Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 21:52

General

  • Target

    geode/resources/geode.loader/BlankSheet-uhd.xml

  • Size

    21KB

  • MD5

    1283e1d12e2b236eaa67c27fef84db93

  • SHA1

    55ae500c1cde0509eda1f6f7dad327c0fd504c67

  • SHA256

    ac6230131146bf37afb8369c75c3b576289ff2689367c591a922d5eda048737e

  • SHA512

    b0c587c4eb76ad1288239da1cbd8b0ff4f1a1bcbb8df6273894fbd31243535d48ab87ef8db5d4bcccecb82390fb8c5de1fd0503ec3c910008b9602b8746ca6d9

  • SSDEEP

    384:nkJPmBeeBVlbcRIWbL0Kb3TTTEJrGmKOgUuoLryL:VrY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\geode\resources\geode.loader\BlankSheet-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3a7d755552d0b76d46b629688e01a29

    SHA1

    69801089d5a2bf716ef6be7fef0748f673fba850

    SHA256

    0206015fc9e907c707db29fef88f7fe9d0ea6c87023392059db6f784beeb8d1a

    SHA512

    38434c7e166e55bab9acd2c13f87a2d9262baa18d1da553eb3cda0e3436ad80268057a019fa3f00a94acbc6827addbcd0fe7b3e80f2b77fdfc07854e71b64572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ca53ea2bd5c4b3ede8921c8797cfb81

    SHA1

    3d621dc4121ca67d03d606a1e6967ef743f544e1

    SHA256

    4a7cd2d7049c1cbe8284f2e51cc6839f15bd019ba6f56ce335007c91574e462d

    SHA512

    c40828a65c29e9f9fd80650db1772030e3bb1f7e2304d3797d082cc933396a96a4eb4a44da3c2333b606bb18ec2455b73f2588df56c4a1fd23901e211a0a3fd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c45fa975cd7745d182fedf02d4d4709

    SHA1

    4035fdf40c0d39bd668fbdc3e853ef8a0509da58

    SHA256

    ec7410f960cef6a6433222159ef1915a83a115f7c5fde3f13295e97446974e92

    SHA512

    e67eb787ec24ad3659cb8e879760553d29cf43b81e29be0cf40e716a07d53f251ac8d4254d079325fc00af46f02e243ddae7a84bb5ee0d2b32232cdbe72fc0db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    596fb606b8fff4eafd5209ac3b5025a6

    SHA1

    ca4db8f6d4d780ec3b770c0fc997bf3b76c851fd

    SHA256

    06ad4314abed3dbd821d1a622aed308d6ddac74a8816720d278159c170812fdc

    SHA512

    b1cbb06206dc1a09c5bc1d6c4e0eeb7d06b357cb16a788ae29e54f597692848c34b91bce0163ac70bf4b7ea075dc8bdd003cf0bc4f6bde46f8909a7b8536a1d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed261738b534537f0622f09b53245363

    SHA1

    ef6c648ab109eb043d29a97fa77be22ed6ce8fed

    SHA256

    44c629d93c5f1247736b704915aed89977d02d36101d9a6d454c97d2afbd8255

    SHA512

    a350d8c9e06c3e323aa8fded6a71d87c4ef177c527734d23309698b6b9b7bb82abc99cf76f09a97a30221dc59a05e155c2a5d4d6552bcb55211949d4f3ab946a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    517a08944cc5a26e517e6e7dc1aefa74

    SHA1

    5a01ac8b2ca082941c6d2aa73ba5674db719cde5

    SHA256

    63f8ae4ee2733012261a96ab56ee27cd1970f95c8dec4aab27f81d0b749ee2bb

    SHA512

    73c54ffe5b6cf8de9242c8b67027e207b73a69ea9de37da58d35245d16accd077a4fe4abbdf7e04f6ad71f3a742ca59fb3dc48e28d59b82bf45d7f64cec9318c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3ce655411924e613205018e062bc881

    SHA1

    cb0a5afe3ee648a4a56ae105f8eb2d764fd974c2

    SHA256

    400dded607c9e7fa7c8ff2e2be2df47031a691fe9af29cff5e693dea591ce92a

    SHA512

    f070aa7294d051a6e4c4eec1fc8cb6914646e31b4cd1dbe9c079ad488273b1106cf4233572f4260112b2fbb14dce85e1aca709f672b40034ca2e2978aae1fac0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d40554188f3c8bd45d92e39bb0c65aa4

    SHA1

    93e2a2abfa6d96ae8da4a633ad9a9f07c6feb7b1

    SHA256

    4fa378effe490bc0b8d5c08b45bbcaf9428cc0ed25ca8314d79553678d832e07

    SHA512

    0192600b284ac646fbdbb1742eac94c74f14a02d34a0b11bfdab5a84eb2417666d2a61604e12270e60a89be0b09b0d077ac46cfd47cb927335a21b459942f4a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5056c440fc944ef4b421502b384650ef

