Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 11:03

General

  • Target

    Newtonsoft.Json.xml

  • Size

    696KB

  • MD5

    d398ffe9fdac6a53a8d8bb26f29bbb3c

  • SHA1

    bffceebb85ca40809e8bcf5941571858e0e0cb31

  • SHA256

    79ee87d4ede8783461de05b93379d576f6e8575d4ab49359f15897a854b643c4

  • SHA512

    7db8aac5ff9b7a202a00d8acebce85df14a7af76b72480921c96b6e01707416596721afa1fa1a9a0563bf528df3436155abc15687b1fee282f30ddcc0ddb9db7

  • SSDEEP

    6144:XqqU+k/Rik5aG0rH3jGHdl0/IdHXpgVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QA:DU1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Newtonsoft.Json.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c718c14b879bdb7290071ee539607db

    SHA1

    787074a27cd0a75646a182f0140ef1c6cfb03986

    SHA256

    b8bed931d7e3318c9fcae8c7f5b199961281b4b76f942a3b30d29ea83ecb31f4

    SHA512

    d27a58985bcba2898a3fa67e79cb16d42b5c3c076c3a3717fc37235e3584987325342d448c3d89366bc7678f9392cda7fa7819d39c262af1f90c8073d8c91f9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56434d0079192d645e2276c54c5d4ec5

    SHA1

    86468e2d7df61f50c60ada544a5da877df93c013

    SHA256

    a8dd6def0cf185f90219398c2a468bd59efb031c4d07b1159933bd2353d9c140

    SHA512

    9f30446fc51a0bf7680f172a13d4d054763409778b70a3f4980cc7fcec898c7a9b4481a43d2b8c3508deadbe09292b8bdad683a68eeb3cfc9a7d9eb2ecd58896

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd5990c8ff0149129ce9968299cea23c

    SHA1

    c662b138046a17a76dce57b4b809cab6e3860e62

    SHA256

    86172a57647141a58252632847fb338298faad0f9e4d3f32779cf4f78428b58b

    SHA512

    1fb52263ec688bcc2f48bfa698194bdcb4e3f940eefbdf61784e66682997f085b9f21276374aa0f72fb7570de2c50a3d81a2acf54e08b68b64d5566d7cc06b3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ee438048902c1af430541538b36bd2f

    SHA1

    438177d3f06017dd84d052cbf10efbb780c2b55a

    SHA256

    9df8dc5bd2c3447d5e6275faa764332bb2f04f0d65beee8520081eb36c947c49

    SHA512

    09baa26ac99f8d4f3559ab1537ee51fa3e66d29800ea32861ce2669671c5cc03d358d05c832842c461901ada5ebc4960f84709a7aaab7a50c5286d8d1c5d0882

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e445f88e4fcab1431f731cbf8c07beca

    SHA1

    2914cc1b3628adba490eb39804daac60944e0e89

    SHA256

    f9a69df8e4a82c4165345035535408e097a567d99811133e5861ef410df626ae

    SHA512

    f436e2d31df2e95795a1363e133d5fefd888f78062e1c23f49642a89dc23ef57b65b4cef1a2188d97a720cf8ae9e5001db6df5d13cf579f30640620709eec6e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77adbb626aa3c328779d790eb5cf62ec

    SHA1

    d036e883aedaa97bbcfa2a437e20102ceb217132

    SHA256

    909ff9389d023920f2dc1656f52105baada3cd88a59ab41bc7ade273bb3f7990

    SHA512

    e6f67b322d101cf272659f750386301c0e7b74fc7676714b71d83a011d37af69b199ef2785663f0be11d7a4b1388ac0e478613faa9630bc962e68fc717c1b1d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7cc12133da0a8410e31bdc7a731d2928

    SHA1

    1bb70ba82d7e8924496b973fe85b51ee6f53b178

    SHA256

    8bf37ed51bd94083caf8a04e598181793568c9a44be9bbea3f2ccc61354b812e

    SHA512

    f5aca912ebe2e809469c1a8591d3b53994635cf46020149ae9b2d02d596fcb271833a0551e5c26c76010512dca55cadb8f04d08ed63cb9a633028c4d9aec5664

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d97a2835a7dd22f30187423e916e7117

    SHA1

    aa1700ec2040c5d1f04f813c9534e870c8279e82

    SHA256

    6f9d0ead6656a75600b4331e4b2c38c3c3f04cdc86983c6b75cc4fb2c203e2db

    SHA512

    b48ecf4b06180737a7a98b518608e5a0ba351630b42164af8ae21e58c73e5a15fac3d458f9c1ffeaeb9550e2ade397e6ebb3695ab2fa433cd9d51e6964aa3b5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe714d550c0018c1b00a2776a408ef05

    SHA1

    962b4a0e9c8389c45dd5af9e86d8d8e9948045af

    SHA256

    7f5949e104ef2985b2fe21ceeb659efb2670fdb12d3003ffc042669eeffa13f0

    SHA512

    13f22bf78b4d6f17a94a7bef1b87a7fd9459d5165d6fe9034bff74fafae77854ef81102f82ebffaf32db4f68140274d192177136300dcbaac8a353f3387d80f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf449bb808f668eed513ac28ad3758d2

