Analysis

  • max time kernel
    134s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 05:17

General

  • Target

    geode/resources/geode.loader/BlankSheet-uhd.xml

  • Size

    21KB

  • MD5

    1283e1d12e2b236eaa67c27fef84db93

  • SHA1

    55ae500c1cde0509eda1f6f7dad327c0fd504c67

  • SHA256

    ac6230131146bf37afb8369c75c3b576289ff2689367c591a922d5eda048737e

  • SHA512

    b0c587c4eb76ad1288239da1cbd8b0ff4f1a1bcbb8df6273894fbd31243535d48ab87ef8db5d4bcccecb82390fb8c5de1fd0503ec3c910008b9602b8746ca6d9

  • SSDEEP

    384:nkJPmBeeBVlbcRIWbL0Kb3TTTEJrGmKOgUuoLryL:VrY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\geode\resources\geode.loader\BlankSheet-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2f7bca60e4fc878b5f1095b7b02fe83

    SHA1

    6601f8e43db8c054faca2622dc7b58defc9b84b6

    SHA256

    c4a22745919f7072261761b436f8d5ebc1c56b2bf4e01dc04aa889fba1cf6c28

    SHA512

    234526111c69a865bab39371acb48073af9aa9065501ff08380c57147c7f7b268f57636d78d67c35f0a411c8a40a80409cb6fe79cab8c25c2a726dd92fe12103

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c1ca80fa33481acf1dab2a59a44119a

    SHA1

    eda74033ca9cacf44ceca89ec11bf7514cd36f47

    SHA256

    b5e199848ec089b7900ad5355eedc25c124a3e24b69589adff9e72e086de231d

    SHA512

    b7f6bbfb9bbf251d4af2ab23e4cead280d4084028e72c2831f7e51ffacc93cf3fc1241cb614a98d9afabfa3aea10097ee1e108d590600f2465eff103e903b959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcd2425c45377ff54066827b47a89f1b

    SHA1

    bb25394e2cdbf5fd0b342b7071cc46b2ef977329

    SHA256

    df51d17a9518722b2a7fdc2382289267cfdd9d2d958d4c4d8e7375b5c562105c

    SHA512

    0086423044161bfd4c8af40dd9103aac2671090cb59fa9590652f10f79e3c840d1605e0b51be918fa9fa72d7be360a09cf818f1113c285368650e292b63469ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4ca01b94b2751d83779be7356ccc943

    SHA1

    b060de74d78b1cf83b152359fa1e63addba5899b

    SHA256

    44b62f8ab7dd3c9ebd1aced652650bb019777fbbb4d9b6c3bf4a61728d1cafaf

    SHA512

    a933c274551c86e66f334b20219ca46fdd1367e002eb6d7eb8f6ee05d0e1ba2f502e7c6f36a9f931868d10d83cceac41542d7f4b17858cc07e086a6c8fa73846

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d199cbf03c05b71ad4d78f7859fb78d

    SHA1

    fa5fd01c6fc9ba3816197c564c558b6ad4521338

    SHA256

    21caaba80db377d25f62863e37424eeaa7cd9c132b67fcd2c43ecda1e488e1ec

    SHA512

    fdd5d954a0eb6365b8810e99046dc86adb1bc0aa25a95597b5d210e2e6843169e581e802b2769159c628154574fe5b3217c4ea7e26748aacaeec8f3d629c9f59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c221a2d619af50157049a107e621a7bb

    SHA1

    755cd2cb796b2574a202872d6595a31618a03090

    SHA256

    5b6e68269d0b65a2802fef90e0b53870fe46c97123bc3bef950d81f6b593021c

    SHA512

    10c2fe70456569943bd5958c8a45c2bca59c050fd10ffe05cf412afc118ef5caa926c7dd4184a799307222faf89d3b64e3e9fce6a32352549d6919b483af64b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cec3ffa62728a963f71856f1cc340ae

    SHA1

    a82262f6842cd6b529219ea8566d22bc45b40fd9

    SHA256

    55374953cf87faf27dfe221e3138601e8e616b5db5362abf5c32d91cf6fa50db

    SHA512

    87907ae536da01222b68ad5d763193dcc317ae5201d9994ffa97cdcd5752dfb7324373065c2e8af2406b3e1b6d86c0929ac7489bd13d1733713cd8ad32376be3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2c79f1924c6a69c3bcb2f2136111cd1

    SHA1

    9fc2e365e35e1e317d44995d2dc2aebc081d5b77

    SHA256

    99f69edb324810b617d5858182effd768397676447cf536844086d5c7b7214a9

    SHA512

    bacb4be55f5f10c02c63c6b9eb9c40cae94a24bf205010dd811d5236ca26381e45759279777fc9f852f902a979da364ed8872fe0b0f5c67208e61d34e70ace0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68903f6a32311d0ba800400b82363b06

