Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 17:48

General

  • Target

    DiscordMulty/lib/DSharpPlus.xml

  • Size

    316KB

  • MD5

    60dd93d4d04688cc23627476434fd534

  • SHA1

    527409e37ad9a6e56055d1f247e39e19f4f4a602

  • SHA256

    26eb61caf4541917f7e11652e2dad52d9e23d4c658565f349157ee87a3f0da46

  • SHA512

    c2b8ca3afbd791b582ba952ffc2c3b9524b4f09f5192c28d4566adecb64d8c0a721afefb8ae9120243f7dd3bc9444e4ccbe7cef1bce1b1f2ca3575598fd92a30

  • SSDEEP

    3072:8A4+R+43jF4ivnMHpGzjZ0iNv5rbbSaGYGCnF3N5HjwbBeoCE0Jy3M2H9p14WBo8:8AIFeU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DiscordMulty\lib\DSharpPlus.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47163efac3157e1418b8cfd2c56a1df5

    SHA1

    9540a0a8f15349a94a3bb8f68b4f8697e9bcec54

    SHA256

    fcc52761363b2bff00182294a8e1c8e2f37325048a378d5a1aa19d823352184e

    SHA512

    1029488c81d4ee3bc3541b003bb15452ac5084ba04d9ca0fd918eb70493b02b019b50df6eb6a41e769d4a36adfe6fea9ada329981f64fdccbe557ebff593aabf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f12c5b0d5fa76ff777b06ac95092720

    SHA1

    a1ae799b9bc1333e0b4348e63925c2bd84b320a2

    SHA256

    1601b119d669d2bcf0fe74f6b2bbfc81dda7a099246ce15c636816b218a28cc2

    SHA512

    bd2acad39f075962692e0b9513b45691b366fac28b4393fa0b08894b89ab2d06dd7a1f945ce5c059cf88f23f3648b404682804c1ca008fd885c95603e71c28e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68caea6b197bf1c6f0c1e56c86a60d08

    SHA1

    eb3bf4723d7fe4c528192372fe9473bc98539522

    SHA256

    2899b94908cbd0ae30b314c55c1c5b46c13d0b9cf2e100dd7a3a552e458c8134

    SHA512

    be463782240522991588a91f2def13e88bda2a966853373095fcae01a0b4bbdf9b50c4912dda60d41571a86f39f05efec72c913991beee7f1e0517705a4e8d53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b53992ccf97e5c2fec8e31a8a47f17d

    SHA1

    5e88caec6856035ab1c76b6c7851d718c98852be

    SHA256

    262515d53bcb297c48502f205f4e2f2e6ca1a494bdd44ca923d7d429b012798c

    SHA512

    9e1ca3ab99751caba5d4147c5a4a04d7ee0248343b1db7db3eb924587100f738fa14fbfc8769579f751b306d36cc47b7c6759ebf82ead79a63b1f9f75dcf8f34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28e5b9d43ec51f859186259d0b1bbf5f

    SHA1

    a36722bb6f4eea67d6c4eee9fb5ac51d573e8f7f

    SHA256

    06d91662d43fc0e2f17856fb512d95c2d5e1fb7c84e32bb23ea2096645afc074

    SHA512

    0137e40979d69feaa055dd7c9712ec67fef8a59fd9730591768479e190eecdb1318cc09710f3548ac09b4fed312044836b164598e45da885309d9d20692c1a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aebbda379c30236d69fa28cc0c02ac21

    SHA1

    7661c0b391ac7a681b8482537d7a271d213ecf27

    SHA256

    95f736385a19cf4a83d828fb5921ac4b855e3dfaf9fa4ad813f3a72e8dea82d6

    SHA512

    d037ff6cc64b2f8ed331950402fb897592aaa19b13ad7ff48f3943c3b647c8eb008d24f51b698fffcc9092e46323c045e0ebe65a29473a8395c3f27e88448a9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d36e44208a20cb2b58c12d17c86f0127

    SHA1

    faee2c563557b20d10992dc6796fedad58479343

    SHA256

    648cba8cb04b1bec6a723614ca8abc26a596f1bc682cd40a40f8d299cbf8965f

    SHA512

    531baa62f85b2ad3c37679267947c1439137ac9f1764196784a1794b5eb8d8b1503a4c5853034449210a99523515ff7ec4d67782342be18a148d832c849b5793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ebe645f5eba28f6183d823e757e4b9f

    SHA1

    32a5832669098ecce3658f538c5f2428e0d019e9

    SHA256

    125db0e10ac8e711893906b92a6c89e9a2a00a1ec4a068f67c4e57a4144fb0df

    SHA512

    ab8aaaf5e284211c30526d30fa1b0bf1b95abe74fc562896acd8f5cdac019b44881056ccf9fecb42d0e3cdbad73a8375f8e5d5c481be764302f30335e1b9b55e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65205f3c767ae059fe79f0cbf502b32d

    SHA1

    e1c48eb7aed6daa87eed3277d80d37dca35586f1

    SHA256

    73f15b32ed1eca3bee67db3d3da54069b85ae52dbcb4f732802a49275f83405d

    SHA512

    ba592d918aa516d5070df0501a88ac4414734a5d7e1f83619fa3e86c86273873d31b1595e9841166691be765dc371ae8649cdd444b1664d1acc2a27e663a9580

