Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 08:41

General

  • Target

    Microsoft.Web.WebView2.Wpf.xml

  • Size

    100KB

  • MD5

    cd83c8495fe175f446d6eb420df1a683

  • SHA1

    0bbe47d57cb77eeb0f903c5fc8bf7bf65ceeac21

  • SHA256

    993d4e801fc9ab59bd53fd588c9c22da58b0430e031c36fa2b40fbb66857eec7

  • SHA512

    efd7556e8d4649c10b4eaef0631c3cc431da43402c1500417cb18a63e14450b8d2c08313d436fc03c7764082878c9b86662c21a8df0d05742c8b306a6a082824

  • SSDEEP

    3072:xOsSyTa4PgfmLC4uyD/D4yDC4dryDJtLryDnLfryDYO/LPm8RLP9R3Ly1vb9QUBN:xOsSyTa4PgfmLC4uyD/D4yDC4dryDJtq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Microsoft.Web.WebView2.Wpf.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ea29d78927157529f23d834fd7a177f

    SHA1

    014a059159c778b921e474726ca009a629b78d7e

    SHA256

    df3fb3335ea99cfa7495b35119233483cde7d36dadfe6c711585e1f6ebcd45f2

    SHA512

    035932bc8b65298774d1f60805dc21e802c7303e99ae8ec44c39d92b39e08699ca49139fe7ab667a03b6916a44635dca7c39a30679c01b9525704ac71c216501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de013593ddbd5da342ada79b91b90537

    SHA1

    06d626120d0fdc81562861983b4dfd46c29e4d9d

    SHA256

    6a714084d47db80ccbe26e88ae4679c6d6ca3cb424bac4717d1cb92d5a16c189

    SHA512

    4e0c308e34e22797b676b3ae002518b756e6e5dad00d8b6730054222727b48f0fc27f521920a58894d35f4859606a6afc7d8fdd415e394ea00588c4cbbd8225c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    341ee0558c58bca7bd69d5fd5c593213

    SHA1

    e5cdf46a6b135aa5624ab32380e7cd3677e8925f

    SHA256

    6fa7a22deeb239f1a63c9f45a6c90f3b1b60c2a2f7f5218eb84751d3e723005a

    SHA512

    661f3fed152e9ea7a1ef40c795e1dacdf3ad15d22177f18c524bed5f57b294733a918234e1675c9fce14f020002e867f129394120ccc77e34b96832a8312855a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e8563778330ae5a4370544eaa72446e

    SHA1

    f46a7aca760bd9fa3dd6a24d85574aa7fd5e6829

    SHA256

    7f0e791c2dc5f6ed65e460c670a6d1ab0f888730c0429ed6c1cf4d763b722ddf

    SHA512

    55f86171d9b78ad0157979e73dd8aafd67aa0fb773947a9a9caedb654976c36f583b0f396b462a6e3865f1a314d396358ac21e3196953bb13ec6bb0161ccb6f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de414c5528ee199b3f07eb52e609567e

    SHA1

    b6fbfe42fd7e573cecaf213cc13697625a6f4d88

    SHA256

    2150b64a1a9f7f93e662288bde339aa6b9219ae2eccd10e847b9de4e67478d16

    SHA512

    4824f23809503b84d82780434a92f6edcb232e11d4cd8cce1a3cefd2d46387714a027133a377fff41c9b4736e214027de1ea01e66abc135ba3a9f936948455c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce61edffd5bf088f8c8d707c24b42c6a

    SHA1

    f13697bc4b5f3db259889e913a55bfa37c586585

    SHA256

    258b5cf1843f9003e5c077ab27c97c29c72887163e989dcfa7a38c3606ab966d

    SHA512

    3902d9dbe1d89baaaa6793a6dbb411ba38760b6785f2282bf9fc4583034ca46817d0611a838d5a9082cb6794bfc01c530302d40f1d23e1fe7ba6c3f6405c01e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb75b5991d744b1b2ae036195cd8a2a8

    SHA1

    a50bf4cff7326029dc9186c77227e21594937ef9

    SHA256

    eb17a2ff79aef82ca97735a38bf301f14d48bf1fd2f2497e287a0471482551a6

    SHA512

    a5fc6d35890bfd9b8395e5aec2a53205b284d9d071a0fac366fb12556be20d91bbb1f8bcbc83affa2a08c92fc24bef7670167414af2dcd12e004c85538529b4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5ca53265384e0e03bd8117ab88df80b

    SHA1

    67b2fc02c5ec25446c2614fb98c53061150cbf20

    SHA256

    5a668b075ec9acbf38e0b5cdf6abe187415b7bb778ea2c51b1afe7bc6967d044

    SHA512

    3ea3869cd02d342c601ffc42a08ab4794d6649073d847673eeb3dc0f8e400925d87478bb3a1787b35169243232bb6b1967d52533355b79141e8d45fb4ef929b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f39338d1a69eec0be7853a7e7490ad50

