Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 16:19

General

  • Target

    EDGY/MonoBleedingEdge/etc/mono/2.0/machine.xml

  • Size

    28KB

  • MD5

    cad24142abba464dd90777c3d347ef88

  • SHA1

    d8db7111fce5a08d8b7c9a6e1e0ad2fbf34cfe12

  • SHA256

    edc5bcf685d930a607bc097927260a3f9ac7f52dd809db68158298bfd934b7ce

  • SHA512

    5d3ee2ee7921c95cc30790ae670fcadcf091d4fa1b9b5e1b9c7500c67230abe25467236ed160c51aa662e764ccea10e4955887359a65b09432b727abf27f8454

  • SSDEEP

    384:PbBtBtWR5RwRqrR2RN3RPfRaRvRyRaRIKbX/y4RpQXWBE43g:DuY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\EDGY\MonoBleedingEdge\etc\mono\2.0\machine.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    438f80e4a2f11bbe7e7bb77bd216a277

    SHA1

    7acedca75b18903ee6ee9500595b11cc523a4489

    SHA256

    d76d00eca58d22b747ae609d2f29bb259b5c2d3427545329264eede9fd26a708

    SHA512

    e7cb52b8ad867ea75d17f8473bd6018a69ecae176afba66250d0821617219441f3e354682282122cb395c47d4f02c243db7294e5b4314fcb2a98aa95180c3d59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47217d0941c9b02ae83726cc571118e2

    SHA1

    53c75bcd3958c4be9b6a96ea4726da75c51b1fdc

    SHA256

    2e4f54b6126625afa7b84db7cbc4719237566b06490805a441b0a0dea19d6df2

    SHA512

    6ba4ba17c6ba49939aea1dd7f49e3f1bb5542b3934ba163820ca9dfb2093e39a58fef32375494072c917593db732855159de46185727effd5b5d6a6c3c87908e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9aec01b3ff889032d7e19074d7e8e22

    SHA1

    7a8d741d01caa097c9c0ba10c07137758546a066

    SHA256

    c0bbd9af220d7e72cb3b7c2c4253846031373d5954a0647a6f334c64a25af7ce

    SHA512

    8b368dd7159892cce1f6be30f9f30ff668d9f4a7684c34937ae36098b9026b804cf6a82f7f9885c689a7c67b2fefebbe44f4e22e89e31804df6c7c9be3c8aa79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e7902741180f8f640b1a90407c1fd3c

    SHA1

    b8e6f20d7788419053ce3072ae0795df95abbab9

    SHA256

    de6a733bbce4628ddf2d3fed89f26a96de272410f212bbf44d7a1d16f65ef4ef

    SHA512

    385d1da9e7718f97f06b3257240ed0a7e4762357d36776eb7787d0bf7cc899751496ae30d81b77f22b466268b10dd895763b5b6ab7d4c86a727555269cf627ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca7e7a804e221fc4fa7a0a9accd24601

    SHA1

    4cd17c8d1cccfbfe9810626dac871b2f8f5eea86

    SHA256

    1f0470e67df42cf62ca026d2f3be96aa04dd3161dba0d4232db01518b1e92af3

    SHA512

    3763e0de3782c58ee03b9b871eae4bc89df30f11cea74900aa0ebe48c94b41b3bc890ab74635254721c86b3028be97c279f160d3c6ebe1fb200d9b72e3e20e17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b23915936969df9272fdc23b9d88add6

    SHA1

    2c415706710e849d93d2c58e89a9f58ec948a63e

    SHA256

    6b5d9dd94f322a6e182918d6d540c6e29193a966443e5c8e446e353138d9796d

    SHA512

    a456ad321e9e28dbcb3db3bd71fd62aed0ee5021d7d63016732ee79bfc1ebf7b26b2cbaf745b4ea538f8143f48fdfcf37cecbcba1c53ea43f452f4d56700b9a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca86dbc6317b05fd3e70a6fd8c15c447

    SHA1

    236d087cae5781396396b7bec2e4d43b1d5614e6

    SHA256

    fa9f8ab2897ccbf883352901b1159b08dfcf485851d81070d74e8c88b43e27b1

    SHA512

    6bc7ac6d896bd0695bb1cee3452feb10855c82bff6c27b02b79a4e3ee0b35e53e9a5083d85d2f4aa33d34c1388c810eab210f46889709cd10dbb65c67c31fd55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e362b8a6c044b659155ee89cc8db041

    SHA1

    baf34f6af9a555e2d7c0762b9cf96bec03bf2daa

    SHA256

    00a7358d42857e4737588c3d42026aec38fcde1c02cfc1daa4779bd4268cd921

    SHA512

    66c3ea5deef1fdf75ce49f339dff4150595830f443fc33986ae4a0e904086ab431a48153737f1b42506a89663f0dc5f9935a0cc26a6df6e7acfc4bee5fd1875e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6e65987b3ef3e892512d6c6aa7664da

    SHA1

    3be258644ce2faa80588a9786faccc47159d29b3

    SHA256

    9269618a1f791294dae38b3da763c707a8a6b8916d70f038c8acdb1fcc069984

    SHA512

    09f8bed9da8c906965765932d1e6a2ede70f3b46a8511c465c9f2f4ad027f28e1f4908e8e1c3bfab38e3d6deec020c1b985d3b2b158af22b5d78a56bf1fea787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34b6df81810cb084f1e683f4497a4c94

