Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 17:48

General

  • Target

    DiscordMulty/lib/DSharpPlus.Interactivity.xml

  • Size

    149B

  • MD5

    3dd73e93919b7c4061db454e7ca11ace

  • SHA1

    2127297471f62d994a11485995dd11b21031d63d

  • SHA256

    67ffa4def024e8fa53039eee075808e60b34a813774565b5de805c099e96be66

  • SHA512

    adb31f0542aa31230d02e92f07016d6a42377b422efc605b4689959a4ead0ff273395beaec17bf354131b99a4a3bd30b82166f102f81a9753db833b09faf2082

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DiscordMulty\lib\DSharpPlus.Interactivity.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7c117fca7ee662a2b535e93e757c5f6

    SHA1

    4d223c556d9b9a735144e371b69abf34408d1dfc

    SHA256

    83d6f5a1606f6cdf595973a2193f10105882ac5a2b9b3302dd3d4d8e5d759cf6

    SHA512

    9176e88feed5f6009c2c375087666d0fcf37b3c618829a1df17d5d59591722f54ecdf7f0b9c5157be5e0d34bba9e6385bbab5ad9f54363a753f856af0ea3842c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d71ddd92f260a18b25604d91b027bb5

    SHA1

    84ffca2e4326e47ac45d1b200ae759aa8aa18a6c

    SHA256

    2851afeb15ad3102e53b6f66fe37dbde03c70280b2accdd640842bfae7b6a981

    SHA512

    a3877c4a8636d3cb260a3a642e6344823c917de1d3394fa7e377cc88e89578dc6a59f7ae9ba2fd26f0bb8fbb38946c28f2efb0a02941010882e3b575fe810902

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c2535aa6a3a961c30fe5a7399457e44

    SHA1

    739f9e9481995cb8c6aa1b9f312086a697262945

    SHA256

    2a306f6d39aaf0186397c11fe632f9afa9631c178de67e09761cf387cbc77359

    SHA512

    7d839a52867100ee8cc2bc96aa2a4c200899ee08b17254356530f062e009a86ac5387d547e72f2074a586863366631ba241a4e84f5f424811e80d27d9b8fc8fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aefc30f8dc4fb06025698dc1a8e57ee

    SHA1

    4e94f602a190d7c7d168c6b975cd5217c1c7f4b7

    SHA256

    639636b98bdc20dfbd9b61f962e3dc506a5db8bbfc67f9c35bcdf28c20517f43

    SHA512

    6303bb7633b3e3af5274a2425e363843accbe20dec808fb21134a2e1023e6d8535257978d1359dc90e02664f56ab7fd25267a291aab26f1d2245f9ba141999cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4767a9093d9f715c63aa8a53ee59d43

    SHA1

    1ab0915af89547130fb51ec611c947a1b2fa69da

    SHA256

    1d6100df34cc9aa895d01e0459afffef0e50e9598c874510ce06de145b315128

    SHA512

    b56c219d22c7653f950d3e660b64d733836f99e69d4d37250b9ee19d44ada698ac3ceccb804900054dab21c045692057a9537227f9d2119343cee11e77c6df46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    726c7f61a056e30c862f8d950fe17c23

    SHA1

    a7036969a5c8e926a24c898e6cb9966893e127c1

    SHA256

    56af760db4d4a3d216f2b9db98240f88e55e0dd85c8cc6a04356d334c615f0ec

    SHA512

    89a00d7e177f2318ffa2b4957812e09fd5d26a065b3864e6be0f4384ea925b27583cf6534a622016bd8cd4ab0282281614c109eeebf76a52aeaeba1398f75d48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8945e61c924992a964b080888f7c257

    SHA1

    7f2a28565dc0a7aff9da8284f5c014ca5b9daa8b

    SHA256

    ea6cbf1cb84c922e7a84282b7dce77d69ce2e1b755dca64d34d767180174833c

    SHA512

    32178db7c0e71895700d8b8543b0267fd0370b0ae35a8609e3e2905374ba01a14481124ad202d32d906a64431e706dc2c5a7973861288d682d778875f5388a91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5da5c8b44ad68a9357befb38d72d3bfb

    SHA1

    a0634c38607e32efd8a8eabbcacde1cafe7efaa5

    SHA256

    6f951d153b077b3bfb4ab42d9223821ddc5cfecbfff5bc8da219946fa8a057df

    SHA512

    673fd49e32cc87176da130bfde548af19e3d265561153130e2d9877616856cb4779e7d81d3f5fc171cdb16433492f748766175cf07a3c144329a607fe1e5a849

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecd4cd448e13df8b9a3dc5b776963a75

    SHA1

    2e13d21e5a6f893917e7ebd82998df796c9e3452

    SHA256

    86609c112e5095e5bfea18d64cb9cf2e6c2035b2f00db6e137d3230313538428

    SHA512

    9d18a11ace06e34f38290bb8fbaba9571292554da31890cbb272a6e60e73c300d486ddd9b83933911d0237747bf208365228a5ed70bb01a166da6aecb7b32e4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54102de1721108508b1eea1897970b54

