Resubmissions

09-07-2024 01:16

240709-bm536aydqm 7

Analysis

  • max time kernel
    1561s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240708-es
  • resource tags

    arch:x64arch:x86image:win7-20240708-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    09-07-2024 01:16

General

  • Target

    FurMark_win64/gpushark/conf.xml

  • Size

    137B

  • MD5

    1a4fd361a25d11e4d8557cf67a36c890

  • SHA1

    23519807aa04b4eeab44986184d9ea8ca52a9ce2

  • SHA256

    df7f6ea753e48efcfa78092f23744eb3a97a2d4d96d94cb8bd9391cdaa1a3fe8

  • SHA512

    832752de9fbbd7186f742151500d83c6e1cc524ed3446b1afd8b6b78abf4f54c99d5b32caf1b7ac597e9fb05f023615aaabc037dfdd02f135d45069e7543adbf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FurMark_win64\gpushark\conf.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2ed3d6f20985be241b9221b528c8882

    SHA1

    e11caef2e64142c46a3fdbc00148b2054cb95c4f

    SHA256

    69d0e25798ef8238581be516f9210616920732a1e1d310086b01e0ceced4928f

    SHA512

    b889607dca11c80340b35d4559c676d1a3794b28fdd8bdb9e4e9dd5629c12b59181ff0f0ae18f3f579ebec559651f63a7a4e8d2e172099bb3264b87ff2886405

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1da2ac8ad8ae3e520ab4812beb72d1b7

    SHA1

    7f76147493feb52ec7844dfedcdbaf490b463e8a

    SHA256

    73f84e55fd0780cf43ac7730549c016dd00512d4a8a532478526b582fcbb86e8

    SHA512

    71bed4a6b0c45bfa986b9b60414ec54b3c3467bd8975ef58f4077b3ae1007f9b36dc6a5783beeb420a30e805efd87e4331fd9ef74ed9e2bb64c7b234b171ab8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b41203ac2a0775f67ad2571fa234dc31

    SHA1

    cfb29c0b64736bfbfbfedee14b967e0d9f3d29d5

    SHA256

    89b4b1b102e18860d04f1ceaa577acd7a99cbc336c31ce6e737f470faaf55116

    SHA512

    d2ce134cd095721f30bdbefb1866543e7a4f07d6704fc6ea4cf010f8e3d823fced633a11bb1738e2b87d8403798363070d97babeffa8a81e3d17ad13686a9ac3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c766c97e46192804823d144517ddb43

    SHA1

    9cfd9db87e252540df9b4e52d38737f69f09b5ba

    SHA256

    be15592c23fbe5eaaabcae0cccc14b629555671a24ccbe4ed5275e5b5e7e627d

    SHA512

    c84ab1252afa4ee04a4dedc167f063ff1e3c0bdc6204cc9836ea3393cf3dfe755f422955b8f0b2aa1d6c2f705644e4b735826929a6f4871ce7d7bc6d66906dd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc7c5c3e91a07c674f9af075f67fdf01

    SHA1

    486ab32d4f16624cd51432a28bd92fb6ed0c6fce

    SHA256

    f1449b44ac0fce06ecd241180e48e73e08bf23c8dfa595373fb855ebdff009bf

    SHA512

    01c33e112ef1810447f5a0f1c700a12085113f6183eb97d3123999519a4ad7795ba690fdc6fda7c9a369cfaeee08e88babb4493e1e45ea75cb3eddc069558a58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f38b4adb645bb86a2a8fe70d9c6a717

    SHA1

    17285c6746eb299ec952de2faa8b6a9065a261dc

    SHA256

    4077293f2050d6642d61844dba645ff8f25f642f05531077acefe8bc76d2c578

    SHA512

    8a07490c4a2c45a3ecf79cc98ab84547e0a214b874589a03e82268d2ef007ab45a0db3bbcf6cdcd25fcf5e3f335309ae638733b5b66a829c9780ee4603404004

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    727eb0d0de40d3b5611819453e07d60a

    SHA1

    fe901f22995a010a788adc7162b1bb1b50b91f25

    SHA256

    89c67c660a53e6d8c51ea76d99c405e5b34dc39ab92e9738457dd02afae12dbf

    SHA512

    e6cc28487a4536a43b113150438468d7d6e88490c90a62a2b772340b1de9a454388f9360661b59f13c83c5fdc923c92b7528aec35ba82aa640ea092ef32a1600

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbe5e81f6b6df4425ca4e9fa34376de4

    SHA1

    bc6bd98affb4a4d6d1583a8a7520bfb0d282d918

    SHA256

    61f3b35b479961f9c01707ad7cb96beb3e0b8323b14070cc7748fed5e462bfa9

    SHA512

    f271bf8f32cd2be8c0ff1d9e8c8d10dfa1a47c787e5993cec5616a5ba9f06d6a390adf27da92b50404edace8bc17f4db6c78d93bc8c51da42f12999b5c1d30b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    852b509c2a49bb2486a4e876eed3def2

    SHA1

    472a5202aa9d4cf934f1524a8a9768380fdc350f

    SHA256

    4564d02858f75627bb6819e3a6a3585116ab4d86f494368b92860a808ad7e665

    SHA512

    1c99283c7815243bcda85a73e4a90be42c4bb11ea69a426c5c29e0a4e8c53caaf7639e8154250f05cba54b240e86c9513361de22fe341971b2563103b4bd06b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    861a6b2b9df1c6e81863ccad78bbf217

