Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 10:48

General

  • Target

    FNIS Creature Pack 7.6/Data/Meshes/actors/atronachfrost/behaviors/atronachfrostbehavior_TEMPLATE.xml

  • Size

    295KB

  • MD5

    3c7482173da0681d5996f2511246519f

  • SHA1

    25ad3bca6b1fe47c58a536356a8203253a6f147e

  • SHA256

    ddebcba2522c3e9ecf4c80248045a22dc24aae73584db0475665d527d41a0543

  • SHA512

    54b75618b003822fdae319390db3e103c8febf004fba23332fc116da6783c4fb950f9a2cc625650a3fe073cdfcec493bb7e06cc7fd9d14dbe5103f312bf6cf3f

  • SSDEEP

    1536:8CmXMQpNbnZYWmjNvs2FOGXCeOSQ5BbhhZLlISG3ktDfhS28RSa1mkrQRzEo5P+N:dl9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FNIS Creature Pack 7.6\Data\Meshes\actors\atronachfrost\behaviors\atronachfrostbehavior_TEMPLATE.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0deb769f671b6e2e8813a7a08992fafe

    SHA1

    d57b79754bc4824b723318474663dd84ace19be2

    SHA256

    e21d9d4b97f51c1a8552c530617f203df8cb62324596069ee99e4b8fda0f3e91

    SHA512

    786ff16a3d66fba1ecabd2da615ca00d34af25cef6a92a6e34fe8c8a7b1ef71c839cb1130e1ab10294b7a2ea87c8bda4368cd21bf7f9de7e08a76e4ba09fa0c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3d4e3cb8d44aef9b8b16e583f11acfe

    SHA1

    227f0eca5fdaa91a003f138feec38cfec519058b

    SHA256

    cf203dbb4f1142fb2e5e6af02313da43c42825961b43d23a57acfcba0be12151

    SHA512

    74919a7633ccdaeb0c9c9d1c17492bbc9aa07f5558a55d0dce2f6c388e0f631be232cac37999cf74c64805496203acd2bf4da2cbc0d6e6ec1279f0289bf71595

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    988025dd7be4e0e5ca5205720fa93a59

    SHA1

    8c550215062a7f23291894ecb3e14a63035f9f44

    SHA256

    c8c9a3c2753682fcf9fef03dfe9a28e76d290a0d3bc94f726c9d772558c78f3d

    SHA512

    07f0d0d27f2098b3439001b8a0b4b33e228b15743c1aa255fe7be75293ccb4e78b735c6cd36da33c91c759b3f7db307c1bb589c43ed96cc0c6ce8b19a4f3b1aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c6f9c930012d34e5a9ddf2bd80f4ae1

    SHA1

    459ac143b238feb6b023d3c0c6af692900776e3f

    SHA256

    289653d61320de592692cf1d9fe161098193b9731dff7e0e83e4815a1615ef76

    SHA512

    5e2e0b803c38ff0645cb131b5dc8166b0f13c9ed0fbf73e547ef99b7bc82fdcad98d489529e2cc6d35c2e6cf54bc5d4a3d22d18084d1be667462e8c3554bc587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c636898b34048c6ad747e4eb5db191a

    SHA1

    7b28366b69bb692c4b175cc0dbe55f66fb2feebd

    SHA256

    803fe50e39ee1dd6f38dd72ddfe76af07825000c70697e65fb3b64d005632e62

    SHA512

    721ad049b669185d2af2a9554506356ad23e719e8a78ee2955aca6e8fec4ae0ec123240d82345eb5bd184530408da9acb01885d2a79cc975f53acc575a3db697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b79f3f1644eea29da5a7ac485513323

    SHA1

    ac4e6761bb1f6063cdf19a635c3c44512ecf4136

    SHA256

    1522c0a9903262ada26bb031c8fe62ec056f8ddcafd2d974657c8ce0b2ba59cc

    SHA512

    847d86b3afa860ef55fd79abb20e3de12df071228693c30d08589e3758307e32ba2f99ddb8ee61ffea8ebf393333490e04b3c0a0103f9ce8cf5a78e9a3fa9a9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc0a336da342b432c100402fcc43214f

    SHA1

    bc4e15f055b55c3d7eb879fb5a5bcf1fd7444cdb

    SHA256

    2e0668815a2604d562213f449891ff5085747e8fd9fbd7004f9358664709e34d

    SHA512

    fe47b107d345e52ace1d8f889e329a50be35d25e177c1c677406254fdabb67a4bee8c1d46f900aaa38eb841f6bfe323e4839e2e55dd499ddf1ed7bc6bc8447ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b23bf872f6e7211e9eb12f02edf952a

    SHA1

    3725957ca56dd8b813636686e310d645d2645c2c

    SHA256

    6b7673d898b1dd2b3494a0b2c6a8c3c9df58b5fefff399e6784c09afd7497c77

    SHA512

    b44ca901ac99d2c7e6ca5b6a2218f3fd81d3e4e682c63ca5d12a95211fdb526a4f562725692c7a362661024ef61f89469cccf313e6e0af7ca2bb8f4ab9715f68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bed67d8755f4191380e384a9e2e526e3

