Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 03:47

General

  • Target

    My.Summer.Car.v2023.12.10/My.Summer.Car.v2023.12.10/mysummercar_Data/Mono/etc/mono/2.0/web.xml

  • Size

    11KB

  • MD5

    2b6303c4f12762b71051db6e947f90a4

  • SHA1

    a4d7e05516f63d6ab67327b299d4fb2852cb840b

  • SHA256

    3c1a76a5849074b437d297656a208a3bef6d84b982153542b9c797046c601dfc

  • SHA512

    80f5da60654e1851ef21526e434b32d94e18883a08bacbbaa0e1f85b80469c46510b6ddb9b429f16cc4be89c6f2bb2627bbae9cb1d0c7e45b665efb7721c6d86

  • SSDEEP

    192:wcedeaZ0sEMYaWN5bs6yyzEVkEYEG/Z1f5v6CuCCrtQzPwkP/waeKjy:wj5YaWPs6/1zwya

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\My.Summer.Car.v2023.12.10\My.Summer.Car.v2023.12.10\mysummercar_Data\Mono\etc\mono\2.0\web.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6acc51ac1fcfd7496aefbf565995070

    SHA1

    b8e859fe0fe8c6ccf25e8804c8eec0cc75302bb4

    SHA256

    3adcaa98bbe8328c9aa65b32f49726d18d46d04843edc0c15384261de636d2f4

    SHA512

    74f9a04505f5af1e7020ea13857a055279017bc5fbf395784b119993330c74e0b32045d5192bb6a0cd04bd57d3d2bc67b5ca3a440e7f96bee39a65324125c9f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    511993c4a7906dc40d82300eb01a810b

    SHA1

    3595ace4977b621d6663aa3a84ef8589157d45f5

    SHA256

    2c38fb72ed88cd6f74a2f4ea57252750dfbb059b2af55f76c865cc7deac02ea5

    SHA512

    c639676facfd093006c8c9665248a89ccbb2d66122a735f66bd1742d308788f58a1f9e54d7a1a1a23b5e254382c0f7b31f9ce9afd22da5b461b783e04181fc52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ba1737ab6a51eca84e58aa1fd4b0aac

    SHA1

    8c8680aa5cca3609d6a033781786ed3ec8bdff4b

    SHA256

    f1a3c24fee5f9668cc4f42e0b27eb34b8221f184976cdf3401b68384bca1fe3e

    SHA512

    8583cc8b43f85c06627d87b34d2a8bfcc9c6b4126cddd9e17fdb9d9300ebc6c945545594086f1d2683257189d86027ea1e39acf0b26a02f69ebfd6a3617ccbda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db7e90f5f0af24df0a4adf803e43270f

    SHA1

    90297bc125c0a10ef1d82f5a2abad1ef60795cad

    SHA256

    8c043956d7da070be253d51115deca837dbcd89784b5720df5000d10c6e1f23d

    SHA512

    af43bf30bfb18c43e2bfae25b48d20edf71726c2e87094052f2ef25a5b18532d4e9bddf051c147f80d134f866bcf4403e74d9fb505bfc764ffce5a85ee72224a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ed48f57e034a928d9eeed2c7429bc8c

    SHA1

    69c24423df4b55be6d300227b579c586561c29ec

    SHA256

    def776fa56c14438607b4e4c6a16d7040cfcee03ef87ceb645210c6613a95d99

    SHA512

    387c159ff9d850be3cfd3558f1cfc01571f1b7ab86c6f3b4a26d22891f7226fb9bb0a64254ce8093c150504b615fa057288d5352368daa88e56ea6f53fb4a476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c8f7849e242764d51e365a716e4918c

    SHA1

    31c26ec4409e5c62b01dd78effbe41247bc63f9f

    SHA256

    3d81c08b3579f698632e44edcdb272298ea0e40f6da6c53503e007fa025f5f5a

    SHA512

    8df3974bb864cd9c0e2ce7a48b973b804842cfb5c8f3b5f64569c6575d86b61e306fcd629bc02c7d611ea2ff1176162d7109424adbad612b39dff97ca291153d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e486d79716819e6c6e967d2564f59be

    SHA1

    6c937a39dd766f21326ae96b59e7a5f690feed5c

    SHA256

    c5eb3d974469f8c558de15f327081817ee5ce5cbccc207d75a92735597538118

    SHA512

    36086426bc3dac7f40855b7ea86dacc91772608feaeb0787b16b313200392d741af84f6ffcb71fca952f5b85c20bf693a049d8d6a7548814324b22e8dfd5ace3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61fd3e89cb692098f3e464f0b9d04dc7

    SHA1

    834300ce8b03f6a63583be82adb3efa1c3edd019

    SHA256

    aaba23246f473e898933e5640280a6920f148ba45a325c06ac2651faa3445a26

    SHA512

    3372ae1353f84569e4b626631bd14bd6f2a4d3c0bc4d2642f8963f530392cc13b40693b6d576078e399a0b5f10ff29b84f7b5464b7dc3062a9227350f13812b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a28a29d539cadbd07ca36967b4345db3