    SHA1

    4785b03e46fe1d7631d5f34df05839353d6e497d

    SHA256

    d19805fab0d19f044c5369b4854020306ace6d5a47dc032418e13e31c5490ffc

    SHA512

    9820f4e8da555a1af1bece0936cd712eb443f054ab9597254e75060bc435bb49e70cbb9fa91726a0826f3a148e38f1d6000e86990cb70185cc7634bbe5842b61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    add1980fa7e375475ddf5df0fa78dfeb

    SHA1

    7646869bcd77a6f38b533dc4a2020827686b29a6

    SHA256

    f2a3425bbac67321cd3d3c9636963bda337efdf09104c474bb5707ccc42256e8

    SHA512

    0520c9002c5834ef35ee794ec3de6a23fdae76f336659996fc9b909089a37577c6c3f977c44f8d069981ad27e0a3d184d198156166208b94f2f08c1de392f648

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e48b66454b603821ba0a6dd021af0a12

    SHA1

    bacc0c8e1aaca3fc16630200eacdf1852baea4c3

    SHA256

    676cda6652eb1f1f813f0e0e078d4fbe09372574099015095f504205529d6ffa

    SHA512

    be0d8e2715e444696f75f5b75068a3f593e7c037ac9cc8bcd76632c164d86cf5626a8f16ca271096aab40683353e06e0f8b35b9efa72710380adc28b43c054b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc3d110b74c650947cbe4e4ba7abe1f3

    SHA1

    735f3d4d96b5bfd3893dc62a587af2a6482bfd49

    SHA256

    9e376707ca52a4c6041ec8eda068c6603e22bd620d74eaef5e548f1a3a576a08

    SHA512

    2e7e92417f224f5287c114d64fc133e2db049b3b86e0dbdf0c711f840170775818ec24f318a7d26d4021561c0b609b472fe69ef89a718757f8192caac742ea67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c9d70de41acc1278100e1ec6d1f32f6

    SHA1

    c279112ae2971ab793055f0da416176895c21d14

    SHA256

    c6ff8dd6f7ce163e2ca7da018ff9f6d87bad00aa62023dfd5b29118f760c90bf

    SHA512

    3f199ed6a1561ecdf5b7fb318f674e5d375d7c24140c47e259c1421a8e73199c7f48a4f2941ac281098d79aa8ce2918a89b548e826908787a1782d2f1d297d1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4cba7509a71d480f6724ce80130e467

    SHA1

    271a13bca2754bc59211f1b026f34f97838d64d0

    SHA256

    6769feb000c5c6786402ce5a037c1946946d469f603a2cf1b1d83daaa20fe75e

    SHA512

    bfe4787b2901365bb66e38c11c58f21516f0563440377551cb78f57deef6e82a87c4769c38016d923885f9cad551353bff8e238bb6a16655e5e7a20b9c7c4da4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e1a88456d13313aaf12d32e8bec02df

    SHA1

    1fd113ebec868fc2e8cfe81f11569b355e181320

    SHA256

    6ef2babeda573097fa55a17435d55a362c2517c35b9d8a45608226b7f80b059e

    SHA512

    9c1d6333bed25924a6cb00650f8c4508c4734ac417e5612898788931c2940f8320ea062d1c12085790f0ef7e2edd5dfa672f64e5d9de59288a579f3eff5fee5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50e233f84b99b62ab723fefa61762707

    SHA1

    4b9915c93315c693d9982b9b86d8ffddf0549fc2

    SHA256

    f12210501a1dcb9e3d5a41e1b4dc3b0f5169b3f0dbc3ceb74ea66994e1be1f93

    SHA512

    42fa14a0533d83629902126ba55e233bb5b77e8f30ad368119c972bb0c0081b5925152fab937cac94be710856dba5029f7b67eb42562386349134318747f5c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81306f6768cdd473fd8ef0d144412e9e

    SHA1

    2c2a12235173b990f0bb5c1ffeb895b634d9f2b9

    SHA256

    cca17f6ebed8198a9636ad3e05ad1c37057635248140560ac031050d0a717058

    SHA512

    dda7d8fb749d8aff9b32ee408a52f9dcb53067c205f7652f47988ac2ae710ca40a8059cdb1ceeb84abcadbeb3a9b2600c06abc303551daa2794213766260d798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39510782a30417b7d2063585ba74f78f

    SHA1

    27278e1cca0d021f992689d85869abbcad27415a

    SHA256

    01c48a59b2666c952d8e73b9ed140e0d95e814bb074a71dcbb8a3fbb85f32e4e

    SHA512

    d56639dd7fe937f2620793d006e1bf1e42c2475c7a32960c267bdf75bfd94fc97c5aef4bfb273da37e18ce2b6b6968232da200d011af3685b4ef74fe9179099f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96e9ac7fd8a6cbb5cd253a62cb761c11

    SHA1

    b7a29ab2be00c611436d18c7446c084e24006875

    SHA256

    cac7ac3952b7bfd686f6a8b540ff3427c7a3721a4efd975b09b1ede8cbe1c142

    SHA512

    e48ae961586dc800a2e46737a9bf595e32df87ff38d533d86ed73352f02a0b5ba99c7216516a0333cb1c0f7c86d32abe8da778287e2548120cd9db2ccbf270e9

  • C:\Users\Admin\AppData\Local\Temp\Cab2EBF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2F70.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06