    SHA1

    e39ac778599fcbc5de47c964bdf7d4bd64a9fce4

    SHA256

    db86a9dd07e0dfb1031b47c0cf37eb9a3fd72ef534738dd062498d841efdbe7c

    SHA512

    ebcb6e41ee1fbb00d5cad350e043428b40f06270b66de8ff136b785f742e5c7a0974fc23c507444f5922134e72e7a3ee1102d509eea5ee2e1efd0bafa3cf34a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43ace95b50c1a41d5f8f37a4f506d5ad

    SHA1

    d2ea71ee5dc08e82b6bbdde7562d7e4c2741ecf4

    SHA256

    3364a29f43e8ac3d4f5128f7d5804d5b8c2ced596b41fa488df97f46aa78364e

    SHA512

    53864c1470633e4858e156710669714d94e4ba83e841997b5927e97d75d47a875e0bbf7c592405546678f140e3acd3701bb8fd56d3d7b779994adca89b4e6190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bda3b5eda94fbd1a7ab5251424319d2a

    SHA1

    ca53c4a33eab539aae8d422aafa48bfe33473775

    SHA256

    59560b7089f938f653125a3849a289cd4f94b03ee4822a0a180b1e73585baa6f

    SHA512

    c530ebd7b61b56fc6038dc7d95918f00997a80c76848796389782178659f79ff59ba39f26df7cbe5bd7856cdc6efb72f0dbf6d4641837ce4aeb93fd0fd556e46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6114e01ec2329134bfc3771d64c867d7

    SHA1

    dd9ee3c4aaf300e32806fc607afc7977a3f84f91

    SHA256

    417d9f5f8a27d893b3f5a69343c2133396fc3502ca69f1b0e552e164c7a1a7b5

    SHA512

    b396aa29df7a5f8ba50adb9ae939a39cd58aed64201041059ea15457cc3c5b2783db529c76a45c860c8fb362f0191d39cd0f93046e79bace0332ba4329ba7d11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    157e6682f5d4c88fbd8cc2980642e1e5

    SHA1

    bea73532c16d0b3608cea9894492570916901f87

    SHA256

    460964cce22da4c0d36c1bc60d322367e1341328690e9232ac5c6f4ea8a4e828

    SHA512

    c5cf378772d2590c5b7aae01095d00b63021eb1a417a7f9669be15bbb70c04ea7b035a31e39a4bb1e36f5456c5e18ee2e746a68cfaf170f9862b142e678ba9db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f144fd45ea123f208feaf9cae84a60ac

    SHA1

    da1b058523536b3e22f1685452d43867baaa12f4

    SHA256

    7b3ff15362c880f3bd8d50679ae829e86f65dbfd98dfa84dcd9edf76b09cddda

    SHA512

    18324f282f7311286268f3392ce09df128ce68288714d40a3d23a06d94e9ac5fb73445f60ec72c0852bf63c0164778dc5f5f445239c184a894e559a1a42a1f46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5723cf065a4b698a8aa71147cd9821ce

    SHA1

    9485fc0e99edc4dbee7d99edbd7ddead95771328

    SHA256

    b1c3576dd524e19d0a4793b2912bc6e79bc71f5050949c0fd095da50609fc96f

    SHA512

    d148a4c2e9720227c889b8ba92a69aa207e7b06c606548ec51ed842e8289d1832ebd07bacb2b9a15d22f96f5d9be847388608a0925413868657f81a44c86b666

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    001349a6f0fcbc2cd9888d18910525c9

    SHA1

    a59079e5775748026432610dd5a3a0b3c17cfc76

    SHA256

    eb8a90606f7512ab904c1a8432b829ffc3014129c95ffce9ebdd22ebc34c5650

    SHA512

    0fcf74409644c2a0b0e296f1935b9c70f981efb18a585377ca3d77bd6f7e594d79437b2a84fc003a6c8443c28e08cb55b43a04b83d5ce7e2015e207d069076c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4624c9787d407850ecafc07afd57483

    SHA1

    ad2119dcd0a2e3378c7990366515abfaf0dc9e41

    SHA256

    57ae14207721099d0d7c41c462e093967588b09e42d9738f5085a2f94f607b8d

    SHA512

    04886501c2d6e303c7f28413f5eb48d4fec88a296740ce62739cbb003b624888517ddad291d34b13466a3379bcaba66df575c156282102a78535ae8682e47286

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21acbf3584dff24d5cb0e90eb366dc05

    SHA1

    834f93304f57ed86889312304d3e5c438869ba8f

    SHA256

    e153070db0dd9bc94fef6cb04bd73528c91235351e43b73f7fc7c1950cd33499

    SHA512

    4112654ee4aa1894bc5e95ada8f0763ebcb2f42f46bb49392daac7c48ffce51cc8b8e916b90c492c2b06b5c0f75c4a9553c3d39ede985a2a8f3baaee8144f85d

  • C:\Users\Admin\AppData\Local\Temp\CabE986.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEA46.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b