Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 14:07

General

  • Target

    PingCastle.exe.xml

  • Size

    5KB

  • MD5

    d48e4eb4934fe37f4c9ac4338ed5033a

  • SHA1

    2c7adf2d73fcff43e5dc7edf98593a91c3e62248

  • SHA256

    9856160ad715d129189928f7230152046fd6da84eba9ad969375eccef64cce36

  • SHA512

    16899e1e8a01ff8c5418c8abdff90e35d8d742957c85715513721b80a9288c13626837607c9737d2351443a103afe87af4c634c3ade6e5be123bde1f52949928

  • SSDEEP

    96:NocMH8el3K6ypFikhckhc8aRfMLDNKhil1t5M:NoTcWypFiicikVMLDNU4jM

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\PingCastle.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fda71446e973e035adb02a99cd860b39

    SHA1

    dddfcdb6086ed13f7e39f19d0f72a87e1ad85181

    SHA256

    3c77eea7f1b3c9dce1550f5e692b3db754101a153222ad1ba46413a5fda244ac

    SHA512

    81e9631f47f0e434d8e3f50c9785df9808c6688c220f263445b690b32b13b55953f9b93cb20c5cdc4a4ab7b871d1cbbf52792b787c2c00115bc1b771e5f1c00e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed8c31651dcca39814689d568a7c49fd

    SHA1

    e692f6262c62012deaca85e1b60547b2b0b0fa9d

    SHA256

    8bd8fd3c530b12742c40c6226eca06cbe078e3b1df8e6d995f9edae53c09f994

    SHA512

    bdad6d525415c4453ab2585b373f9c32920e95feee9741fd4c5237d2cc44b0c1c8d84f471d5cf13e5d3005f648249c9104aa2c51ef53025fd7c96efa37201c9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5320fb65783905b0da5a8d90c01f25d

    SHA1

    06df8c871d48b2635af3db8ea70669a835f8a8c9

    SHA256

    85f34d15100ccdca18fc0253b9f73ed39710498462d9009d76c0535ee96c6a3e

    SHA512

    51fe1f2b60bcfef50ec6e7a4b8f051cb0ded42c03f10ce1b7ca128832a308d5f016af4884bdc448ee2b86f227882fd9c7e885ba26e88b77c9c864a8e3b2e7835

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6f832fcdbf28d0f5e59ab88c5f26320

    SHA1

    46396846e201673cec6e05e1405b089565c787c0

    SHA256

    599fb3977ab1d06ad8babc68aa5346d4ad155224f2cc0239a3c68b80c6b3faf6

    SHA512

    4ff7854fa9f1e91b2cda7cf0542841f83bedd310376c7d5e7fa1f2ad44daa29757332997e6b2d4172e317d3603acdb7c7b2f2b85264b0d753128da576d333397

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b0fc3dac3ecfa83a5e07389ed449676

    SHA1

    ccbf7eb099bce902a22bc093086260582880bf09

    SHA256

    1c7724e28f4ad1ae4b47bc2c790f5f35ba2f04795c7941ba2ec8eb1c4e99351f

    SHA512

    c42c201f899a12f7b94cec4c9304eab0aedd4a1c5b135269542a1a8e5693a0e70bc222a02815ee53bd62d423e1ab6e92797f5cb181423052f4099becad2b2bb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c62909e3845a3faa92fa04c507c4c63c

    SHA1

    3f170c4afb4eedcd7b3f25fa547e9267d74bca76

    SHA256

    b068c08bfb91b9b8bb93d697ec8f9ff9f52df7ede081eaaa04ec06e7985045be

    SHA512

    e2fcbd76ab8c8bd5f18a85d5f4e4dc5cdca869bc3204431ebdcc51be534336ba30503b14076319ed75973bf5338503f82654e006280ed93283f0adf41800ca2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67410dc94a17f0478c6266ed2c08e235

    SHA1

    cde845225570e2f8539b9ad088679206a4e95f2a

    SHA256

    0db660e5c24c6e9f06bbbfb385aed743d2a79f7403743ad47dee6b3bf0d7a3b2

    SHA512

    8a8272daa80133f8d72dfdf2da8c33c11c91aab865e265281afc41b06ddc418e79029251e3c7071f3abc2835f5d578e08c8f56bc21207fe5762f74530e3b2081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6f9bd15e522e536eb2178a28938e863

    SHA1

    542d1b6df69ad605730117e10d3b3b1fbf163ef8

    SHA256

    23cdfbb36836cd3e4f21b9d2a3879d608607d749dd8b15c41288ccb952d4a340

    SHA512

    1747ffe4680b1f6b2e66d43f474451dc3a03cb2bd2bc0e7501b5dfe2932799c83f29f25764e1a6f2fb26f9b6837a70bb4d1569abd287a4885b6e88f1bcaeaed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b48ec960d065f63b74144b2060887e9

    SHA1

    2b2b16b65728e31b5cb8cb1a650b975395a3e1a3

    SHA256

    1e44ee6843e8d401c86b315bfe26f172b753b9852247258b694301f8433c2b5b

    SHA512

    a7e103165f192a767f0688fa5e41a1ea51e2e1d42952f02c97608f3a1eb8a94f34eadeab88f1c4444434e836880487d9a312b8b5f17fc0ecf981cbb25312f372