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29eb28827c04ce23898822a2c43e302d

    SHA1

    d05d3582c56dab20025bb82e7aa1194afae379cb

    SHA256

    cb6af1a94022442863dd894a68165541557f1baa5de033943b950045fd1a7dda

    SHA512

    4f61914874c54707cbba39e87b907469751e4be0885128808e9a33c4ee7c30e8c90b8dc66b2e7a68158542a8747904b223b054d1af4733f45bb7355225574e40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b035e837225278005cfcb93f9e2760ed

    SHA1

    ebab323a57475d92b9c0e08bb2bfcdf08032bc3b

    SHA256

    0c2aeb01a5e7fc00beec6b03029e33d64e26f988428607de69ef62baa2cdc73a

    SHA512

    e06fdbff99bb6532000c5b6ddf34378bc85283405634089528d24c0e2c0d80064b53fa3ac308468dce6d6e1ca6db1cde51271ea833d45b3cc760866f2704c7ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ec9f0ee6118981cc54e408b2068b7c9

    SHA1

    44cca3a75d1d99dbec8a689023943db6f7ceeb3a

    SHA256

    c1c4a7e6dc9b5c4f51cb0915a84ef33a44768bb9024b02f4388eda95174c93ff

    SHA512

    d489bfe4fdde44865806d17387a1014cd3f82f1c60626637b2d262218b8c604e85452c113d05d95acf5cc168ce0c9465941c1b0ff5d85e03421e79ba3e80808f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a971a1c674b58cf3ccc6da2325662c02

    SHA1

    a16ca35b53cc99db2339f27f0e0e373e25e17947

    SHA256

    eb2a00cde535018c0acdfc8662fb4c2a7318c02586aefc6e923463e17e183b43

    SHA512

    3f2bd0d956747e0a5a3fd145bb2f0385f99070b4e4f892469f17633cfa09fbdaae7e5b74b1fa031c4158e2a97bb34ad64fbfa4fc9d34d8e230759814f0646daf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23337d5e74c414d01e65256d7ade2050

    SHA1

    18252837566356c9e922675ac305e88a9c5bbbe4

    SHA256

    10450449c607e2cdb9d20429db7ea54e017a6c8ff43b57877766a4f37aee0e36

    SHA512

    bb630cf3189556e19686e20b077f64d7c693b8dbd2c466e2c3aa59a48088e6aaf64a5e4cfbeacdf927cd459fa96eeb0ee5c23234dd2f121753af8781f9244c9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41813478c9ff6d3915136d9b5d140a79

    SHA1

    7d2b68d8b588ad1fcf1f5dd021b38decdfacf6ef

    SHA256

    d65ddd6338bf65e1efab57335cfbaafb7e85108d437967d073b578cfe40c1016

    SHA512

    b48cdd778f308f4fdad1a9b16d2e5d4755dcd4f91253630fddae9ec7fe2db32503fb0f8c46711bd3d3d3b31d6550f49c0b7383f52197a74774e1937312c66ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e7ab78410b64b3a917f39a137fc5d77

    SHA1

    1e6323b97c4dc961b35d3dc55f3de0668186b5ae

    SHA256

    b62e9aa434a705800aebcee56312561cb07900e2a24fc53d5f92b846d20d8e68

    SHA512

    1bc95daa8b24e3dd936c2daf907705b989d2fe3aa0e967aa61b0e4a1bfe31a56fa955cce6b6e0137dbc9ad6f050f38fb0ba089357a075a196ef7d5f70104465d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c9950667c676c0bda6ff4ae55551744

    SHA1

    f3d62689ac360791e59209a6ba63bbbae47c198a

    SHA256

    0d3e1462a14bbdbd7351a1b7f33cc56d7e2ce7773a751e1afd6d8909ac777b48

    SHA512

    b51f88b922519d472a9c9b422c9d55451b16776f671be16cca1180c1dca5af5e9b0b3429ef6350f5592ec3a92c9da04fa8323be3f3a17a9db81503b1d64dea28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7233c94edf112afa239415a338422608

    SHA1

    9b1881c21be7bf4d40c354dc2f0235b99cc81deb

    SHA256

    830a4f07d2ced36c5f898926fe9f20fc38df7a8f42a8f851c84360e39722a749

    SHA512

    126079136ba4fdd540817cb73877ac2ea6c5c0b2e3183c5f112795106018b1ddd49f8754facff32f07fd340f7a1d69967a4bea75a22559d7eba04d765a63c3cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d67af82c8120828d1d51245eb230964b

    SHA1

    49a5e506f605dce7996ba9f4b62f1da8e402c794

    SHA256

    b8d0cd8a9776a75a19d7b15f6c98af0f586484cfae14626faaa3821e3156e299

    SHA512

    6997ae7919ec5c17c89f9bdcfb1eff1602465483ec32fee7509fbb568b3be6d41fdaddb7b009f852550620aeb138fd74921976845ad4c24222be6193d08cdd0c

  • C:\Users\Admin\AppData\Local\Temp\Cab83F0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8462.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b