Resubmissions

09-07-2024 01:16

240709-bm536aydqm 7

Analysis

  • max time kernel
    1559s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240705-es
  • resource tags

    arch:x64arch:x86image:win7-20240705-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    09-07-2024 01:16

General

  • Target

    FurMark_win64/conf.xml

  • Size

    137B

  • MD5

    6f89cc3724d087c8223bd50df290185e

  • SHA1

    aac3d460fc2b3c6b99ac705a7090a7ce931b2f7f

  • SHA256

    9fc196fe75343a7ab61ca39f5505efa6215a80e14a05a1407ec4b90e4c01d727

  • SHA512

    51cc2ed0dc4fda6bd13328e5985a6657e308b46aaf2543b79ba839088a5f90efd4e3659d7ddbdc42861c3808f7cbcad566951689ff561c27bb991a21d01770a7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FurMark_win64\conf.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5f686a8bd3c746dfcf45d0faad6af1d

    SHA1

    55f5c0577cb3c80d9cb43583fbefe9203d7de1c6

    SHA256

    b55aa533c4725c5cc3ad73ac7320e5ca7de2911db184fcb0e2dfacca7f5931ec

    SHA512

    0ec0eb67512cef9906462ec451b358b07263fa77d1d1c53a4fc0b1054e259a1a29ca6ffc558faa4760c13021bc9c842c86ffc45149bbce1fe6c4f6bb29696de0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c76f184a70d212c0d9a331d76dc707d8

    SHA1

    1654dfdf277cdadc2492e939c87e9a1d1c027ecd

    SHA256

    8837d2e0cddddba52d15b5e93283adcf7de6f9281ca34d9d427de4dea22e9ee9

    SHA512

    7bf298728a4a6ce7386e7e215d674e41b3dd008c94312ee0d213345191e511c9ec10201fdaffc386c9c48fe821f8bad040dc9dbc987aed5434dc57729b2c9919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ef77284ec694ac1bf7beb4ba5c7e6a2

    SHA1

    7be2b3b223aca8dc952a8382021157fda29d2990

    SHA256

    faf60e754245f02c3345b40d7a54535b1236b8b4ee5ac238d0d814885f727f33

    SHA512

    5c154bffce8da0a0f1154a475ef2ac3a0e308b879dd2b057ff656524eced835d832d6624fbc5f0b6ddc813ee2fbd9ddb49e0e258412d564caebe234b5b816183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    812f04d5fdc680a0ac715b248aba1a5b

    SHA1

    c79af761a003b52221a9c7390eb5c2a579c230f4

    SHA256

    55e29e4d9ceead66c3069c9a7a9462351d58aab4fd1bf06d289da31472333904

    SHA512

    8fbac4e0c28100af3a20471c9d5c0751b1152ac523e4bec4ede67bc7b1c7a855bc977ca24120368e17ffb5c09d4e2bd7aba7bd1ebc9b32d6bca090975cd34486

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a6eae100f28822454c166382b4bb77e

    SHA1

    6c709534376ecced3ed7a3b043ba60f204c9be1a

    SHA256

    36c49a6c50ee091aaaa4081ef42647268de92ceac1b8bc65c548275bf508ada2

    SHA512

    fa36849c5f08fa9a0db28ef3cd30926d5c875729a06903414fd5b3b2671eeeaac307df0134d4102680f75c3bca4072d7328843c32034be0ff996ec8705c2ff1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68570c39d24479fd536ade1d804684a5

    SHA1

    ac2ae95d05a950b7705b357a92adeb77e0ce82b4

    SHA256

    ed82adf2493c271118136e8854925c7e1c43b7769ee7aa9d6cea168fa0adce5b

    SHA512

    cee00f11997a9f8382f9abfc2a3ffc67b0fcc4c965b05c20674107d643e3b7e36fa645e9fef33f7cf9b9229fde50b62da553c21a21dd5d18adf5027fdbc09f02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ab1c6d7575d3aa0f5f5795b183b8ae2

    SHA1

    bc2081d0240fd040955f729d9459834c04fd9922

    SHA256

    c273e300fb902222d791013e4c2216c8f7e2ec996ba0466a1a55d9fce5328c61

    SHA512

    1055e8ac59b25eaa5331b9a9666e29becb41c78f17311045066da79cd8d53d3c9dcc7603d399e57f2d3ef7739cbd2be412455f4c6aea8f16430fff95b3803f93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d30a7d85ea3fc99a7e84159c6803f4e

    SHA1

    f9a38a3cf90b4ed982c9b94754f185e3f56c8d00

    SHA256

    55d8783ebea1ea6d89fc848b5fa2f20b550f805b0f0503ad73e61d46f6979d52

    SHA512

    49cc3e63736d42b6634790a0357589802d230f66bcb17da237f707cf7ad0d560f65581adae1443bf13f25129d44ea55fa929d2bb902f549ad2b9d574d94624bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a8a0639fade3e586025b8baf9e75bc2

    SHA1

    e1d5298ece32e55828ca7a718c177d08e5f10a22

    SHA256

    51943c9d402d77b9539f16bc28a5b0999d73722542366d1e714c3383138fc476

    SHA512

    c0ef219d1b233533369be0ab780c1aa84c4af340686f075c5afc7570434b11e251bae49267a541c3d011097186b352093dbf2842a1b80fb7f38b8e2d6d509436

