Resubmissions

09/07/2024, 01:16 UTC

240709-bm536aydqm 7

Analysis

  • max time kernel
    1559s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240705-es
  • resource tags

    arch:x64arch:x86image:win7-20240705-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    09/07/2024, 01:16 UTC

General

  • Target

    FurMark_win64/conf.xml

  • Size

    137B

  • MD5

    6f89cc3724d087c8223bd50df290185e

  • SHA1

    aac3d460fc2b3c6b99ac705a7090a7ce931b2f7f

  • SHA256

    9fc196fe75343a7ab61ca39f5505efa6215a80e14a05a1407ec4b90e4c01d727

  • SHA512

    51cc2ed0dc4fda6bd13328e5985a6657e308b46aaf2543b79ba839088a5f90efd4e3659d7ddbdc42861c3808f7cbcad566951689ff561c27bb991a21d01770a7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FurMark_win64\conf.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2320

Network

    No results found
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    831 B
    7.8kB
    10
    13
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5f686a8bd3c746dfcf45d0faad6af1d

    SHA1

    55f5c0577cb3c80d9cb43583fbefe9203d7de1c6

    SHA256

    b55aa533c4725c5cc3ad73ac7320e5ca7de2911db184fcb0e2dfacca7f5931ec

    SHA512

    0ec0eb67512cef9906462ec451b358b07263fa77d1d1c53a4fc0b1054e259a1a29ca6ffc558faa4760c13021bc9c842c86ffc45149bbce1fe6c4f6bb29696de0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c76f184a70d212c0d9a331d76dc707d8

    SHA1

    1654dfdf277cdadc2492e939c87e9a1d1c027ecd

    SHA256

    8837d2e0cddddba52d15b5e93283adcf7de6f9281ca34d9d427de4dea22e9ee9

    SHA512

    7bf298728a4a6ce7386e7e215d674e41b3dd008c94312ee0d213345191e511c9ec10201fdaffc386c9c48fe821f8bad040dc9dbc987aed5434dc57729b2c9919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ef77284ec694ac1bf7beb4ba5c7e6a2

    SHA1

    7be2b3b223aca8dc952a8382021157fda29d2990

    SHA256

    faf60e754245f02c3345b40d7a54535b1236b8b4ee5ac238d0d814885f727f33

    SHA512

    5c154bffce8da0a0f1154a475ef2ac3a0e308b879dd2b057ff656524eced835d832d6624fbc5f0b6ddc813ee2fbd9ddb49e0e258412d564caebe234b5b816183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    812f04d5fdc680a0ac715b248aba1a5b

    SHA1

    c79af761a003b52221a9c7390eb5c2a579c230f4

    SHA256

    55e29e4d9ceead66c3069c9a7a9462351d58aab4fd1bf06d289da31472333904

    SHA512

    8fbac4e0c28100af3a20471c9d5c0751b1152ac523e4bec4ede67bc7b1c7a855bc977ca24120368e17ffb5c09d4e2bd7aba7bd1ebc9b32d6bca090975cd34486

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a6eae100f28822454c166382b4bb77e

    SHA1

    6c709534376ecced3ed7a3b043ba60f204c9be1a

    SHA256

    36c49a6c50ee091aaaa4081ef42647268de92ceac1b8bc65c548275bf508ada2

    SHA512

    fa36849c5f08fa9a0db28ef3cd30926d5c875729a06903414fd5b3b2671eeeaac307df0134d4102680f75c3bca4072d7328843c32034be0ff996ec8705c2ff1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68570c39d24479fd536ade1d804684a5

    SHA1

    ac2ae95d05a950b7705b357a92adeb77e0ce82b4

    SHA256

    ed82adf2493c271118136e8854925c7e1c43b7769ee7aa9d6cea168fa0adce5b

    SHA512

    cee00f11997a9f8382f9abfc2a3ffc67b0fcc4c965b05c20674107d643e3b7e36fa645e9fef33f7cf9b9229fde50b62da553c21a21dd5d18adf5027fdbc09f02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ab1c6d7575d3aa0f5f5795b183b8ae2

    SHA1

    bc2081d0240fd040955f729d9459834c04fd9922

    SHA256

    c273e300fb902222d791013e4c2216c8f7e2ec996ba0466a1a55d9fce5328c61

    SHA512

    1055e8ac59b25eaa5331b9a9666e29becb41c78f17311045066da79cd8d53d3c9dcc7603d399e57f2d3ef7739cbd2be412455f4c6aea8f16430fff95b3803f93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d30a7d85ea3fc99a7e84159c6803f4e

    SHA1

    f9a38a3cf90b4ed982c9b94754f185e3f56c8d00

    SHA256

    55d8783ebea1ea6d89fc848b5fa2f20b550f805b0f0503ad73e61d46f6979d52

    SHA512

    49cc3e63736d42b6634790a0357589802d230f66bcb17da237f707cf7ad0d560f65581adae1443bf13f25129d44ea55fa929d2bb902f549ad2b9d574d94624bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a8a0639fade3e586025b8baf9e75bc2

    SHA1

    e1d5298ece32e55828ca7a718c177d08e5f10a22

    SHA256

    51943c9d402d77b9539f16bc28a5b0999d73722542366d1e714c3383138fc476

    SHA512

    c0ef219d1b233533369be0ab780c1aa84c4af340686f075c5afc7570434b11e251bae49267a541c3d011097186b352093dbf2842a1b80fb7f38b8e2d6d509436

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3a277155878b81e26745f4f08cdcf63

    SHA1

    e8a490573e3efc00502bb8f250be8ba87c2146c8

    SHA256

    ba9cc24184f4b5bb93a5e05a17d8aa76e1f51eb6d6311a2c0b6f88fd4598e03d

    SHA512

    ddd730a102361734628c75139df555596aafdd76129d13cfbc577bf2a1444b70713804a4075171c6b43b59ef5e49674ce9f63975fbc3d3197d609992ed1247a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e300a6802a280e2a7066977a435b1e83

    SHA1

    16bc67b906bc8234196bb47f6681df035735263e

    SHA256

    ac52b627112b72f51fbfec2f3cba96cc2a80f5ffdfb0d0490d2d9a800b346d2f

    SHA512

    e4819f9bfd9ff9febb008f661bc2e8ef864717612c144c9ea49a03d92fe7d8f758cc8779d4d118339355bed5ddf81e4fbe9ba49a78627b5a0245a13a0d4cebc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd9a3cdd99ab959a6ca06cd94df5e3cb

    SHA1

    21b1f13b8d7e6bd6443b7be73d5c435581c53b9d

    SHA256

    c2344bee94b8b3ee1d2875535f35edd0ca292ad0312a50084479bdaeeeac1a86

    SHA512

    3e897293ccee4ef8866908b0144029cd08300c6e98be23fdaab06099585187bda1e5b809bfa3d255b1675451f94a39b3e25544275a99889012597891f0e4c5d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11273bcb85a62a9d9df43f716e373100

    SHA1

    01de40cab97e6e301f5fd83d41ffe733e5cf5c45

    SHA256

    3412217f45c47772d9673e58b4094ffc3460e15cf4eef3d02ea032ef9d3712ef

    SHA512

    072faa1b107a44599a59fdb2cc47445f96a97ebde9a0ccb319e8468d7635406c42312a4b50cd5bbeabe5b7d98c17eba5ea2ae755ef05478e1158d3f32e7f3823

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f172e4b4b4cd5f4c39eb20f924ee6ad7

    SHA1

    621d81a9062f158d1897fcd0369d96268134b516

    SHA256

    ae03159ade10c344b92a1c094423f276a24cb86ac5cd65ba834b58f54909ad36

    SHA512

    94ef40b6002c58b7694070cb7cf0575ce7393711249c354bdbd038d0e8d1998bf2cabfe8d5269590bc0bdaae82dd61f39b3a4cbb02f8e5424765a6f6fbf75011

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b3943c8c5c5fb376fdad749ac785109

    SHA1

    9633252aef93271a6f4403c24d5bdb46b58acf6a

    SHA256

    15331639ab2bcacfa2e498b581b0ed0a79bbcff22586fad777d1c81c98263253

    SHA512

    28cae00218118ea82da508dd8828bfafbded0395b10837fcab372e26a6f1ef8015379768ca48a7a96c0f828596decd7e1e090651c0a4650584de2322f980351f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cf3ee4bc9d93a0ff7d96e465375cb9d

    SHA1

    4fd59ca45dee288d97a39139312672da7365e83b

    SHA256

    b036830d84093375963ee53fc74aebde74c5ee61d5c4b6b096ed538dcc7f6da4

    SHA512

    d707480feb38e43fde1cc1e5f49bbc92e252ef4be15f37ad5363505476ab5fadc6dffb37090eebc32c3a2b6c5750b0c3d91ebea3beaa15658a8fe52adc4a3ae4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e5460ebd640c6c686057b64f34c889f

    SHA1

    fe39b5872280a39746eec12f46602ce291c5d267

    SHA256

    3ae4c678afd67b4011ae1f5cadadd348bfde97bc70c94cd1fc447dd274292a54

    SHA512

    5098bd2e86bc291aad333308725d5d1ecce15ba3d9c90f44d9b17efa60a3903d86313795c043b144db0e4f75a501df0ca3dfe117b12bd5ed9a23a263151dd95f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5e64deff4281d24735e5a3a4c0c52b3

    SHA1

    12f80d066f58eea42c4f1b833d38056982cb8b02

    SHA256

    3c587bf55d096c143784597b9a5d7c7ebe2261447d7e2ad7232a0ad5429318e7

    SHA512

    dc597a2962355a492ebdec2330636d3bf006b5de5d8d4f150f28bfd3bdc90275b421344aa16e5c7f57922ff7ec9d85469212354f434f57a3240f0e9adb4e756d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bdd63ab851cb6040bd1f7952177aec4

    SHA1

    0a255efebdc3a287d2909e46427c182309daa44a

    SHA256

    4a6c289fd272e0038ab4715c5bca3772d5936c426af81a30816a6456c16e06df

    SHA512

    b8bd36c810017e30937aa3625be36e991f46641d4060274bfd7767f4fb585244de634b3da5c39fa7312f7b8d049fd1b7f6f6deb3403be4c5aa41c8127c0f2882

  • C:\Users\Admin\AppData\Local\Temp\CabFE2F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFEA0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.