c18555aa40f9373432886ee3e24465

          SHA256

          8243ee99861e6f129b31609ef4e014c241a949ac4453492f600c029784063978

          SHA512

          f4f91d08fbef5e3d1363401b0cd17d607d7e851ea154ea967cf034a1bd9c7f0bb3b18765f6d8bf2c7693191f19a666d8ec26bf60b3ff1fa4f537694e4d7b452e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          427bcb1822854ef2971b7e97509ae49b

          SHA1

          634bd7578891437641e46e214345a2cce7f52059

          SHA256

          66dac4fd58fefee95124e70e77bb1a2a1051f9d13fd56125a9071d8674610791

          SHA512

          0102fe989852a9e402388aca93b9c617f76d41cbfd4069e0764cf11aa029bf5583258750138532c5de20cfcf2f029cc9f0dda7c599786cde4f023245f1d6ee45

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7f3a2c25b1bca201384e48ff4a510aff

          SHA1

          89f52adc2420e7b8748634a2e9a1a4192f342fa5

          SHA256

          46bbd49441eb744c210348a75cbcc72efd23851399b479a777676187769a2903

          SHA512

          7733f1371dd30778f6c67811a5feda1233eab3775696111d9b89d97d752991c6c544e7d5ded397fbddefbf076d373247a617899301830856d4cbf112b769a67d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a7c94287073729e6d64889c38bfc4529

          SHA1

          72cd25b42f8b0ab80f9816b6ebbb744d0aef9b54

          SHA256

          4dcbed578ad57d418a448978b1b4c14e59efeed65c60d1ebffbfbf923b834c59

          SHA512

          79b2eb46ee416bc39ed0f11858f4e48cf29c39e86f777b11ba924c287fb667dcd76725ccc327dbf902f7da26cb1bbb08ab9c96ecd026643cbe9349a01ef53005

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          62cda62715d7ad34a119ab67537503ba

          SHA1

          27bf22546624fe9624c06995730e636d7be804b6

          SHA256

          3efd9cd13d496e847cfd24f3280c58872ab9f4aa2f7a70d4b37e0de0adb4cda1

          SHA512

          3c1c678e4ff0e99f297bf6f8d0c15e53fff3b32034487b5bc7e159321649ac3e1cbd4a5ab6dfb3703ae1e4f2fd433e80cbbe3313ff0aa8330fb40aa398501193

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8378a4219300225eda55b32f99ef7d80

          SHA1

          a1aaa6ca246a316ec7a46f5baaa45de365a13435

          SHA256

          eb38acfb64f5943d0b65945036b6bc1aac68b60a05947a4d7140180377d5a484

          SHA512

          64dcedf0420134ba87b142c866893d811c51364b8e62fe3eb6c1c1ad125c69b09ba2060965e00a5c1938a53b0a67652e84e0a4e86ec075cd13fe35f45bc21e0b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c780598c8a752ca7a0a7d0e819a6e741

          SHA1

          963b90cc9e219520fd7c469b97b9caef431527f7

          SHA256

          1b33a3afe8b02d7d9ecef86ad04f3c22f86ca7be479327fd70efc885ee131ce0

          SHA512

          c5a3946700c9d0c16305bedbd7f4d25ac7de97688105d1adf5372241914f92e2cafbc279705cde88c710e0538093884463489843774aee114af744894c6cde03

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ec5402978d7d6f9ca24c8889051626cf

          SHA1

          26cfa8ebb55175d4a241746d840147ec76106193

          SHA256

          df092bf9f2d4caf031be475df7098405ac782bf883afd28fe931e7111fa39035

          SHA512

          f9cbd6180dea4c0ca0b67ab401a65a3830bb96e33d03b679adf4fc0d9bae9b04429895505328d646e306539c7b8cf3b3484fc903d5b85bdb68ad880300383302

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1a3a23c51ee3196b946fd94ee51db2eb

          SHA1

          35bff0f7ae9973cd7b62e51f478c0348527b5282

          SHA256

          3ba87204329e1c86f86284cc8b782cd04327b5c93afcdae7bdd7ef2faf638140

          SHA512

          73a7fa7e06bec20b6424082c6b7ea531b6e1bc0de4a89667e6f35af1883ba873aea920ccfb468bb6676fe10e63f885f26cd564f2316d2ca81f35a98ecac6fde8

        • C:\Users\Admin\AppData\Local\Temp\CabC61E.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\CabC6C0.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\TarC680.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf