Analysis

  • max time kernel
    196s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2023 11:23

General

  • Target

    Windows-11-v22H2-Security-Baseline/GPOs/manifest.xml

  • Size

    4KB

  • MD5

    d7d9ec9137ab52d58b7688defa3749f6

  • SHA1

    d93c1c365f8ae7f0b824506f76c544b344c65597

  • SHA256

    f6aeac12e89546fd02fa522bb5275c442dc1b3f6e99702d2b7df83d598f09022

  • SHA512

    7ea104ebfe68546f27cd9e92a114b5e3df600f8f1e363c8331b91f24691c9fcc4321ac8900b9626a4f2a01717a1a46017e0c7a17a7a1f3bad836df08672b6463

  • SSDEEP

    48:CJ+dIfuiPLJdUiY9ydciekdOItigHdLKix8dmS6i99djmCFdxmcH:CJ+d6LdpdTdOadLwd/drdh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Windows-11-v22H2-Security-Baseline\GPOs\manifest.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ff12c4459bdff9a62cc833ea32d2f3b

    SHA1

    6ff3378f36588b6073bcfe705a0c20a6bdce60f8

    SHA256

    28096546e01d82a180a95bf84c80cae22fcb7bfafab8d4b1efd0faae85b99cb5

    SHA512

    062be42374e242f7b412a4339c0223fa5c7484b7be6fd820e63bead4d76b1291fe16e29b30e087d195c7f3dbd4463062b58dde76df90c09c19f9eb5cfa72698d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ddaa81261051e0db9a43262bc3ac8c2

    SHA1

    0c59164904fe2574f24b6975c37322b3ad485092

    SHA256

    67f08ea00eebb84d07377e20d4c0bbede3d4ad2fb96139da846b40d565406e80

    SHA512

    391b4175df81925ae4d59bd3fd04ef7e97a9911bef53f3d786adf19fa2ca0be045c2ad6700dab0ac93eba119f49a5b491b484b7a8faa8996e8bf71747372aacf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1b1fad6b7ba0b1d513c2243c6c019e5

    SHA1

    a6c826db350f28aa9bac3a94bf39e692417ec0e5

    SHA256

    6725efabaa35f2b2e223dfc4b12c8f3bae77565f0c8235ad37b324769f6d88ad

    SHA512

    ce5fee03dceab53eacdc36482f7f4d38635525e9e5ef7246c5c426f2fd2452e5ae140c121d3d216213a8cfc20fbcbeb3ed1ef04891f019d1cab09c39608ae2d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46ec1d5aab46cb87e27dc53dbdb296c9

    SHA1

    02bb672bfa0bc697b07056f50d52ace1ad3d0fdf

    SHA256

    2af2130f68aab9a645d6e2acd27f1b271a1fc6e365d93f29efb4df63a47bd545

    SHA512

    c7d2eafb78fcbfe1473ab606f53cc540e98ce62e6f69108832fa49037d86610fc8517509d4c3f91306c99fd8f2eee46231f437883a385b62dae602984de1c7b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e02c37e2a6768bb7c204be119121d8be

    SHA1

    e22f5f52c05b2abe4cdad756eeb020f1576646c9

    SHA256

    d589d75317696b900fd1feccad518534d9c1589ed2d90317cf5039f5d7cbce4b

    SHA512

    4194660d760938b4ee35236e41a0033c20d8a42c6143d8d4fbbda7fd91b8bf561ec737e00639eb6aa655307e2aa0bcdd7c3a696709d37f0dc70b4430c69dc7e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01f509efa6324ab3c45d84947237fb2d

    SHA1

    2affaa866a452d4013994636e6e5404234a25d2f

    SHA256

    fea5057439bd652eb6f1e2cc58cf86c6e9fdc0b4c672151da530aa275bd41044

    SHA512

    4b055e1e4c010f91d91b1f35db37039869a9bdf7468f6db5ec7fb5a28338535fb0ff8a322b5990c98e8af67de2caa9e698bf19cb811c896c9456898a74cd5bca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e675883f7341a69e0ca92ccbc8b8def4

    SHA1

    124d56c09abd94f97b7d7d54e3b9782e8807748a

    SHA256

    3a54ccc7c3772aa6228dc0e73b262019f45b0f5b9e49aa91e21f0426c07c45d8

    SHA512

    023a98f67d64db3d9dc43dc3026cd50d4c49b578d261813964b631f82e9c029098b21cba64cfd40d422dca29aa4bf1484641539b2a7b17da7bc810f1fbffca55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a36a53214a60f8eb04974974355482b

    SHA1

    b8e4edb163375a2a952e2c64b0fae5fe0bbcdd66

    SHA256

    ad3d13ccb56725da0bc6f2ac96420e96f48045fca7644ec8bfe1770c4334c57c

    SHA512

    a9a4995951bb4e078d7de3e411effee985f1170f2a021e6f11a096a7b1c3d7d5690f63762bef94663c73d612dfa488073f551a2ec991e59346a531d666db2a5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c853a169a88cc9ae94412585adb6a07

    SHA1

    86f9783f67abbf74f8cd721141891abd45fa2e39

    SHA256

    6ed5cc21a6bd0cf960daf476915d9b66a7c1c35ad7107a798104f63715914280

    SHA512

    43ad52c5adf7813625490bb0b0cedbf553643440430dc11c8a3d5e5bc32991ba0fbf57346763c0719a0310d93f9d2d72b095d992623f0eaf19b067f015f7266b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1433bf8775910addb63fb963349f362

    SHA1

    61b40ac00043248e280573476bc785125e06dd8d

    SHA256

    77faf79c14359a05786b9450e868062770f65478bd14d93cc9ff5de221ba5675

    SHA512

    5e62182bb3d1b0dcdd6e4c30684d31cb60d082fdd58abb7856413871b543f75ce966f5814b37f4d98a609875e4ceb7b8b7d16c128e490e86be08fd282f44a345

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3dbc7b1d76855117091e1c7bddb0757f

    SHA1

    12deb880a04fb3bb3c8125ef9eca39be9759c570

    SHA256

    66bc916a8a856aa26915ff7324454f2acb633551d47e949a5c52cb111363816f

    SHA512

    eb0bd8711a4a58e5426f83a0eaee79e39761e5ac9622e3cb3121fb8e2b7bd6ce26c0eb031c5cdbd35a74486bc3ad28165fed977d0563dfc592e6b5a4fec56ff0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4fedf7c08aad0ce34999d3a5dd389ee5

    SHA1

    cc21cc27a9c8fc0eb00d9dc9148a6f8f4dad3d25

    SHA256

    c0e2731521565fdbad4e90a5e4053cc961f40f1471bcc4c56daf3eefa52defd0

    SHA512

    1f51421acf4a727a744966ce02e019911266e0a9c812c1f5d32032ce633bb78ed28979dfc061e639703923a53732fc7612fb853074db2f8a446a9ea497cf2243

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    483823a955f87c182b783a7852abc976

    SHA1

    332242d10520e999356d0755e8b0aae1dc00d421

    SHA256

    64b0b1c4ce60905d08e47e53c46d82dea222f0b5a8e45bed2ba3dfe3f8cb38cc

    SHA512

    3bf981c25221a2a3217c1cb7a9559e22c7b7272be0f1c8d2ba73a479482faf04087cd5f07b4d6655be31aa784f1293d23e9db81bcabf9e628e240a825340e962

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22f6cd8ef620d11470cd1a5020e4242b

    SHA1

    5f024b92a5974443ab1c1b9bc63619bf6e2c4f52

    SHA256

    8000a09217f82115355d491b2805cb079af4e1fb1b1be4d4a6889b4147c0bc72

    SHA512

    8f1f4ebc2095274850fe48f5fb7b8930a81a24934218eae692a1f70fc5c4997c094acfb7a978915cf52143967f6db252e3a0105647641d0408dc13caa823648c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01c1300ea146028b07fbac9229046e8f

    SHA1

    d72748c786e5317d864775606d23c2b82388acf5

    SHA256

    f940bf54e0244f6a1a255fd0feef4eeffc6de93fc71792b1a01204fa5a6fbfcb

    SHA512

    128b196e4d9d31e3d8220b3c476948c3d80b7729bd9c80489133cd71415041fb23b58a1fb4f62870434f1336a3e3c94fcfd3438cdb13c71110574a41889a0d83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bfd72c9b537c36ab8e1134562b751f4

    SHA1

    319075f13e4724ce8f442ce9a48a26d27e6bfc8a

    SHA256

    64ed93e67bfcdae67b742f7505f0f05168fe4e2227e5b9aa44dfaec61e6f5cf6

    SHA512

    cd19ea341041472dba9bd5f870d863aa0c2bd5479339fb84bf8245d5b0f5937a3bb7360b2d3d7320b4b8c3ba43eacef27c8a8a861b4fd0ad3b1dcd16d06c54e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b8745d5714f2d48f50b54c098f0fed0

    SHA1

    7c84f00b1c74a4de12108f55a52ee3e39fbb8484

    SHA256

    db40d5af9cc73518598e02b9e0bb8e0ca5c54d31e74be5499a23762b17909ec8

    SHA512

    fe12c9bb1ea43384a40880cef5a854d439d0181446bdb86bf2e96b94619c01ec0c27de6d02422da4a32f06f2821f2199061cff5154f3c385f1d9b5560ec01869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bccd03936c9c7f92c5decd044fda590

    SHA1

    df828241ee87cd7eb9430a260979a3ba92143628

    SHA256

    5c5f3cfc7414162a643c99f54bab386c8cc1e0662670231c1bc0b330377ed649

    SHA512

    1d0f5629455d366665d2b83c77617128dc55d2ca6bc4ee3be9dd22dfed4c558e66ba02c50d901eee352a3f4510786f0e0b56ee507782704d3e3d8056ce72073f

  • C:\Users\Admin\AppData\Local\Temp\Cab679C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar681E.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf