Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 17:48

General

  • Target

    DiscordMulty/lib/DSharpPlus.CommandsNext.xml

  • Size

    62KB

  • MD5

    4c50f3b79cfd2db77b17da4180c834f0

  • SHA1

    3d53f7ec434da0eebf73b2ffe77768948207255f

  • SHA256

    b11d46d5a06d21fee69e0f51ba6b5ae7fbf7478ae12ea5fb1cca9a7ebc6453f8

  • SHA512

    fc6842bc4671a1e87eb0fc87cbfb434b180c45273c9473a5dc88d8f20b61fba10f4cff53a940e046d94f3089eff5f3358a9a56c0ddf6871fce67887f61c215ca

  • SSDEEP

    768:/GpReTgtyIrM7TEYUfhUeOhQ+eOrDVZJstymHa+nzM8amujTD6j0jErghW+rBo/J:oGTD6oI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DiscordMulty\lib\DSharpPlus.CommandsNext.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95ade290ef03dc7f5a15ac62db59d307

    SHA1

    fd5c046c6bfefafed94d07d54c33bdee5231da90

    SHA256

    c50964bcaf152f936864f4fd90327da78e077a90e8849cfaa1dceb416ba7627a

    SHA512

    4af431f24a9090572f1b0fc0a6be70ed07c00fd453d8025b3ceebc575f782d220b53d576ee57c5c118569b3e8772a23c4cf6ba1d275b92ba92adefd14c1902e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5847e9356550fd1cd208a36e08134241

    SHA1

    928a59aa4ba2d2161351630bfe5b0e2486b1c5eb

    SHA256

    c22dfaf2e138a1c57c067098680b2f34b3c95b23decd8c3f43aee50b983b4274

    SHA512

    6cbc6cd58f7850b4c65ef3dc8a04a269c9d6efc49a8559d3961f0364f2c94ac03692b029db815f4e1b5a5148c07d49b78c619dcdf665e8f58299ba7d37b0d518

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86f623b984923b774757c94b036c613f

    SHA1

    6dcf4b195d0d91d98090cf5e958551453be972f2

    SHA256

    7bf2ef32d3bb42267d8e9ac6b1b09ef33ab80b8fc9d508bd5c001a81b24cdbf6

    SHA512

    1d9f94ec168bc6c6666d0abd55c4de1097a1a422d6d4f816dd9c1477ad168a6dedb4f39ccc1cba9b5b951e92110ea7709b2e472956457f6c4896d1e4278b5cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7f0188a361aec1adff4ba9aba117152

    SHA1

    d44660728f452a75173583bb3eb43641546808a3

    SHA256

    03ba4badc6e116ce85b96b0ca4802ef6ef01e37d5618da2de80630a8eb98b8b0

    SHA512

    254e3edcae24ff7e32f6b2c19a6800a861ae7d40930042c7c05352f16e0100045b04e5b212cecb21370ff0951498be42aceed4132e5b1a3d8305306ec384a14d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf905f1dc1074800c81de0b25611c55f

    SHA1

    c49eb2b6a6bd22d408398f1a87ba9ed6ac984e3b

    SHA256

    8cbceef75cb387905af0f8c78e50648cb4458c88a8072ae008c77f104a39baea

    SHA512

    0862277aa0ed50a7d71029f3d55b19da6c3dfded690d1202b687d86378fbac75722284b1223e868ca04610a96f8f0510851cf8b61ba54d00a9c387553c3c3d04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a89621c910b4d67b46e09114642f61

    SHA1

    9f2f586c1783aacf7abe76241d8560cb655f12a5

    SHA256

    634a8f0e5b8df36544a12630484f327cdeaa36c34c477d03ece0d96a1e4743a9

    SHA512

    8f3436bfd80a9d96d2b8d77438e9af6aac24a9e06895d0703d3e3c0a0899970bc756684d93ff7dfe392a5f376a4ba182e1c671ac98d38fe47ecd20b6fc9f627d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d7434cd66b1408af85a1d9868ba6cc6

    SHA1

    f9ca089bbaacad4c11f37d1918108c12730d06a5

    SHA256

    e6c8afa7b13b00def59dc2dda8335240cba960c97b1c1a8828bb63c32e0df3ae

    SHA512

    da7dcb77eb5fd856e6210e357f01a8ef8fe2906db8ebfeef2f0d7dc9ee7ad538007492623be62c7b1ce552e89dfc566988a9204754c9b761d3328405c82f4495

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    877a70c462bc332fb1192285ad2f9dca

    SHA1

    3e41b3ae3a1d0abed1c08bda5d573d85a1164ad5

    SHA256

    72ea94b35c7204761d98ba1e98b8f729f96e6cdb4c4818983597f623972c394f

    SHA512

    5b975ff17968775727bd241ac3c6f19411c265a9bd3db4d2a651dcc92e5fbfedece8f80233f4b2314090716e91bf5336462b29168af7fff189447e4bd36b946d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d983d6a7f1b8e88629438608c7a658e3