    SHA1

    e9c88bcf21ad0a80c4cea686e94f241d78d65aa7

    SHA256

    581db57b8d0e1dcd06285aac5091f96c9b2a447779a3f89f5c22ff2e1bdc7004

    SHA512

    b60b425351e5d3b4442984f00e0e044762f4fb4f64eeed37dc0973317b36afced479ad0da11fddf28d1e39eb1aba8f43b1e0f3ab5facc9180279387a7a5fa4b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22af6a2677bf76a6e668c99d03765ee8

    SHA1

    cc4b6d78a9f8299c47ba1f92588ced2c8e3a7000

    SHA256

    154bee7c855c3425d229518ea657fc103bc8bfb1552e161f9a199600fbe967b7

    SHA512

    18364a96423f90d7602a1ad7e105af7e69bf72e211bee978503699c98899e8f4368ba29a7820bde0150781417764440eb9454257fb9af0fca7ab0e812eccc95d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec86a5646cb70c7d418ffc10c7f46523

    SHA1

    0327f292871dc3e786d86657d3d66d70fd179df9

    SHA256

    712b365f5ff1bfb12c27b62d2101f79aca5f0dc26271ec42ab3f8cfb467cbdc6

    SHA512

    57fd5757a4574087545db2163424b10d6a11b3f4ed6202f7b8f26451d78c97f2a790e2e5fefc727636ef8f981e405e8fc95b8525546e6de4b25acedfc09154b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d00706985450380dfa985052e1c5f331

    SHA1

    f9f23ab75668bf6dfcd5cb8067bce0afee0d7a78

    SHA256

    abb0227a546aee59df2838c04c61b21bfd534fd6e545f8891f4c8e26ea78ce34

    SHA512

    ea37fa16fe95737fb14b86b350df7444f053e310fd1a082f77bb6788223ee72c874a00d89cf83ad23266e3cae92fd18838743f60b934d9a7c2f0f68a288ba69f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf4498ad2b90c8e2c16b7239ec64ffd9

    SHA1

    895fe2b34674a73ee9f2b5de0b36ff48d08fb6fe

    SHA256

    63ffdc1f8d10c67157a481ef9ddff7d8af48b8aba3f1e96d4f065a9876c16522

    SHA512

    16a8033d984ced2943eddfafb1d8d0171073d1f505dfd13f969ce8d8878840e2c2979f52ce55066f41bb0d76bfcd36c81a5e0d0570a6d8958eae1852fd4b6012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd8956c80a9cfae0a2f0eb96ffcc7022

    SHA1

    77163b62fda3c9e7b514e48ae015e36e0ea03665

    SHA256

    2c6a6cbe27643c468176bd5a1334fc05b8de7bc6029176717d5466c4552d493a

    SHA512

    0f8c5402b07257b9c92a59db547284fda433cd01739f65d3045ce52eb66b2e12cfcc41ab4c221f7b4d3d4eaa47f81202bfd1351d1d9a56c41aec22f76343d3a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5857ce927277d74e60d3e2a96940bbb1

    SHA1

    41340110634c04eb30bd24ba5802c847d74d6e67

    SHA256

    2fdef9c36ee195b648a03566a4ae590de9a8ef8fc2a7434ca28873a3fb34bccb

    SHA512

    5dfe162e8dba2222c73341220cf14e8470bf66b807c15b889f184c30f3710fe8ce982871cfd97224cfb0cf76ec5a1dec601bc2cb82141603f57249d57a4430db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20559c3f46686a3457ebe84d72e8d2a8

    SHA1

    fe3fb77fa894d3453c157669860a17c7725dd46d

    SHA256

    70d6594cc3030a147be427d7a1920a184f04774e569d53d79d581fdb58c08a02

    SHA512

    701b9857f97c2918f443bb6b53e78595af55e3c52c90a1a728bdc82b683499cd6ea17f7431ed6e0b5938b9496061ec0bf3d24e8100ce3f6c4180313a4aa26675

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a22a2aecad5d777106eec0f651282c5

    SHA1

    b71288fba58d454eb5d0f08493d455215d71e839

    SHA256

    9cb0fb0b9a8c1376df6038468b4d04d974b904a0a5d7047d265737d713d205dd

    SHA512

    a983542b4bf836e235fb4b533347dab72e4d916f427a7b1e2170cd2deb4ceee3f740749d21b80abf58c5bd3614e0d3f8a3c3df4a16134cec12378ce78b447497

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59592a298a3365cae0bc9151988a34d4

    SHA1

    326c7d3db69e577925ced42b18953c3eed88ba7d

    SHA256

    bf087167226d485929ea9b47535914e325464ad8db8cdbecca92e910a7c6c614

    SHA512

    1529831b0b95b86db5d6cc2443b3b5fcc614d79e9e5960777704725a6e59d6e551647c429fa3b12e1ca1d4fdd6737da9e0cdeae0dd59295a9e4baf30a9fae70b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcee74020a660a26ee10c54b55def709

    SHA1

    00106189c8d586fa1f1b83c7c3fe703c28b8b1b7

    SHA256

    355cfa17b9e0de177c116c3ac02ecf87267359b594c5d7edc5fb338cb4527c01

    SHA512

    c11466860002a47c4f003a55b9199b7954e7ce9eb24452da054e82c6c679d25ecc94d78b5686dd8637d4cda98f5aae14676ee6514bb22ecb4d6922c886ea597f

  • C:\Users\Admin\AppData\Local\Temp\CabFF95.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b