    SHA1

    92125d408b10c546776c2b72ae2aab6480341dd5

    SHA256

    4fea4878c1cd6b00f8bcd31e5441110e2bd63ed2c6ea86078a848a0d6513f7a0

    SHA512

    3be64c68a8a0f7a9cb5311a5cbfa4ea4dce8704c880220b939e152e14930453a50053f25fa6a0aa0c36172094c699d01ff96aeb404ab4fd90aa331d16da9dbf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    835c9c3d86bdf2eb7a0f77b712419518

    SHA1

    07c14db7a6720d55d54952ddf777cca45002e127

    SHA256

    518936b67f03a6206cdfbfeba2673ecc9006c730284d0d1f610891c0fd3f71e4

    SHA512

    a0fb43120e6376366ed80c4d9170dc7b1d3bcd1b30447152bb80f8736922fea2f44efd8ae48dc8ca85a1dace69cb88abfb536f477a1c3a328566af40c4075e99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a92ac55b341099256606b2b6e87d24a4

    SHA1

    2e59c108f3fec21b51859134feb30c5e7f4d2d84

    SHA256

    90be3a02fba1a3b9ddb4b78861e8c51ae1c835cbd57ef87d59b8488e4d45912d

    SHA512

    52b9038baabd2dede3e09175bde024fb903ebf4618b2173cb2335719dd66919be26b0e57f4d7aa8d79584ea7fd371cb356058d2e8c08e2765a0985393abe8799

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d231b296ae69c4fa0853e0ccd994a6b

    SHA1

    4874a3cc2ef71ba846dd3d2f4a737550516b785a

    SHA256

    39efb13bf698a6fe5348a0b3315befa549360858a5a7fe3c87658e66711a087c

    SHA512

    a45250cb69aefd1d7a671458172a353e3a73c9d5e767d17078f7e6f419df8d054070553f57af904a866ff5212f0021368fb1b71169b152322abfbfae43a48de2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc1b727d9e1b1c6cdc3e0d72e0450471

    SHA1

    ad715c335d4eb70f2ac1b816cf6b5f7057d9e392

    SHA256

    6f8cadcfef3c7ebf510a3e9020f495b7daf2634631d486f005b1f1ebe5f3f831

    SHA512

    df0eb53a5bc876e868db7fa1483095eec2452a070729f9216ff1db80fa9d76d5eb1b9100e5707ba26964a2dcce0702479802c6f480f980dc2a42567afad2a891

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    311d55c4cfb6fc1793dedc1372b19aae

    SHA1

    ba2098af48dba6ff8eeea73e4f6edb0bbf93dd89

    SHA256

    25e9314d8ce1861928c5bf4c038bc8d2b8568639f9067f7cf3da98a0e6833c37

    SHA512

    fa18cf86acf768c9cc4cf5ad76865813913c02c80367178a1c19a7663f76fc48dd532e249d3fce2414e8aaf30d9f24f073776a71db6acdc685abfcce652209a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b18c3bdd8f95d3b1723bf7a3486a1a0

    SHA1

    dd2eb7292efc3acfe3b5537cbc3b3468f4e3aba7

    SHA256

    2730514bd559fd94d34f5e84b2daab40681572eca60073d705a4f2b61b0c414f

    SHA512

    a79fce0e27db0aee77b9017370a71b7868093c76ddbb463c4ef2e716e502d87330dc8f6e153cafe4c08698f7eb44e182e122931297458753afb21994d2a97025

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    202cc37252f1c35c3db7a482ecdca3cb

    SHA1

    7d0c270adce3563b126ea6fd72cc04742c8104b3

    SHA256

    dfadd48b6e55bdd4cad9381a69c3edca2dead57e1de185d906b464e024490d7b

    SHA512

    c2f9fa7e3d9288c2d1492ef4e7a5e8534c19776283b02f1d5464fb0af5c7b3025bbd80bdbfc5e3bad56562aa76ff8d7e169b39d527a8342871d0637d334b2da8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f76e831d1f5d7d82116c0a685549152

    SHA1

    f8a480ad62a1f165d9ab7ea05f8812e554d81a9d

    SHA256

    d30365e0dfa8ae8581e8ae2e457198122ca054ebd11624008ad8f7e4cb5e200b

    SHA512

    f38664393cdd1e6ea91069992164c47687fc5e482f589a5872c4e02347302e4bb906524e8ff67aead0c0b83c75cbbf5f2a35b8f1bd102a43b3c28a39d798a7e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8b974b17a423c0447c093d711d85c60

    SHA1

    c60604426de24c4bcf613e5ba566758440f379f4

    SHA256

    2fef94138b51275aec6f338b3877b42db043e0698972b5f293bb9d5e91f619d3

    SHA512

    321cadd94c32f2263dfce042ad3a22c46b39f197223d0dbd98aa761c3861cccf77ab43760271c457cfc4d06c3c64965de31ef954c87d8edad1626d740d28d756

  • C:\Users\Admin\AppData\Local\Temp\Cab2DE7.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab2EC5.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2ED8.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a