    SHA1

    e3d895767b45831c7937a56f6fbf21ce548aabcd

    SHA256

    36f0d5f995376b0ac50df68022b81c876c65d0372c6c8ff7cb7d28941c9c14d3

    SHA512

    b7ac16363533be108d8e19cd7dd5e1398677256fca28f0a7a7cbbdb597d63dc95c9b2f2fde3304f4369f3e3073e626a7ab362634bb8b42e0a5308d19387209a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    892b5f12dbeb1f3af6641f52c71e0873

    SHA1

    b4506c5ff2b0663cbdbfcb0498d146a16dc875a2

    SHA256

    0873322945d2f87cc6e2edc48eaf4e89becf18b321b4f2cfb27109134a38b321

    SHA512

    d6e804ab60eb6285ca3e3c3e8e7999baab0a75ddf4104fd72836621a32124a1286c1915fc7a525c9462ed2443522efb0ec6387ac843859be243aec0104f98a71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e674f26d179ba16b19b7b8cb62de20c

    SHA1

    c11d03774be5c9666382d691c093df8b1ca15f63

    SHA256

    2f34450f5e69c2bf5ca84d1fb109bd75c9ca7d4271f2a4e1e31dee6dbc2393a5

    SHA512

    f38df5d986d65c99c3700e99fb9687887d2fee191259663b2470949d76db94f2688de28decc0bb088a5d45244ec72587e5bdf3391764c479c092166907644226

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    135161a107544a7d3b9302624139b41f

    SHA1

    a11a18f1bf89323b94bebebf31e29fc13a66b1fe

    SHA256

    8c08f24d5540e62acc71cffd403758c302649d4b1b21c647a25157f83a5ca427

    SHA512

    4f79a95bcb80ac9e3e34c0c04712eb1d9987277326974345d484855b5cb983b5dce746dbd37df5c82abf6b851e8b8f2099d81cc77d9bf3a3559e96ebb2d0bb59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f3341ecbcc340bdb637ee1acc9d81b6

    SHA1

    9ffeaa8f655363587e0d52ac48dabbcf6ca33b37

    SHA256

    818cd4da06cb71bc5f3c24d45670df0e9b344380e147472b98de73f1dd55e5bd

    SHA512

    d039363631ed7151fe6b1c58ee9506ad4ecd78f590dc90709bf54cda635d72acc6ddcf846b4b74ff91312604471b4e751f787f730abcf418a9675d9abc03e4d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2c69dc0fd15ef34070591c0abd5c727

    SHA1

    6293ea2c45bff49a4adbf6c81d08eb9554644c03

    SHA256

    ba2bea0bd4a053195af082e58bd2160e23be7396cc52c3e62bf45cee0edce49e

    SHA512

    741c7f9642bac52df07a40dafe81e7a3bdb11bf29bc2c51f54e909ecdec113955698232270f5606326988a660c8f1b2a13182de3c605c8e7d052bc2c4c9f80f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b287b54746c0adec2e1e6fe4bb26d8b

    SHA1

    9640e179cb1c79ad64a8998502c4177400acac5e

    SHA256

    0750867737ec3d2b502a3589e434d57f81f0843ce97fb19554a6d17f5b08661c

    SHA512

    3b95581152927b21ae6d919b3e2572f6bec38fb3135c9b44a699bfd89c96d26623edda8eb53c1884856b7770d0961c3c9bbd830190a471f36205720cbd064de1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dbc76190e85cc63873d68e69cd4ed1f

    SHA1

    e350300a486081c9be29a4f93a9f58b5789c4aa7

    SHA256

    010e495b0a0c7396916be4c4796db0824287d4bd17442d00aa3d1b690f16b72d

    SHA512

    361ec5bbc52c53a2671a39ef3f22f8f3831dfc862af6e2a380e3a0fb31edc10f153afb0577ef264ddf1bb6812222e00a0d414d4a3f6c6c1921c3cfb12b75c329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c44811f97d0502a6fd91ffe8d8e1822

    SHA1

    74a80b4e46b71aa99f20892e267e8aebb0cc363a

    SHA256

    68b4bb20b6573d3345caf4adef1b4ae06621548b34c41926bb696e70c026d3e6

    SHA512

    5061bfeef34d39f0fa6e3579b806d0f96942f23757bce3620dd460970e0b6619a53b7a854b5f5f91a5333726fe01358052b559d0665808aa5c618d3cfa080f7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73b7fad7b51b5010a54d98e89f6f3098

    SHA1

    5213136d9c80d0db52d21c9309b7745b76538742

    SHA256

    cae13213a8bf5024f4b18a5650b3221c2b0f8550f53274f42c5b615a55d5d604

    SHA512

    20d609e4b508eb49318a435ac9deff666c38d067c70e41e551ccc44d71212727d6b95917a57a77bd056debd910a95aa84ef297fd10cd0e2f80e0719e60144a66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ce219e7c226fd66fb127a2c278cdc2c

    SHA1

    fa8ba697b12e0d678d2d59f91aa1064756744c7b

    SHA256

    65a912824525188bb31e6da8892951b5fad2e4439c3644a2de9cbfe7b5dbc520

    SHA512

    749391e9d43a72b9834bb9d2c3c52012b0b41e388699c949046274e26c04099747e8e1ec09838b4307bb12da132f2211b2669afd40b14a69118c697e13ef2816

  • C:\Users\Admin\AppData\Local\Temp\Cab9484.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9534.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b