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3a277155878b81e26745f4f08cdcf63

    SHA1

    e8a490573e3efc00502bb8f250be8ba87c2146c8

    SHA256

    ba9cc24184f4b5bb93a5e05a17d8aa76e1f51eb6d6311a2c0b6f88fd4598e03d

    SHA512

    ddd730a102361734628c75139df555596aafdd76129d13cfbc577bf2a1444b70713804a4075171c6b43b59ef5e49674ce9f63975fbc3d3197d609992ed1247a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e300a6802a280e2a7066977a435b1e83

    SHA1

    16bc67b906bc8234196bb47f6681df035735263e

    SHA256

    ac52b627112b72f51fbfec2f3cba96cc2a80f5ffdfb0d0490d2d9a800b346d2f

    SHA512

    e4819f9bfd9ff9febb008f661bc2e8ef864717612c144c9ea49a03d92fe7d8f758cc8779d4d118339355bed5ddf81e4fbe9ba49a78627b5a0245a13a0d4cebc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd9a3cdd99ab959a6ca06cd94df5e3cb

    SHA1

    21b1f13b8d7e6bd6443b7be73d5c435581c53b9d

    SHA256

    c2344bee94b8b3ee1d2875535f35edd0ca292ad0312a50084479bdaeeeac1a86

    SHA512

    3e897293ccee4ef8866908b0144029cd08300c6e98be23fdaab06099585187bda1e5b809bfa3d255b1675451f94a39b3e25544275a99889012597891f0e4c5d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11273bcb85a62a9d9df43f716e373100

    SHA1

    01de40cab97e6e301f5fd83d41ffe733e5cf5c45

    SHA256

    3412217f45c47772d9673e58b4094ffc3460e15cf4eef3d02ea032ef9d3712ef

    SHA512

    072faa1b107a44599a59fdb2cc47445f96a97ebde9a0ccb319e8468d7635406c42312a4b50cd5bbeabe5b7d98c17eba5ea2ae755ef05478e1158d3f32e7f3823

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f172e4b4b4cd5f4c39eb20f924ee6ad7

    SHA1

    621d81a9062f158d1897fcd0369d96268134b516

    SHA256

    ae03159ade10c344b92a1c094423f276a24cb86ac5cd65ba834b58f54909ad36

    SHA512

    94ef40b6002c58b7694070cb7cf0575ce7393711249c354bdbd038d0e8d1998bf2cabfe8d5269590bc0bdaae82dd61f39b3a4cbb02f8e5424765a6f6fbf75011

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b3943c8c5c5fb376fdad749ac785109

    SHA1

    9633252aef93271a6f4403c24d5bdb46b58acf6a

    SHA256

    15331639ab2bcacfa2e498b581b0ed0a79bbcff22586fad777d1c81c98263253

    SHA512

    28cae00218118ea82da508dd8828bfafbded0395b10837fcab372e26a6f1ef8015379768ca48a7a96c0f828596decd7e1e090651c0a4650584de2322f980351f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cf3ee4bc9d93a0ff7d96e465375cb9d

    SHA1

    4fd59ca45dee288d97a39139312672da7365e83b

    SHA256

    b036830d84093375963ee53fc74aebde74c5ee61d5c4b6b096ed538dcc7f6da4

    SHA512

    d707480feb38e43fde1cc1e5f49bbc92e252ef4be15f37ad5363505476ab5fadc6dffb37090eebc32c3a2b6c5750b0c3d91ebea3beaa15658a8fe52adc4a3ae4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e5460ebd640c6c686057b64f34c889f

    SHA1

    fe39b5872280a39746eec12f46602ce291c5d267

    SHA256

    3ae4c678afd67b4011ae1f5cadadd348bfde97bc70c94cd1fc447dd274292a54

    SHA512

    5098bd2e86bc291aad333308725d5d1ecce15ba3d9c90f44d9b17efa60a3903d86313795c043b144db0e4f75a501df0ca3dfe117b12bd5ed9a23a263151dd95f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5e64deff4281d24735e5a3a4c0c52b3

    SHA1

    12f80d066f58eea42c4f1b833d38056982cb8b02

    SHA256

    3c587bf55d096c143784597b9a5d7c7ebe2261447d7e2ad7232a0ad5429318e7

    SHA512

    dc597a2962355a492ebdec2330636d3bf006b5de5d8d4f150f28bfd3bdc90275b421344aa16e5c7f57922ff7ec9d85469212354f434f57a3240f0e9adb4e756d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bdd63ab851cb6040bd1f7952177aec4

    SHA1

    0a255efebdc3a287d2909e46427c182309daa44a

    SHA256

    4a6c289fd272e0038ab4715c5bca3772d5936c426af81a30816a6456c16e06df

    SHA512

    b8bd36c810017e30937aa3625be36e991f46641d4060274bfd7767f4fb585244de634b3da5c39fa7312f7b8d049fd1b7f6f6deb3403be4c5aa41c8127c0f2882

  • C:\Users\Admin\AppData\Local\Temp\CabFE2F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFEA0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b