Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 10:48

General

  • Target

    FNIS Creature Pack 7.6/Data/Meshes/actors/atronachstorm/behaviors/atronachstormbehavior_TEMPLATE.xml

  • Size

    232KB

  • MD5

    62c4169b8fb8274c3878fd43110a5363

  • SHA1

    796cc05f87e2a6522dfb3c7d77078b8677b72436

  • SHA256

    6b3516351896a77bbb5ba3d64744cbc004655f24398a1c4717b7f4fb0ec11edf

  • SHA512

    0e1dd6630bb33812207782c5662498c5afe324cf59d3aa71faa39661d303c612be93b4c42493f963cdd0706698bd2bffa4ee30daf7a76dc0d0887e6b26a94b22

  • SSDEEP

    1536:wRmQ9ppHbgZsWYJC1Njb0OMD+Kvq4hkosqTR0D6eLXs129JSTGw7CoHakIzSUhgq:O6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FNIS Creature Pack 7.6\Data\Meshes\actors\atronachstorm\behaviors\atronachstormbehavior_TEMPLATE.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a0a91c4b71000bcfde76511d6c169da

    SHA1

    8489120df4deec1d75ab0415d530be59aabd2da0

    SHA256

    4f8eb26d2a29361b9ca37b7a59bb7b07408a670f9a65c4a77be7d7ea35c49a95

    SHA512

    77579e70bf31114aff5d33f9ca4512140f7d4038a6019037913220706ea6a083eacb5b45f943bac1251116e72200020299a25da10a37c83c90cf44f05fa9ea21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3889238ae2f35180ef10ebe1d618e2a9

    SHA1

    e4d8e851e02c6cb374cab6e80fd7b05169a05ee6

    SHA256

    8226be4f60efef4fe2cd7c64a139594043f4fef4dfbf6b237d2fd5a6c270d561

    SHA512

    b3600448fbb1ad0208a6617c657e17981cb5612c3e6b4ed8cd87cde4d61f12db49da9a08b0ee192a3dae6abf8c87e521f2616d8d6684a516c863ad2f4a2736df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23cf6dbbdafdfdd7aabbf48c2a4313f0

    SHA1

    69fa5b2ee0cabb264bc81cab505b5fd22b491451

    SHA256

    361dbf2966ca14539aba70e844abe7fc31fc542ed7b37611d4f8e19827a9d05a

    SHA512

    65a1b582e0cc58ed467beea8535e27e59aecd12952f2c270abe0ea69bca79f5871152c590d97170d0459f6a9af7bec504c6c62044ad6bc5aad88be18f75b6301

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    888fb5c58e541850091a683d5349d8ad

    SHA1

    d691456dd6b633c74f37eedd1c60c401dca6abcf

    SHA256

    94b7af524b6f15289593490fb6792a5fbae4e087aaa80137004cf5a4fa530a33

    SHA512

    f483ad96b97302231e05fb6b1444c230238fb36f8f37146d4cec6f469b4bda0096ef9bda8b07d6ab4f6d962ec2e2b7dd10c323bed83851b319214252b370c06f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8574c15a49f692e8e412e255b3ce6d2c

    SHA1

    853fb761802d2084176054cbcd545c4efb1bfd4f

    SHA256

    c60335fba6996fadde1a4bf785cfdad74d4a99eb99d8d16d90953c57517af8e6

    SHA512

    b79bae8144d03926eb74ac81fa1040bbebb8829b765c50e0156d57d5fb1864546df7ebd3fcfb6faf4b96d3aaae31d6727cac8b547da8e7f5c18c9752e72ebe57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    901e39e2105d3ccdde45b6bc6a640465

    SHA1

    65fd7650b8122be2f3693083d424204cedd077f5

    SHA256

    c063e43d782e3941ff6cf443560ab40b348be1fa2bea921fc0008ab66a78ec81

    SHA512

    9f1bf5c2e4b31c8d85d86a3c91582b39899c120e30a839cd2092f31a6cd3980cdd87fe7db42d9bf51e8c606306562d54f6edbae9db52ab638f635545e87d0c4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03371ef6082c7dd98787a51773c8fa1c

    SHA1

    82c9f7882ee7e3ba33e4e890dad1c12b38422771

    SHA256

    14cbe40dc159f6f08898882d072b4ce50f1fa854ebd0c87f58d2924213cdbd56

    SHA512

    fb3fdd89210efd7368364b6bb57d70d1e9768ee603456ddc94ff8f76232e0300601bd58ff78565a572e41f6d65325ac46cfe00fec331eb9d1711a9a3c375f17b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01327ea19a8b55d9285d8adb7295a7a9

    SHA1

    82ccc93c42105fe8aac33be060e4e238aa970e27

    SHA256

    25a91a09a94e20170e797995412604af56eaae4047a5de6aa5fddb5d35339746

    SHA512

    d1fde2c130765e93601473d995d23886a4027bdbd06fea69c9d12bb78a7739488efea986959fe43d054c9e9d8389a0317537c078258ff8ed0e285ffa4f21bc6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ddb2a039c6a638d5e40afa34e2aa04f

