Analysis

  • max time kernel
    135s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 21:52

General

  • Target

    geode/resources/geode.loader/BlankSheet.xml

  • Size

    20KB

  • MD5

    6459239c490d22b97e52f8910c4d923f

  • SHA1

    7dbde5eae3fa30455b7aa2d5e9b9ca85cf40336a

  • SHA256

    e120ef0321f2d52d8aba307358080c83025b295d8b59785a5c05720bc5ed27a7

  • SHA512

    7d1e34348315eec4b3bc990840d0baed88f133e3406463bf81ed929c66a1424b2f56369e0e449f3bface8b40e896aa1f4606e34377e6510c1c1d831ba7b0bfdc

  • SSDEEP

    96:CybcicFzctGdG0xAcQqacQqMcQq9cQqylcQqC+IO2JxcxyZ5cDc+ccczcw6chcb9:XgXhORkUNh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\geode\resources\geode.loader\BlankSheet.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8cdbebe205dde9b3309d0b57b544139

    SHA1

    b7456a27adb2b163fe53e12dae9461f7b711351a

    SHA256

    ad7c10d918e524d766b861a3f0794791e944bbc0ac490cb22782d646fcfaf017

    SHA512

    50fc501aaed85529387a6a5dc0ff6c1629c69dd76912ec4e1d5e1c5afc6e7e1fd21d417fa1e8247bdac45360da32200113da30a31f294cfeb5c3cdabc5553167

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddbba0f4ca6a5dfed2636a48c4aa488b

    SHA1

    ba0013079ca8c27b8235c31c096f3fed680cbd8f

    SHA256

    14e0dd3878afc11befb5dd5279f182c781f3319fa6af3e9ee2d8e02c25881457

    SHA512

    872b5ad8239c6375e2098144c85634533d3089d14a50c7f9b2785586835ba36001417bdba72bf95b3f1b43d9e13a715322c0b2e506c6afaf55b12205bf429a12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad314c9f7ee54194aaa049e99fb0dbdb

    SHA1

    130e29ec6b7bce5cc96afdb5f44d305bce170c28

    SHA256

    54be53c9d7cdded119c3d07cf7310cca0f836550dffe08bee0e6a6a572d74e65

    SHA512

    bb78a1ec39936b46b50d9d2995514f4358daa94c53477247f68cfaf895db2d7afcf3b977ae95fd5030c3184b0893411e5d8466ee1e342258e0127f08a115bb89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b57023319becf182580a7d41d137900e

    SHA1

    dbeb69a9a136826f9b70910bc714755e36a76530

    SHA256

    ad66dffd36cecd7568b0d07ff77607c64e016db8ba39017816945e4cb8d2fe85

    SHA512

    b9847580eb39c1162a79a566ac7b2ac6f350d9173ce6d8fb357926a12a6b6a0ec82736706d88a2a3d5074c6b43f1155bb2da8eeffdcbd5a7ddbf947c11bd10f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acb335e4f9ba343d33a471ea1a994efe

    SHA1

    c682bd96ddbb5a4f88e4d725d0b76e9ef5b8533d

    SHA256

    340a00966eebeea185d457ba1c005602a77a3ebf5bb9ed785c58accfd35ee3bf

    SHA512

    cbc50f2606847bc114fe57605780cad970dedcda762f0f27d474e7104541a05897b147e33d88b0c68ba1bc702612ff26429a0d589e0c55b79d4e1dfaa89ab917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2647a68c2a63ccd8b44713fad91f795

    SHA1

    8bdb40117168b77b395d2e78c38c42f1197ff794

    SHA256

    2b5b34c1ea80271bfc211ce29f6d39025306e7c44fec09087348f86126c71b7e

    SHA512

    87ee71a9f81726c18397513557dd20fe7dc25eb767afab56d374d38d62b217aa897c1d0126da93b72feee83eb29f1a76aba4cec8d2bb5b887fd14c017ce48242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cda140553a71133d43d30d5d1fe9d6e1

    SHA1

    f7ced103575ce1a02d6a68c2a708f2d376ee12b7

    SHA256

    f16ff5811a20f3a5b6782b856ad41a3dcf7a25e65d1a9484a3d099d51171e006

    SHA512

    77e6271fa6e344c28a048568c503310df4df30ab922ce9e47531317aaacdb5875d4161983ec751847a48a38dc08eaad85e67383427d08b54552d0e78bd5c5238

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1bbf74b30441a17ae31c523856053192

    SHA1

    16f77c284e577c8493058da1cc486772dcbe9803

    SHA256

    66a18e692a4d572018f4eda975cc5242bc4efbac76cfc3c5b763e7ec10661575

    SHA512

    71fc747fe6d954af308499b285ac2b91ef8ad3ce99e8db5e2d641e563d4e62459ff2a24662e52dbc636ff30a95bba633154ffb0b440a4821103a6b3e3af29792

