Analysis

  • max time kernel
    720s
  • max time network
    726s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 23:36

General

  • Target

    Borat/BoratRat.exe.xml

  • Size

    5KB

  • MD5

    3e645ccca1c44a00210924a3b0780955

  • SHA1

    5d8e8115489ac505c1d10fdd64e494e512dba793

  • SHA256

    f29e697efd7c5ecb928c0310ea832325bf6518786c8e1585e1b85cdc8701602f

  • SHA512

    ea7e3a6e476345870f05124a56dde266e1ad04b557b2dde83c5674cfdf3be00f26d3db6a14a8d88ecf75e2c9e3a12e6955f6c85654ba967c17664e9acc3d4f1f

  • SSDEEP

    96:Xr7T7Kc7KnreNRrqAbGxRN3ZV/Kw4YpyMasJ8J4YqJyM/:Xr7T7D7or8E3ZV/Kw/pvasJ8J/qJv/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Borat\BoratRat.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2256
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82b0afc6cd0f476817d7942870e30438

    SHA1

    e04e5911922257ee1bb4b93406db2d08463e8d01

    SHA256

    4f1c18c2fa08a33b6963708f5999013c1d7b064ea5aa127668faebcc01d734a3

    SHA512

    fd80d6b132328431b4972ada3aa7ad86f5d47be7615a24143ae25ce4152b57c4548e5cec211ad9f42a3758272666e238c636abe1c49d4e6bde478ab4ab7c22c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4298a1e5ced52620230f723ee8fd9197

    SHA1

    c73db6b5525730d85081adc679f20581ca5ca160

    SHA256

    15c8b258a4fe718f1f870c1a4f90ae42277f7d8a6455bd09c7a82e9a39893ab4

    SHA512

    de7dab308dd1d8e4cbab8ecbd84e344d373a763420063fe8c3fa6c0b4e9a3e097f71b24b1181af083a740ffd91002fabc260350b716e7734c0cdd18ef8ee810b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb63f90682349d6a3ef89c42262a90e2

    SHA1

    bb1f9034f0a5f96ef10610974e47d99835e17cab

    SHA256

    bf40bab8f7428616c9732d99549043fb10b9a4450a9dc9572b1a09621aa80269

    SHA512

    7e2c1e915c2941716e99d0a48bf11afe2bf7b563a9f908cb02b27d3cbe60efcd87a8ddcf3a63c861fb9857425f29adbb89a5ab4dfb67c0050abaea307b01f80c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    015ad46f5b6252e8c7f1f76fbc0a640b

    SHA1

    e2917383b50d9e65cb056985ca11f3c88ff89546

    SHA256

    ff2638913f79c93318caa34304e84c32566ceaf9aae3fa32dcec8aea702be429

    SHA512

    3c854baf85257f8d7b769dd321c6b8df92c0716773c78a02a2238f645c10c8525e080ae011619a847f3552ff1be62b0d53a58bd96d3a5c5f9dc9e520e47ce41b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a3077a38f22981bd75870ce0975e292

    SHA1

    a7c47aba933df422b6ab9c10398fc8431479c2db

    SHA256

    17b22643df76c13534afa24c3387b133f5a7771b83b9a929ce8881051c22d33e

    SHA512

    4fb5e957c4e6fb92d18088e3c781f5ab2e20fe49e70e7dbf3a11807ea6a5e2827770ea3fcafb72ded533840e3813eab5906b816906e635735ab64a197371cdf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80d6683422f87ad818a9aa9bd3ba19d1

    SHA1

    5c4b3c544322b8d54f82d4ad632e34e0fb6e692d

    SHA256

    30cce89de353020371ee54341c3f0d8d0a2925af6a34b83f654887823d5d38d4

    SHA512

    90738688c0bbb8689f15290aa94a6116b06aa44194dbec33ac4a4e009c33b7a77908b79188129f482c7239558d4f1f139731d9b6eb28a3444500cfdf627993ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e71e20b87f13a38616fc3cbc3afb76d

    SHA1

    5e912c510b93c69345a4b57d4eb8bf31ccd0ba09

    SHA256

    08ef0ef9390fffe22a53fe2ee2f5befaa98290c603cec96bb301a466f69c5132

    SHA512

    e5bfbfdfbdfb515e2c38a0a4387b20e73c328a2c0ac9354751c8456f75ed3a7e29f77b2c758d0991119773f82e9ae1b0ba4e72e4079bc4f47f8e1b73a7b56ec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e9b73785725060a5de455cf9d0b0289

