Resubmissions

02-08-2024 18:55

240802-xkzn9a1bkg 3

Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 18:55

General

  • Target

    Release/System.Memory.xml

  • Size

    13KB

  • MD5

    add19745a43b2515280ce24671863114

  • SHA1

    cf44e6557fde93288ff2567a002a69279965caba

  • SHA256

    d5714c96607eb1a9d0f90f57ca194d8a9c3ede0656a1d1f461e78b209f054813

  • SHA512

    8d7e564fa61411b5c28f29b07855dd112687edcb39b991803c7c7de67b6894b309102ac9b52409b56b7bb5c9101eb4cdfb21fcfbf5d835e4a153e188cb97cc87

  • SSDEEP

    192:19SSrAVfjSE0wxiMiLiLiXdCjticiciAiJiziPNjNei5i9zhi+ipOUTJ:1gbXKKXppPmcPi6LmJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\System.Memory.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4f0c1f547598260303557238e9b0734

    SHA1

    32690820820a1e3c4538da25204c9c99bbb1e6a3

    SHA256

    bfc55c08e6f9e12380e1e5d83bc2b37a62f370c8736c7666eaa3d3bd9b44507a

    SHA512

    27df6e23cea664dad173500e3152d6b637861f2b9382d92df7f0be44378e7839dfe5a32b38b87a89ed514a55eee3081164d01b09caef2d7590baba719867f68d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79592dee9ab011b8f2ae443a82e83416

    SHA1

    9367aee81403c0db48cc256b5791120a7a7fd6db

    SHA256

    a4137f5d929f5baa58a0c995adbe2d8f998bee621e0b97d4e4f55c3b4f305c7a

    SHA512

    c95f657f6b189f3040d6d8c8d46aa71802ebbfe2e4e19610293a7907cccf43fb093216690657954bc6e9a49ce80e92ccf87f0727a2a934650b8bf2109fd3ebb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c96ad1e6786891b7a416329f960c81e

    SHA1

    96cf096c3a3a305d658be9d17690a212f0ab20f3

    SHA256

    da0155d15542c971fbf909dd05f39e900450426848804051b646907afb4f77ca

    SHA512

    5a9448c7b3e1ef4cf8eb880fc7ee21820f1370a3307104189132ae46c60da5ef9f51cb198fa1700178e68f983d0ec46857500c9805d8892da4e035aca59a3fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd46487ad60eb83ab88023fa4dac9014

    SHA1

    59ff4288eced966e5a48a522ca8369982687d3ec

    SHA256

    0419642ad9640127c3ef09485b3959e4bb2a2b06f262aacfb4ce74927e5aad0c

    SHA512

    28f631e34439baa3ab5805d3da42dc5c5d8c994fb540e56ca2439aca8e58b59c8bda32e1c90a4672db4708576565ac05b6fe3b050cd0ea631595652a355b5bd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1566186454481b0afcf4ef095ef5f2b9

    SHA1

    07298f5647c87022250cb00af03b9421f5cfbde7

    SHA256

    fb791a96e9f2bbafc9228a9826f1e3e39a0e72e68bdf201d96da9dc6a9cb6866

    SHA512

    c863e0d168bbd444a355ccb46f7f50a8205df73c7012d35d4cd6c5bcbcc8849839df753b82824e7846c57e357f5a899809a0e19b43a48c57271ab50afc5a45fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bab2625372e262e7bb42e3646f4e98c1

    SHA1

    4a15dedc97589103eba6d6003e0bb44c6ed9a438

    SHA256

    8a9584cdeff97d932f31d25c72c86f4e95544a89f263517779d6075058d103ee

    SHA512

    fa3762d8e8c22c6cc3d85435b5e6ec19034bebafa5f41a1aa9a143e04d78c311088e9fbb1b0b0a72f2c2c8a01e8ea30058067702c9de146b032f1ce58cdfacd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c21b4842c2ca2a07a983d13c054764c9

    SHA1

    c190d665d08e1ddf81d3f33c64b0b32c70f7bd17

    SHA256

    c0bc93e2d0689801ddd96fe4ed36e278a581b08a7cb951bd3221c2cf6613295c

    SHA512

    456a4f0e785a38f9fbb35ceda06db62a0bccb5eca3edcf3b819d597ff0667c47d702a9e5a9b0717e1c7dd013934f10ce5ddea4761fd46e742d993e07a9c733e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35c01b20b6f63c18b620253fd3ef7c3e

    SHA1

    8654bfc0e7f5495bd94caa711cc7edf33a5e67cf

    SHA256

    dfdf27fad70ba252b5448eb0440128895e6ef71441f02b1c577fee29b583a481

    SHA512

    fe58a0dbd42cb15f1836f5a1c5325488b05f78de0c2518e4b133ea95fcfad28e73ad7de5c207bcaaff34c68e45fcb58df4ac395cb6c96f1b467a6b818602f02a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29cee1b2840433cf83f6dce0ac5e3771

    SHA1

    1a9dd25b2e080e8dc03a6d3d4645bdcdbdeefc47

    SHA256

    721fdbaf5dc216601b0e21b1e8d0f11aa1974a3d469f79aa266b8ef35e858182

    SHA512

    b62bd7a5f809622a5fdc322019f67ceb141332bedff7bd9d01a7b41387c1e296a7be0f337eca198a87e3f4050a76a1f2177c13ab2cde686bc9cde8a895a6ee4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b90fbcae5afae15316216241cc9e7466

    SHA1

    5d7bf1987f20cca073ea49a3071131aa65502292

    SHA256

    69b808604f364421943deaed53834062d035d45a05a57881b3a79dc15d065b31

    SHA512

    c7f71d450d8e7ac126218285f2f35edec6015953dab07fb2bf6f1749b295e903797ae13fd7c12cf08c186c2d56462f10395514bd8c65de94a7031eca0fc5e03d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18dca3e7cc4f130eb798ec527e371225