    SHA1

    c0ef2598154c0877146f582cbcc333c8d26a38c6

    SHA256

    c895d03d11f97c545579a81731eb6fa0b01e6be0e033485637f3cdd1f8a5612a

    SHA512

    465f3aad27983cb56475522d5bf665dbe78d1fc52d3ff5810876180974721563886a28e41200b404e4244ea21518e77d3767cc34b49d2e853c040cd28a946bfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2283132a6acc6dbca990e0ebda6fba82

    SHA1

    c88b55a80819a5e2b9749cfa54816f37a2df1833

    SHA256

    1f50585e2ab721ea31c68b86c4c922be758502f5b85e16efb9d9ec185037778b

    SHA512

    d38ab5f3b0918c389ca26461077133d4a07049076081fbfa9d64e33080cf72628aba02dd7597f2b69bd49945f682b7eba82d4a7c6f972a553135264d3edac5e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5cadb18221b1b592393df1797a3b668

    SHA1

    754cdb3820328aacac8152d768b6cc7b3d54c48d

    SHA256

    77a3f625303b3644c9e009b73149ea1d3829faee3cfc2bd88f5600e9347900a7

    SHA512

    b648839e17acc50ae46db492bcc62d39023dafdec48eec769b869c4e16254fa6c1fa3eae8e949e24ed5b2882b3e3a719c5ae1d1129a82d36e4bbe7ea91fb0692

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f66672fe9c41d959484867432e59f74

    SHA1

    b52f794d8d8401ee363707fca67a17f9f5d1cc40

    SHA256

    db7baff7ce4cbaa9090e5202763d3ad3f4244b9686a2185e64692db0cae39841

    SHA512

    ec4c353b2bdb361a7ccfd41d42afd1e0488c8676bebc6d7ce3caeddd25b474507ecbe512db758dc5b32dfdc0783fec49d9885c6769c109715c88124b7d49cfaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca30488a7ceecf46a136b962f3399430

    SHA1

    955b5f93ee18d561ef7ab966ff24fbd354271bc9

    SHA256

    db6523198d9baddbd879382685259f0f0b65983fa8d16ad5fcfc44838aae1c5b

    SHA512

    0e6ee7e5cecdc8c6406839e4f4dffd8d875f92f90c63c55b80c5c2cd5b5b167a1780102fbaf76d675a117856a27ec8a3b768f6367a3b472272f24e2a1f960a87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f34346014f3911392f8919ad539f1280

    SHA1

    4d3ea9246bc848b3c0218b4781269d4524d4bbbf

    SHA256

    f9c1a5f1f60f38c6414434eec91b090639a2bec0932678341d7aa373738b0957

    SHA512

    d9f8ed9af4abdf767a5abfccbfac1d73b3e33faec664327b2435a2c9f2ce1ec5bffb4df7419f7f3bd473deb23d01d884d4f7301aa23017ac2bd12cf7d032b969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32b2749484ddc56f031f09688a7489aa

    SHA1

    07357face82a1aab432eb4a4d8190fd57f53d450

    SHA256

    78607bcd8e40d35c63ee6241b9f43eaad6ef6e95fcda9268db1435f831741dc1

    SHA512

    1633d668320b36fc105e5c3cc51eae2ae9942c33d1edd19a3767c9e2034996b88b575f08f872843f8f2f7ef08e4bfa04c168925f002ed32f4125aab788fc55b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36d5e4dcf4da01b150e5c05ed52ab0de

    SHA1

    d28d38e74f83792b6dc1a7dbbf415a187e6098f1

    SHA256

    e36b49579bbc2cc15e667f714a886e412955839aea001e0167637745417ecdb5

    SHA512

    b92158e9679d35e889802a6bc3d226f753892fa72fa84096d86ac731126aa92b013916d88ce29c5f6829d3eea3ffe53d77e83fd6d00975d8e29dc4b100f84532

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7df1a65b5df5d941c3e879c72d1a68d8

    SHA1

    772017478c8d5bf7268a0027244636d38c2fb5f7

    SHA256

    1311076707e0c45830cbdaa4758d913adf12c2b4065b692f929bffc982e9df15

    SHA512

    d189d82c115e0aca41cc02e33c666e7e23f4f06399b31cf3b207c86b75023679f03b7d94a56f4afb8c25da3c5419ed5f36a1a6db1c660bd8cdd40557320f96a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91b7b88c7b241cc9437ab44448cec393

    SHA1

    1cc71266c29e9b8d2347651db4b0ce5cc55a2e4f

    SHA256

    3b44d59cb38ea8b20b71bf069895745747d3da7381bea368c2a6eb2132b53e79

    SHA512

    c867565055762b14cd7e9f39e02ea9e7e9c30ee2db016afa8f31c308c146fe9e51d57d74b743d58d086114300b4a28d63c128586fd41baa503bae2c3bc98e2ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da0e0c0f3b9bc6b74b06176f4d362645

    SHA1

    d7e2acfb50944cdddf34e8f691a22c7714bc206c

    SHA256

    600a24c057230f3c851d1a48b636f10dcf099b9e90861b79133c38f8b8dfd05c

    SHA512

    f761e5e97f12e30f3a4f61d7ff5f64ba713c486e69647522fb5d6dc5c30421683084ac8da64d34ad582c4a0d49890f5038bb31468948163353f568b089f9a6b5

  • C:\Users\Admin\AppData\Local\Temp\CabE274.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE324.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b