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cae207cb0fa7c9967758b733062ebdca

    SHA1

    1b1691cc2478bd973eb9612b51cee97b0b08ba71

    SHA256

    145dd8f620a78beb503736b30271d94c998efe8df7ee54df1b8ec1631a143a39

    SHA512

    b2baed47f9aa16614ef82ce126ef3a895e198503ce99040ff0d3b0a882e797db50637f71f81d7190b5779981b968057307137e6637873240486a740799a72fd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8e2df31a7a72fa716de7d176fd2ef14

    SHA1

    1dd5ea6df2bcaae8b58fcdd76ec23d1ba608a40e

    SHA256

    6fbac663fe8efed8b33430144b84f4706fca6b7cf8f3fd28659d9aae7b175f0d

    SHA512

    59aa0307fa760360989caee0a317603ba01327a08fdbd66ede817da34e093621cca76f3036a21defe98759107fe2bebfbcb2344b0ebed4e93d3861cbf989d2c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e3f5103d856a251fb2602573aa888ec

    SHA1

    cceaefdbda1b12b2c655f91874d57d71c9500ac0

    SHA256

    def73ca4feca1129d51d5778b009968c1f3150a9c4a2ceba2353aca8aa90a024

    SHA512

    e04d70de251a73ddee9bcb8aabac5812f2f88058f7757827aef5a681a963d6033344b48097e3f70ffe6fa54ee82fbaf4b8587b72275fcbde06e70bc106a76e1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31606016f82384355eca7b8399857876

    SHA1

    8c0dd7054079da6906ebeb02e32203d79c3f51fb

    SHA256

    1ced6c348dbfbefc3bc6ef651c6c0f8fbc92147625940f5081249c831aaac579

    SHA512

    c36b8f271cf856b925047f72849d42b1571a4d31c1e29a1cc8549bf8b43e281032ad967bebf9732f35b61ba4605ec741d731e2fb5b4c178d4113d7640482ab83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7c02617852ff06141522e39e927308c

    SHA1

    d189089277e7f7b420e186ddd293a78c9652e38f

    SHA256

    1a6d08921de82fe27682e5e4b64cb4661818802ac5d917614eb5e4f71901537b

    SHA512

    170b1bd95255313c174906a55f82af09c10e8b01d216b2865a8f5368a5e28b543ac654492f270b97d06a0a28cc32b771f3473d80237c7e2a31d031c421923f4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5fa8376385b615d2704a7b28fb5c5ee

    SHA1

    8d49cabb7c74f728d2db4a1322fc36828faf3e18

    SHA256

    8db507e9977015e6b13343484f2f0b7604e347b8d02f6098b0c2deb37630ad5b

    SHA512

    3cad21119382354a0b349ed78f5e73e2b3562b4e44abe2d756ea34c63ea45b14724d2a477e46dfc043958aa6a260194ac088875366890bb848de7a69a66c9d5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02a5588700cc87b890c62f071a60a0d2

    SHA1

    ad8c3031ab07818bf088609b43d2c461f7dfc17d

    SHA256

    89873389c0292034aa6e1038c56e007e854c37f83419b633000a632a2a42a437

    SHA512

    82e74746925ce8fcde5d24621ec409083b753098d10e99b99c41a8f3afd2f1f510fe3028e2d81441181aeeac56f18485f49368af8465fb4f21eed4a3234e5ee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e6c8b604e883bfa808121ef3132e641

    SHA1

    cad71880c8174a08f80b9da3e3237917c924a626

    SHA256

    88ea1b3b3f3eb46a4a2abbee24e004b1aec6505f6928fa2e78482a716e796d57

    SHA512

    7b2c04a0c9e963198a3ea81ec339559ee46f5f9c8760257331048e579b927720209efb63723cd8c3dbdb45c10429eb1d8b2238811e1b1274aeac3869d63eab30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0a637709a0ae975129c428b20fbe9c1

    SHA1

    ed69448debc85bba5f1245175001014fdfcc5061

    SHA256

    c271a7c54cc6500d92bbf269da2db773fa6a2632f33e4e829e429601157d0ba4

    SHA512

    b57b365331830a0c1db3e66687b87f0f228bd0c1c95e2d3d4f099330da8a733243992d41a49082775a71b62cafe1694802ef0663343ffc242ac78eabe69a9ca5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8adcb8e2bf44b9c328a9cf3466d5b644

    SHA1

    a63beda34edb47fb88369c21329d79cea2633983

    SHA256

    18b3898ef5f1c70b396c92a9913acc021a2230c4a9bf0eecdb669efcea2f966c

    SHA512

    cab2f1d2af79b2c7e54f8d3d5780fbf894f831f329910ca972924a707b716da69368d3a768cc614cbca706a0b967cae1752bfa0ff656275679e732bc1f50b3c7

  • C:\Users\Admin\AppData\Local\Temp\Cab64AD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar656D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06