    SHA1

    90803d23999d8f8098dddfe82d995d503f98bb2f

    SHA256

    6f61295dbfcf767134b59c6c1b1fd9821be4baa63474c2c75120627289d69b7d

    SHA512

    196f46272af259b6fd9773b5aec0307e161679efa57e25252e930ee9def99797e752a2eb7a59c9af6b090bde88b68f971dd0d3770acaf23d198e8fdf7ad2c38d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7010de803e72e6a57c92810c058e7ea9

    SHA1

    e171a99033975e1660e8d15326d238795554e16d

    SHA256

    eea5cf95bc27eabaca29e2f3a4fe56ca37428393a52f4dc64fe970dd06f04f63

    SHA512

    c1127e3038ac381e8806c89c18bb2b1e1986ae92c26420af07368e2a6e9f252e41345fb0f9cb4d21516699bfa5bf6b70aec8ce59f9365008efeeed99890cacb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    728f1d9860730bb683820d2c70d99fed

    SHA1

    b36ca57f6ce3e0a280b95852267d649c35c9d77a

    SHA256

    eb9d96ba804842729898b6b20748547038f13febc95e18dc43baeae79c5aff71

    SHA512

    dd951be6e8f3707e7e457839f41f2c2956f5ab4f23d00bfa3eca8e4e92c570353a9d646a87bd650685e66c1803fd98c90a42a9d12727c270cae32384cb1585a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a78baa5fcd690c5f166aa083c88bc40

    SHA1

    9cf1dfc2f61038400cb51827a87b785095f8aff7

    SHA256

    6343e61d8ec9c9f6e6d365ef5c58d3b45730680683eb476522535a8fd703f867

    SHA512

    c774726a6ebb41c4823cd3cf8d01ebdb355f08810fa7d818b2a6f92f1b010b323d9f9ed9ebf00602726adc3f47149b052f7e9e356e643a1c76bce5987ba99554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7b97c75cfcb900ceb45868f07dc384f

    SHA1

    456f3ddf1484a087f57f7b295d4ae3a762f23f27

    SHA256

    199ba30897da403f40e9aad88d024ac38084b870330e45d536a72bc22f5755a3

    SHA512

    3acb25f056c98b449ab784d61bac294e1da247b8ee14387db0c72d5c397661ab9e77f0e8136eccfa14464e4fc519776262096c0626d74f072e2e65541893607e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ad83b9824064e36d49f258e5353d0fa

    SHA1

    0415ba3560424420c4cde7c3eb87b4be7391d1aa

    SHA256

    f4ebf7be1c52e5a4ac8118596807491df23069e25abe8633d51493347873871f

    SHA512

    1d7242805c87b3eb8b991123df7f6e652d2fc4cca2f4cd9667264fa0b295bba460d9d7b0d31a2e9bb13f186a145bf1eb07f3689c4cce5beb7ad62d1368e250aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea01d91a6e593b9ba67ddf1eb63c0e6e

    SHA1

    3216686737bf9cb98467f37a5795aeba5a7a5137

    SHA256

    55877a48f558130021c4fba67a84a3a5f43a2e48466017ecd599d4834302d998

    SHA512

    30de933a7d03b24772c637955c0f090c596fe0078da616b6975009e590d84e0f89f338d5e7bf67f8dad8bb9807fd094b6828d78a769932aaccb9a296ae190971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79c4d4eb087484571a0c919ad65b1089

    SHA1

    e7b816fb3e2ae390b1c8608f7fe0770a7804e2f2

    SHA256

    c275937b5a8d7179a84062f81d3d62cdb3cf54038bc554c80ab5ca5b486761fa

    SHA512

    8f8c27384bb011d264d9aced8fb0a6d26f83e04e89c57e660dd3a909d91990d1fea256771eda614caadb85d21b9fc1707362153b3f99e474e7fecc98135a76ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd8653f42351958770690d864b172556

    SHA1

    6aa1e723f9dbd0da39b7d2a24468d23d6622ac1f

    SHA256

    e793ef5390f905c30ecf67196427a3aef4a7fb6d34a9696d49dd446220298fde

    SHA512

    63b840142da93b6987f12c0c62308fce4cdbdd3c11427433e7ecb80311576ad167ab81aa74775518123d1ec8cf1c7e2aec928a02359c1500e359b17375c174ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b21470e042f8cb1f26762127a27b04f8

    SHA1

    e34a84efe256767eece65230bc1a44336cbc03cf

    SHA256

    33fba9f6fc51465d486ad3f50d3c7b79c5d5bff8f3f3898269425e4f240aac84

    SHA512

    66d8abf43af999149418bf48fb943db6cc0a40a8c154263121f4edbea648f0b48a487ad4621d87dd5367e2306ae701d9c14b32877a9497a9f78843c4977f6857

  • C:\Users\Admin\AppData\Local\Temp\Cab395A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3A4C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b