    SHA1

    c26e37bf6dd40e8e7b0529f3d9f924f5827cf315

    SHA256

    c9632d7077f4f5fe3b804d52f088710408421cb46eb7108d6b5262f166339a86

    SHA512

    9fb21b7387706dd784dcaf5d9ef75b17c67a616c17b9474bdc9f07b6f8471ccc46b1aaf8eb67327ac0f09016b159a65cbe0698437ca1d5f19233cf7260edfa03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    73dc1647555cfdb191d70740c6790ba2

    SHA1

    65e44671d8fe538596122742dfa948b06061135f

    SHA256

    8cc9eb28dd671b2a4dad5c131b0cd9ddbefacdb078aee923a34c642ea123b255

    SHA512

    dd61718cf5f84b48a5f9d726df63df9be8655413cf0f274253a7914cd6ab7c965b6d1b8b5b85b39061490417e587815f24bc6d4468c1fc6e3b79ec89c7729a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    917682d0781af6bd2a9a0385a1f52023

    SHA1

    e68ae915592f3a65cdb8c9ae2ff83701e32f4e2a

    SHA256

    70b5d8c85e59b673d27b49b3b4aeac95090f72fdbe044dffd8547ec175bc1c63

    SHA512

    e9e6d119ead7a4ef13a419b3a789f4e80c573e083d8d648f329c64e4a1c119dba282ef9ec895fd1f1a01114b6602f1b1ad10889637ecdf9f32320c5961150122

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    408071a61d13e7c07de1764501e09058

    SHA1

    7b260ac697d75d2a75457c1e0ac1b4621c818bcb

    SHA256

    2f4e6a61299a8f7674ebdd724d37ca6c2d008bb7f3d7828b2db46f7c795259fb

    SHA512

    dce1c90c433f23d73fe02063bf818f1f449a0105e78e5747ba6990913ef34cdd37f2288786e0ce4de01dff3da13ff5299a81f6be4d6b67e69668149561376e2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc09d14d5aac3b66e9a7627a0bbdd1f3

    SHA1

    b344f2a01f8cccfa87ad59023f77035e844064ae

    SHA256

    9a15c2e3665b935a292f05d7ba961d2dee0c5ef7899e5b61e53ae8a4b3a4e15a

    SHA512

    8591717ffd97f64558650451956def8c2d81effa7eb2db5f68e0d4e98d18db490b4d417d79b8664b65f58afbe8eb248387691582396ec868a3099cee6cbedc82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a1bb42940583a144a92fe648f02c77e

    SHA1

    d74b853ded21b93e7783d529de5ff10408d06f08

    SHA256

    ac52b1b98dbea84248bb716a101eff3ff26252df88b0c4039fe3154ac8048f6a

    SHA512

    5fe8419273f977e78148ac9a90e6ffacf54767bd05403f58f210d3f614651e2623a69f8a647e3055ceaa46e885ff686273c59ce8fca78b00ea3efda1991dabae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01ac27869256b3da96dfdda61fa93843

    SHA1

    779393ab0f0a90845d06bf402a3cfe72035d973f

    SHA256

    f8c9de6eb60b7b0e5e256e83f0a290d7ba61ab922e66f21a904fca73c1699451

    SHA512

    c4a34bf2fd6b527aac44cb06d6cc6bddc7dfc241d2bc8ccdfe927c648056bb54f5382c194b8947f778ca69be7c6a12cdf67ec4b3ecaf76741825803f6dfe8bf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cfbf9609726088ffdb61371ae967a637

    SHA1

    60378799bd415d453edd7f6dab5e8d454b2f541c

    SHA256

    063bda6d15b6ae6a0d433e9b5569bc59910d365d4419ecf9923ef23472362a65

    SHA512

    108e7cfe031fe0029a4a8cf886a8b5dd66e3cbce881e9d51f58abbeaf8eb48008f213eb5d7b13f19f6762e994b19c35800fd16d6d51997359d65c1714c624d90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69f3c78c4060475c9714a3499aa7732e

    SHA1

    d2bdda99d9b4c717a57c7e77c3bc29fba559dd1d

    SHA256

    68a94f6ad9a1ea826f2bd66c8ab84eeee07a3ef77518715fa45732db27c80f05

    SHA512

    b709d09b861f1c12020db47618257afa4074b1f4b170e4f7d75dba43fcc090499902e96f589d275d6228c664ebbf10099b5ec505fafa20abbcab3c01b57e5345

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95a02f9237b9183c42c2ca6263840971

    SHA1

    f93848f904942b187e9159c68c38fa887c3b8d57

    SHA256

    924eeec4304d2213d6e40d784d9e356cead29868c2d520e508d5e0780c313510

    SHA512

    675861167808ac0d572ed2dc95c43581328711c50debf5b94c6c40fe620c20bf8182fcebd7efa6742e9d4086fc599b333f44a4f76e3fb52b06ba750ea8d7c77d

  • C:\Users\Admin\AppData\Local\Temp\Cab3E0D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3E9C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06