Analysis

  • max time kernel
    121s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 19:31

General

  • Target

    Kiwi X/Monaco/vs/editor/contrib/suggest/media/String_inverse_16x.svg

  • Size

    4KB

  • MD5

    6e5c0ce7ec09969f07ea6ee078ef8ad6

  • SHA1

    deadc5357a26852d872bffa77d1aa19108603b25

  • SHA256

    7d23c0f30cb9c05c81bb15785a3299772ae3cfbe51f3e04895aa1f23ffbeba5b

  • SHA512

    2b02cb82f9e4720ee43bfc8b7fe5d6de38228329aafbedb589d5a219057c15f073023deca3c1ca5b65cea4a4f0d863ebd88c889b1d67119639fae2ce180863bf

  • SSDEEP

    48:Cn7wkEX+c9Vlt4AFCj93Z0hDC7hSBnukNyhDFtrJGuG2XvS+yZCahDC7hSBnhKHG:EJWFCMcfkCFGE6+yZCacJImkArbbqrAm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Kiwi X\Monaco\vs\editor\contrib\suggest\media\String_inverse_16x.svg"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5d9481243ed9377bf06ed3f6756bb02

    SHA1

    850e506ca65acc382c0dae28c08981585b949654

    SHA256

    c875dd8680497a33900a6d40c1a61b90e8572d8efee38b4b44ba468768ba28bf

    SHA512

    7067e9f82bab388549491662ad920e62c4d99167a308b90e37b4e2019b33678f5cec949e106897b76d706c518385992787a424942e380ea772d7e5a996880f69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61b6c8d0a6986898b1c0c310435377a4

    SHA1

    0a8477384d0b984ec681a0d7ea7c066e0f005004

    SHA256

    184540e6e0c86130e40d554f223f0d40a1276e7578b3183ac6aabb40bb8d1e91

    SHA512

    bc20f6694ba794e8b5389a486c1f462e0b239e3fc5fd9fa3baa198749cd48ea4530411a13dc8f31807fdddaa8fb33a488be588e0a561613b0a36c1526e828abd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c8fcd0149dee8010db1697d2b92beca

    SHA1

    ef3d671cf31202167605ebb6e0cf279480d86be1

    SHA256

    b6cbbba92ade492dfb68f9b5fdc279cf919bc93ff376185713c9e9d5438552a5

    SHA512

    f53fa68172d16e5e6c7ef371624ca712b2365ad11ad65e3b6aa134e43f815aea567993a6a917f64dbb2c8d030ecc6486494458c1cab93240fb063230bb13ab14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d03f8c9742330071252cc19d3e51e24f

    SHA1

    0d1ae673aa0009df6acb3a7e1ffbdd4254fc4c16

    SHA256

    f42b7a09f312a89dd55f42da9d4fb1dd3b0c3808e0f2599a2669719a41915773

    SHA512

    2d089a89ab1e96d99837cb90adca519affa9a3516537a480737bf2dacb101edb658c1a90132bcd2c3327ec98e644a9d3da6b9077b4e3626a48205d551446e837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e25d8be045f1c558e23b189147b4c360

    SHA1

    880e3085c4326c018699821fcf311ce42a766bae

    SHA256

    04be5c313aa553023e8038b42f4edee3006cfa326340382e5fa2c528ce182ee8

    SHA512

    095bb57add0a4badf68efbeda8ff42e4e21fbebd39e834c8594d790757f80f85067ebee488e10a0d93ce6c15aed9053b4d48a1b0d08bc9fc54447de4ac6be6b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6589f1171a27864e5fa5eefb5d862162

    SHA1

    c2ae4e3b4d51575bc05e7b3640780a0c45fe836b

    SHA256

    b26a7c820b0fe2649a51053e28b47940490ed0c65c009486f453c96ac348a1fb

    SHA512

    62130b915c4fc3ab277dfc820636cb58e2f11e0498be54be5ef2fa1e4124d2a40d44389868d9d314ff3ec67786e83ecb615c60aa524d2b59da3c019c8b5ba157

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0473828d646c9ecddd0399f69a7a4375

    SHA1

    3719a840f38a984232d8e4c96d241cd059b08125

    SHA256

    8d1239bf8faf063ebb1a0d23db599efad67bd39c44d7d5d9b66a7bac5292b004

    SHA512

    4c92eafd625066abe99b1ef41f73b4ccf7feb6aac93dbb6c3550688ca807b34fe8a1899e4b303e0fb723ab00d36b3bde7e991738af3fcfa36890d675230b63b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    999f575459a826cc9fff6c9b71c6a7d5

    SHA1

    324c092bf2f3cd111c9fc4b425cc6413e7130a45

    SHA256

    216551c267cbde2e696105f1cec1bd2c0623daba2c7583e3f02b2a301c32d827

    SHA512

    10293c293e10756b7fe5308653c1ab42c1f944b5349c0863975ccb514af1486cbea7fab7b09acd553a8c795b16e0e444129a91b46405322437557c6b54451a2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84d7b3dbe279b75b2678271cbb847eec

    SHA1

    eb66ce0ef3e4cacbcbdac4af741dbe3b390b780e

    SHA256

    85e02fa34d9ec6bf22d39dd9d7189684f9efd50c8b16ad4725487341cb40e50f

    SHA512

    54168b432ba52cdbd1511137070f98d7af139e26b84b7195486aab3c44cac118591711ca1e61f31fc6408e26972b08ed264702bfa4b2ed450ec7e9014b9db705

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c98e2b1f032d3892494c545a11186338

    SHA1

    df4af1ba6f80656d6b70a48dc895e3fbf2215f34

    SHA256

    158a51af830d37756c5d9054f99294b4a220df8b45dea6dea6ea75fbe152938b

    SHA512

    bfe92817ab324c64eba6f8b9801aaf49c99b5bdf4bdb896f85a9e73d0c804a0f303563deb3a4234906c2d04b1804d5281f5a211bcbb5eb3a83d0b3d57f19a991

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76d044835610b75479ef0acdae0a8cb6

    SHA1

    eef9c54195404e709b12c90a7a2af10f5f49b8d1

    SHA256

    8ebcade9619c8cfe0e2c03ccc1b8144faebe67d32b3cff3fa51120f202b36a98

    SHA512

    cfdc5b777c41bc6ea257dff45e287e5342af3f9e719581ad2011a5c91fe9827af31c58e9f02ffb8ddb58007c5137d5b80d805e9d1f369224d2037f3598a31af2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3d9636ab5349ae60d116227eb56b130

    SHA1

    9e328cffee7ccb57ed6ff5361967230ce88e35a8

    SHA256

    9f91ea9b8c008017c7359466e5d7f94b911bf8b69c56e1b61f23897f74d00c15

    SHA512

    4b85c65ecc18f24b3215bf6ffdbaa8514ae4605be35143af6e2b862222449d1c6162102ded9e71317463d3774a1dec21c787bf6245726cba29f98c1ae91addbd

  • C:\Users\Admin\AppData\Local\Temp\CabF6DF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF88E.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63