    SHA1

    d424465a0be0a75177a61691bb4253eadbbdb627

    SHA256

    170834d63f962a2244e73cbd98312ee3587d0683df3433ea434c623a262513dd

    SHA512

    1ad71c8b5fe9e93a61fa7a56fa4a4e9b1b44f4739afd884f7fc2c4ea772ca8eb5c797a014e8cd57743930a38a7172df919edc62a6289f5c50f2c89075e3fd827

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd6847929671c96c6a3417c0e5d942fa

    SHA1

    7be4c16a2e2485a5cb291a6e31ebe4900347d101

    SHA256

    54f7c1d333cebc0fb6c7dcdf7025a395ea03f17baf74258dc25da03cfa7d412f

    SHA512

    cde37db8caf1f514592248604ba61964f8a92f09159012d46c699e557763e13a9adc498ace5af80c5ef270ddb2284305e4bf4ba9aa863a05646be422648eb9a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a058eacfce9284376d818a5e031bd4f

    SHA1

    98694ce80582056b885d9f584b9ef75e98c3f12e

    SHA256

    17abad81cf12b76f1382623a8713adc8d3d11fa6da67d4a826826aaf84697f10

    SHA512

    1d6c581c44e07641a9ade6acefca61d5356094e8ee246c2419626ba18171b7a601bb34989e1c975db1817981627216562503bb478220c07a08bda151d2a2315a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e892d90e3122f7d059719a6374bb384

    SHA1

    55fbaa17795f705a9841e7b404f7d8bf433a9edd

    SHA256

    cd6f747fe1f6ba01909ad5c1fd57f5394d3993c56cb5fbb26a5dc676fbde9760

    SHA512

    11d1d98bf3727c717444bb0448c71fef178b7c56cff96a13e71b4f0aae9659192df68d98939ec575dd33282de9eed394f4cb5662c18a6568756cd17f32eba393

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    447f9db63a4814d0243f0f6ad4a408a1

    SHA1

    86ffe3470f263ff134f0ae21f8fc821bfc7b0469

    SHA256

    6aadea7a0f8e7e80dc3a1334d9823deef2eec2c6eac892df27a0850662bcc904

    SHA512

    65f72654dc36a42765f84bb68a0e258254d34a85d8779e03481ae3268bb02ac89341e72ece6d141c7b54531d7fe4aee5b6ea1b064c75cb26918fcb1a551dc3de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    401fa841947985fac43c2f3974ceaf99

    SHA1

    e6a970b3c5a6766ad41c473cab56519a4c2e5daa

    SHA256

    c0f5c8ef95f4d514c642fd4dcffb22861c0bdfaa17c7f7d989e42b96e28db3fc

    SHA512

    b549ba7a05241952fac8f3ca042316f146a699ba90b59c3d35fda9a507c5e36af7ba7d678a4e0a660be9843678125f40cdab0169c3b06530aca29ca918063a3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f0391e6412780e7687cfe7a3ec84763

    SHA1

    de122c9568863dcf8801c145eb349c7527c1bc83

    SHA256

    d355f9db32fb183e3db3746fab82b1dfd49125e25f27ffb0bf2e4f6fab618dbf

    SHA512

    308ac2c8cecb5ec6cc12fe2b56381247a6461f45a366421ef3c5c9e3438311720f76e592e0e885b37f0bbcf43953528976365a62449f6db3e1edd4bf7c126412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bfa5240981fe8f40dbddc56a1c354f0

    SHA1

    f4fd8fe8d1a31ef8176934c51741b35963a8afb0

    SHA256

    ba68ff48f316a1e6be7efb952834341f44e7b0846511e8330a37c654c90a521d

    SHA512

    6865c474aee581f0de52c269f3966894eb3a84d1333d5bec46e12c9851cfe50654ca710213df172371ff074522109c3965569fb2372b352f49d80e13bf09e969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9743719f3dfc193bb4a3d244a66a932

    SHA1

    2f7f6d2b23a30c6dd8383e8567ff55e2df2c422e

    SHA256

    7fe7457986d487eafe2f331e8b9734e32681ed2803605012d3123ad135926b23

    SHA512

    de8c93c39c6ad862dbe082e2f3873523ab6e7f7ec70b461e3b310cdc99d8cc6f85592ab1628b758cb775309bae1b9bd4e83c263555a6a851e2cd3c9783e0e579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5d2a0044a3fc3041021b1479c72f423

    SHA1

    3940a52da5ffe1baeb90db1d730ef315813580d5

    SHA256

    0a123bcfcb1c3319965ca790690dee5a17573d6bfe11c7f4b430340adf44feb0

    SHA512

    aedccea2d6420194f5a269630e7d3246b000cb8820279f622e5b05a5f258e888e805a4c750d8402bfbc765097a6879a5aa9be7d22529e95d71915607b9666666

  • C:\Users\Admin\AppData\Local\Temp\Cab39D8.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3A6C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b