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdff83154cce059cdcd1bae96b70c513

    SHA1

    0db43d40032ae56057dfb3f78e039950f57888c2

    SHA256

    571c70afdee6c7edaf7a0f479ce851cfb30269c6cc20293132e6ed84c657f57d

    SHA512

    15565869dd87b4a4bcff5179d2a394e1db1355e4b116df5bef5eb9a6e2705127a8e371cce31d3483f403782b0fb8fb1db037635efffda52f447a09060baaf73a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e957b4f376be0bf23c2aa15d7ab87826

    SHA1

    b7daa45eb4be9110505475ffad08a288dfa353b3

    SHA256

    ad6eebc79bdf219113ff6a0a9ade05172968023ed711185b39302e85808b01a1

    SHA512

    d4191b9d56250218c8edf80bfb7425cff5148290014200c4b2269a406f68c377e5bbbd54d5f85d9cd11b5d682f7b48b481b7c8f7ba2df05eb35f0e7053446535

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a45e0bc6ef6f84d72fc1d1c8420b55a

    SHA1

    6118b649d97250b86c57d6b6ec0bd77f3e6296d2

    SHA256

    a3db41e40b04dc8e5d6d622edbe8a36f893c5dde176faca826b218f5404369b5

    SHA512

    9ba02236f49eb42f2e724d109730bbe31377fded0a550f1912037ba1cd568b8c60457a2f046411a75a4ba7bb51651e09685b1e629a035641f54ab1594c8b0a7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    855cc6f6ade25a4af6f3d35c707de981

    SHA1

    767767c9e18e9d6556672014814a1f3b6382cf5f

    SHA256

    14281868306e1bdce732c3285f251d57d07ca802c09cc6cdc90d8ea25b3c4e06

    SHA512

    3b6fbc512c49695435df2297b1fecbebcc109b16d827526dddde0f6eb957b555d67ff10d1d469a3bc09f198417c5e6bc26e2af7b7355bc63d2f472d8ee9745cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65bb28d9adcdb37fb50281d010968fa2

    SHA1

    3240a0ab49a9574df675f3ca5610bbadc5f29d63

    SHA256

    5f085c7ed2bf5864eaa07ad4ec4009d93545a6df9b360ffe5b0af43d4c7bb84d

    SHA512

    567d140a5a9a673dbcf507ca7ab2d4c6dc4b17015492352be492218c9ab08edc06cd7172382269f13ef326ccbfd822768617e9150cd00e17d1f9e47242bde4bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61738d1030d819cb833dff97e96573b5

    SHA1

    efacd456f404589fd074abaa403c6882d7e8835f

    SHA256

    15bc73516fd99680efeb9e606f07448db0337d04e08a7636e49efcae6a2d4986

    SHA512

    c02c33d6445a2b82426eb325cf7050ca669aebda348b27fe4e29e0481a7df6907998bf1be36109e0a2835e221ad7bab71bfe072403f54972e15b600b34441310

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6afd5d8fd6419fccb661688efc61d0c

    SHA1

    fdc975bf7577c89591e6799eb5a626b9d498bff3

    SHA256

    e62886b2da4b154dc0dcf375a89a02ea2d9c4a196f6278dcf7c1d9b355d64538

    SHA512

    117b2d5d7d3118654ea6dcf5d1b3a7dcbe3860c0578d0a87bbb4243c6c2f715515135d5a81c61baca28af846281e4233c513d97628f232dd7ce5692c78a7e4e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8f9ea80a98a44fad15adb5c403328a2

    SHA1

    c1861aaea06d451f930f4139cdcaf66a27d8ee6a

    SHA256

    bb07fec3e34c2e7d9d929ccbc4b78e20507d055c0d9af8e7c6aeb6feee29786e

    SHA512

    e941d3b2e22cf1a3940223b82027ccdc09e3081c5022fc54911d7f0b35eddb6555a3b43e437c8975f149ac9e3b49e64491b4df61ec6a836b00a28e43f734e6eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4dab774ad420fee009029372eab7312

    SHA1

    63978c9597e75ae3c22f7c1145d7b8577e1efb68

    SHA256

    6adfbdfb093d7694b863f88b8452815fbe7d4143bba42ae4c277fa4ef380b686

    SHA512

    3a665c1693c6aa3cbba5c5d6cb2808875c2fea646c4442779756b779bd1d4e75acc10da6dd48753a860371504dda096b76ed9e674e6490458c6733d2bdf0d9be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    605de731275edd2cd3a2b741c216e84c

    SHA1

    255c86bd45ae8da2c2c9981d7a9700742f2205de

    SHA256

    e1b352764dd0bf3bd2ba3a6f0245c3a9c92fc5819bdfecb1e57deb4af3136004

    SHA512

    8d860c1a9a4faf210c47141a67e262f4ad59cf8e5b82a115ba8d9a8db0ce4f6c77b7951fc58cd99a2d26ef6020cd7395b0f7c726b750674b7cb9a21a87f4a99a

  • C:\Users\Admin\AppData\Local\Temp\Cab9D4A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9E29.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06