    SHA1

    62ff775100741341e60cc9c7765965909c8ca4c6

    SHA256

    579803f34f22240ee79c4f10d2fd1b2b02a95c34e8d8de8707cf1567a41990d4

    SHA512

    399b8346b9a4bfcce9654729abd9c186593317ff22d7ed43555d16f4d95ff1724e398d716684d59c747c97ab0c7610e14c9e828a2f06e12d872a93ea2189f566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    930fa5b9a2e088e28091b05bea46ae04

    SHA1

    57a3cc86b261e0b7498a5a2677cc9a4ce160ff62

    SHA256

    f9c1f2c8f6061aab3d9ea74a3dacc28fcf157b0e0616948bfe7cac18457d0c86

    SHA512

    be06dff0a5053ec3a4640119ba451023561332e930dd1497a281b76fec73a6d928578d44bc36139d297f0a64c3fb5b3c37754382f5959b11cd855814b4078809

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2efbd6680b7a619c28dc262faa85354

    SHA1

    54cb1218af86b6296e1e2893d8ff1944c2c2febc

    SHA256

    df6ea99883ed5fde545602b93cabc20e0875f54e4362b5566ae8b66e7149b5c7

    SHA512

    107db696c63de57d6ece9b351469593b8925d558e1b1f77090fcd6d92c7e0f4a7c13479a1ce01bee4d3e8f0f2448cfe088b058d19fe98243dd14919ec4b19289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49976a141e9d3fb7647b014421cbdc63

    SHA1

    ddc8cc8294a9f45b3ebda8db445d26293bd32dd7

    SHA256

    85d65c6ce139dfff0ad38278dc15465483dc477cd0720650071e0b923d2b8062

    SHA512

    b6e7e73aadbdb79adc7b5e1f9a176beb1baed5dd5283debef85b140a4e343e980ecccec8788405feeacf445f4145360b3d2a32315353e11b3eb1b1724006f892

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d967aacaa1cb7c313c08c42ca2648b1

    SHA1

    ad986731b0ee5539071595e7e422e0e73bbdb7f6

    SHA256

    81e73e9617bfe3990cb9ea3f72585c68420295488f8537552f7000235a5a9996

    SHA512

    c2c199b36b63f35a2d7bc899398810448a66b2108bccc3c2c7abbf5ff0d1ad8be07d1e97a3709a9b2b703c701d88fce0f1b68cd10cc61cc4b9743b85b44d541f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a247f1d071f9903dbd8f7dcc50fe9485

    SHA1

    dc364b836ba516e4806f8783e3e3f291f40a529c

    SHA256

    5c014ce9f51d65efcdc72af702678ecbd6d37ffa80ba0b84712f2b4d3f0ed3f6

    SHA512

    c44927439c2962b62f16784232aac77cd2e1037ae652c1245dcf283f5bfd4fcea6072f56ff70ed0bf99345b1ba46fb9fad3cd93040545732f7f26b53a97f996d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35f278e6becba33d1a52be4ee99cf039

    SHA1

    04b54f5dc8203e497c2a826ff20b26085e2dcb82

    SHA256

    176f22e514334b86c554221f2d08812f79f2b0d5a46657f4f7b1ee9cf2e12196

    SHA512

    346b17e29bc3f82ad746ce0fdead8c6d7d0cd4a84b8e94c9f5b4d669d01b3fed733f3e917874524b348cd33f5da83a4a8ed583a953250da5327a4c5344d862ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4259688a21c51cf02668ee0dabdda7ad

    SHA1

    837079df00f35cb5e30d45aeff5d1e4f0dddf1e5

    SHA256

    2f644c436c5c03f117d2d80d14dcba6d470a60b06e516f095fb420a86eb2537d

    SHA512

    d65b22183fb385957a9a850629eb2658d22d1aac2fca767716faa8680647e15b1b92c17e2d0f757c74b1e00f18c6c03ffb903cd39382b598d0ab66e0894774b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aaca312b3bc7fdb7dc19ffa155ad7064

    SHA1

    78d7a02f47af3173796b824d2db47ffdd53affec

    SHA256

    ddad9b56016c8f88a35dbf302651c9a5263cff10970bdb804b838eb069dd5fed

    SHA512

    a2e324d5160695e187de7f336fa831713e69beb9405c529a5c119cd60b6947d300153c1295b729d0ac165d64cf7ea5c2475891c45988c4286cb6db9427dfffa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a34d6fe5ea0a4ef14b8b1dc32d10f193

    SHA1

    0431251a5a1d5d189fa438427043ff9a013de912

    SHA256

    4d4527a6d726bfefbdf45358cd7ee47897498a23107a2c54f531cd2b595e8cdb

    SHA512

    535ea7c30e2c36ee10783f66fdc85d1c71d19c08d8458eb33664cd2096947a68ed2e86f09c958fc326d4347505e0e3ef1a2eb5cb986e1753e7b221a5774f3e27

  • C:\Users\Admin\AppData\Local\Temp\Cab2F1E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3000.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a