    SHA1

    845f75f876316a0b5ca8d446ef9eb2b4f20512ad

    SHA256

    d52e356722ad588ec06d9cf48ba338e79202f4c5ab0cb1a9819c01ae59255631

    SHA512

    5e07f53f93db2c3730629f52cb5b64d63b96d2a2badab9e2e9eaa0a3b6526f417e1a3e82228fd2bca3e44a144567392842e38532032c31d737a7ad56d1fe6a74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b23c933b4d631374463823fb1cc36435

    SHA1

    0863442054c7628f864e0d867c4be042e400d5fa

    SHA256

    cbe39e87ff2a9d6ee6ef8a42f716848af85454abe9363bf7a928bf1ad6766b7a

    SHA512

    e73af77add250b9f20314920d24b492474d79dfdce50c0aeeaab9d8f99a0a36da0c95639d82b8e07c079eecc2064d70ef06f601e6a31663c5ad4c43a32b109c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d0ab09934062a81d59a416ed76bb529

    SHA1

    c16347838456780b4f5c44f4778573d036d7121e

    SHA256

    fb51f448fdbd0e16dc7cebc14652623311391087f17cfc2de17857807915b5cf

    SHA512

    ecc6d660823d1f4cb73c253a0d1666ae4e4b18caf6172b39e2a631c968597c606c07a37bc24d49a87d20670720386f9ab7212ea7117a19db386fd1490bb2394c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0b964f50194ef92af89c7d02f634da6

    SHA1

    dac6ce2fbfd88aa03baacf04831f45c1c85c03a8

    SHA256

    9409c58f1941e6026292ef4bba6051cbd683dea2e389c76e5b03418aa96bc0e4

    SHA512

    7a976a0fbeafca2770bafbf0f0e6cab1e759615835bcd6882ee9ed0adba098b7d3185b5af0132c0bb9d414023f4556412e4dc477d37e6e435316adaa48aba73d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54c83fe84a333b11f6acfdbf4c45d6f9

    SHA1

    abe606cae0baf828346cc5da751cd9c774cd3597

    SHA256

    e9f856fc80a605cca457edd8ad8ea9960ece3e60a2695f99bdb5369b4b743ad5

    SHA512

    288721b196c48da0a460a47c41bce3eeb38e0c29e741ba7cdd566f5416e9797eb79101a837c4d5069d8c485b1e46e67fc8992fb8c7f51423914e05f149d25dad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3a8e5b11b86816d658dd5821f8b456d

    SHA1

    477555bd01add632347b925a83402cbecfa64812

    SHA256

    f35fbba63aaaac43cbda9bbd9e4a25544a28fa4a6f2c16960b00fafdae96e89e

    SHA512

    eac8f2f4aad8816a6b321bc0bff6e5e87e1dcb8c46c28260449adb9ee5d7c61171c71c2dd7cfd7fe7fb979e300f23a0d7a133835448aefe3455e813cac5863af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c46288b12100dd0c4763bbe7f22a1d1

    SHA1

    3668a13e9997954636050fc8f91bef941ca978e9

    SHA256

    9383fdf174526ac072e1216c4d08aa0cfe56725770cf052742806e6750b185d3

    SHA512

    4f6d30067d9b001bd697862f2af53ce75253ed2b7dbe9e9a386483bc0eed7efc2c1c8b2ed3fc404178f72440e95950d16b2716e66caaa409e88b833a7f25264c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5d35071fd1553b4b8e2a43e3260309f

    SHA1

    3fd6184577fdce5cb9b39c9bbdde7a727e913356

    SHA256

    0dc9b7289e16c719f8a96601098e682ecd5a8132bbcc7cfd3a4ad5c68993fc05

    SHA512

    eb98b43e3a59860e592679247b436afecfa3d4276cbf9b2cbf5bf64d1e80705a736b2cb4c5046aa41d6a7bd1c670be319452dc9f9b4f8cd4bc7af5390e4e6f7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caa542916e283b19ca77b8fe79df9cf7

    SHA1

    6240c618baef5f9274e3dc1f01d571f2f43e272b

    SHA256

    e3e38314ab3d6c40da93b1b0717a92f015585ad21fb0e263d26501cc604a937d

    SHA512

    c7b110b55efc87e4f6db8d37950e41ec93330984db9484877fa7419622533160c932a7b810bd0c1265b44db224b63c1171116fe2beea0970ed905a2be4122dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9fe25679d99d3fc152f433116b65498

    SHA1

    99045e4472df7a166365ae40a7f85fd081ed8c9e

    SHA256

    28575ed724907e4beb4cdadd909950c0f09e9f800b9476d38b5afeec494d462b

    SHA512

    706380045767d4ad37adc36d76968486d103921c0b684b4d8f46a7177312c8ab57165459588ba6ad5feaa053289e65bcc0dd50c55a68babd81a114594ed531b1

  • C:\Users\Admin\AppData\Local\Temp\Cab2D68.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2E38.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b