    SHA1

    a3b5def3bc9f01fd7a0e1146c61b6c5eecfe5334

    SHA256

    38299dd825698caf2aee345ee787e4b0ecbf9fbf4e8355a1b3dead0170439647

    SHA512

    ff2ee23db39f9bae4591ff4301fd15c5a7e6b5b2f98dcb3c253f5f352df47f3272a9244ca2d7cf80986f271a7d9061e621fe635ed8047318445f2319e1891ee6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8999fc4b9d6cf842db6997c8e33f88c

    SHA1

    48c900e7c8bef5090831ce907fd7e4e3f056b50a

    SHA256

    fd473f9097dca03b88503ad936a4bb20ac2520ffd5f89bdb8ec7493404cbe72f

    SHA512

    bf054526746f9edb8af85f7adb238156267f52675e80ec936bfcf69b6f7b53775e805872aa283b955ee54ee3e04e6421bc1d3ecb07f103ed89651f10bc88d683

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3057bcf917aeb2084a2c879909dee4ff

    SHA1

    1b5e307916c966b0aab42513527927b10b804ff3

    SHA256

    68e6b000604802b59486acd9b65f3be942467fd285f0d7c31bf1f34773638884

    SHA512

    0fe12786b5eda63dfa88664219cec89b2e5a92007dc890ef55c282cd22c4d05509b58d983dd125c1514da1909af143024f7584606912fd59f8c3fef81dc6de06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0462eaf00f532db196f25d96c0ad056f

    SHA1

    6cbec639e24a2f158db0c9549e58c75e528a90be

    SHA256

    810d1ce2ae9f3dd2e478425bccf9322374b14780df8f36daf6392c290b5637d6

    SHA512

    714ad80a7ee3673ebbe6c5ebc19c795d7ef6ab1fd8289166249f351564311d82d8582e20c5bd9eee322026fba83c732ed3c75ebd297f065623d58469806e310f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebd09ae889c0f7e26d2a4009a6712d79

    SHA1

    7598dbb62351cbd629fbb1ca3fd3c9e8f28e3085

    SHA256

    412096569ab3b8a8309ac55cf4d074f3435075f018a3353e1d030860d9289904

    SHA512

    f6e9adfe9dc2bf1b608250c58b17cf573c6809f7a593687fe64e8566f241f2339f1be9feb91c415bd76c484a0675132ecb8694d6590394892d8f09051d5d509d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    937109602adf051c9b6aeab1fc34266d

    SHA1

    e3ac733948083ea3e478a168f496079f05d1c8b1

    SHA256

    71ed7c72211ec753afa6e046cbf0caba6d0f54349e109e4df92afd0412fc084d

    SHA512

    7598dbd1891d5197c5c42c3c42740ad3990b45549b6750bd31bd5cf7f0ca6e980574245da48beee0691a2cbf476f8c718f7cfb7e42fae0a58fe3b3e0b08cb5c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08292bdeb399e10de2d051a20e0527b6

    SHA1

    5813d6e587ab7c3abc8af0955c32008cbf3a97f0

    SHA256

    fd8fe3002b490791beb4dc4429030ecc4f85ac64e9be07ffbb349317ead46da9

    SHA512

    6084b9a71f06a23638bdac7b9a732478840177f1cde3eeef9c789d5262dd9393f3bfc5d1a7cc2cd22da430915dcf37c193a222ce37b296fa4f41cc20e8c914ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58849e20bd8c2066940e35ad4242f217

    SHA1

    44f0966eb32e5a7cbe672b18bf4ed7658392906b

    SHA256

    f5f1cdde2e49114e408154823362dc518b8eedad4a80bec1a257c402846a19f0

    SHA512

    d6ad56c00ba73359dbfc32de1914d44ae093606a6b8c7ecff50f7bbb43e71b77d59be8b355bfe2af8ac3d11a2e1972d4fde41bb1654f9746115203a65a15a6d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27e6aa7619f8a4ee9d9dce9be839ef8d

    SHA1

    5d6573000962157cb53851bc480c55e1fff20ffa

    SHA256

    6879df412fe48e33ec46c25c3582e5a9c793f8589127f1e465f17f29e2b3db7c

    SHA512

    8d50289be71ddf8d65cf0b2fc01458f9b45721bc71bdf7ce53dc0f9156f0c30539b19c20f532869ce5fc72ccc505f6a7df6d8c97c0fac188f1fbcf70a492ab54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cddb913d9d113fbb360322a5b7e35c46

    SHA1

    377d2c1a5c6c94508dc906f40ff2f4f35e9368a7

    SHA256

    a70bcdd7c05ecf2829a6a0016b32fbe0e82caa626d30f2c2118708deb2c93f29

    SHA512

    86fa19c5085023852889ee45a05ba4e524dc9b1766e5964c5ff68a5c39705db76812482bd85298450129ee3d5356e7e59f707acd37440634d586cfa14b3b2d51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94174e383aaa9a23b3e309ec460ad7bf

    SHA1

    f1d2ae30824d13e23e19632eb6c480adbf3cd03d

    SHA256

    c15eda9c910402f17633d0686c0f36e865946de336ce28e2da8189523f9fc9a1

    SHA512

    9a5a94061b504a3d4a2b94ed3045cbb83cfb44d82b7c5da063bc096b49678bcd3646389c16a61052ab43445134ade68daf05d42b52b1bcdb8bbdebab7912c799

  • C:\Users\Admin\AppData\Local\Temp\CabF6C0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF760.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b