    SHA1

    153753358bf2895776d1b6c13d133a29782161d8

    SHA256

    90cad34899d6c0e905e68a0b09abc4edeb36e58cdb79684315350017a1580c0f

    SHA512

    2e41cfc7d6d3a99e87f1fc41e22bad027bf591f8526a90ac55ccaf00d10cf4aaa959b749cbb0d6f2fd41ddf9b0d7f920c68f6652ef63c07c2a045908928ac576

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80c804d7929af9bcd4a6c64e35cfbf9e

    SHA1

    1a0ce96eb9932ec516d245efd0569242236cb492

    SHA256

    78b127202d5ed2452955c0c1de56fe8c4bd7b160150f85b20210f1b7925cc163

    SHA512

    6457642d1e3e26b5a954caa74bb237ab3decf8cecbd51b9df60cba84abd700b5248fe43dd362a68b232b348469b85860c2774dc08a340719de539bfd06a530cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1da5f5dd2161a37f3c4396d6e32d096

    SHA1

    461239ff233728d5e7ba59fca3592d70725b13e0

    SHA256

    c3647e5a8339c057e4825628e1d52000971addd728547d720db15c78147800e3

    SHA512

    6559e93d980980dcc3b2f2304e0be9c0c8426a04573407c47bd919cabb2857a3dc62d79f4508f1c128cc5144c47fc23c4616322641b684e339b06ee134b23883

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    435f0e80f56cf6887c657e2062d0a9dc

    SHA1

    c5ffc4a80a686abe6c50093814de1adb14bb93be

    SHA256

    c94a3efcecb9bb944a6c2a7ef4b334f32978d5d4fac2908825cd66297f98704f

    SHA512

    26fb18c4a448ddf991de6645552343b3b456dbbfb692aed31d3757ea2f84d9845879b5b69f1dbb306b7c3e9a87a095a837fa2e1bdd77f33e2a344cc1fca1b1f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35d42af7129ea7337c35cde13fbcf1b8

    SHA1

    4fb0bf479b06f37ecd3678cbe77d7675da61091a

    SHA256

    706dad2386ac7561b8c5f26705de608dd14991020d85b273cada1e8c3f67c4f3

    SHA512

    3af4c528688e0209353dd3dde6e719e12b63dc3b810727f97ef442831fbabc8f741992a8c8145163cb71228c7eec7f8d450bebd204a92509d29e17be8eea2d43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d24fd2043fb918090855772ba37c870

    SHA1

    433c27b295d80029011a8c00b5b9cb73566b6f74

    SHA256

    2fdb9cf9923aafd3fd990e79b0660cb2c8a436849999c35d3f8ccc16206d5f28

    SHA512

    d67a057416f205ef978cd357ffa0c30f13cb25475fc855874c166a7e1404c2c2a85319d31285c2ab9d1bf47fefa5ed22c73a79a5e3065b4469042aef945c99c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df96cb1fe0cd8305f159dc19a8a444b4

    SHA1

    ef87b1e4129da92c4bff9e5781c8d44fbb1ac32f

    SHA256

    24ee5aa85bf91038d9d647ef1b546d7ac644c2729ff4b82fd7ce373eee30dd0a

    SHA512

    763cbd9d3315d4197281a61c00055c67998bd21acb2e8abe37ca6539161ddf1047b27626c29a866473fccad4897479a8c087898ca79a1cc55a1e82295dd6b5ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    696aa5c3eb389a7ff0a6397e9700b766

    SHA1

    c6dbce3e3484df2ebc700481043083c4c65184e4

    SHA256

    b6afa5e23fa7b74bb1a726140cc9defc1741c5e68cb89f62bbd2888c0fe8ccd6

    SHA512

    4e6ccd1e47e2674d7b45203859a03d1028f898faf8a8421eb2f3ab2e6b5731e93caed5be6495a1b68feb241d5adc3e1afd5679ba6d59378d99ea4380be00aa21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c3b8e7a4efd47e830dfe2ed5504f15f

    SHA1

    1d10e3500b65c7b5efd4c89057dba386e82d822b

    SHA256

    039704e5a974b4d35ed5362138235c80d7c2992ef31abffcafcf49e8535ec78d

    SHA512

    ba9b6fb0a063e8575ee2ee1ebf574ff4db73701090daa45d83dd2e1fe5f655906af5be8c86ef1255d8798d94dc39ba1254900c9c8e49ea640afb4307d6205366

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac6a3145b7ecd14bccd5a781cad29b09

    SHA1

    60a00384ae2742f3c35aace6fcb405d8d59c6c99

    SHA256

    9262345306e6c678ea21ae98673d8728b9d02f056c7234d494cb888c7fefbf77

    SHA512

    c38f76ed51242602afaa59c044542b21b04df49371e3c596e0048e6a379c98b91e8bc990a4315092ee04ec634443cc02447e4a5561d2b14efc9dd42f34114994

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62866d1fe7855cc949c256af7d472fe0

    SHA1

    841a3dbab5f5482c1db327f24fec83c62c4e0215

    SHA256

    7c94108d02f96b02fe28956640cc124a04e47e4a5a5a9b8c0aeeb159691aec0f

    SHA512

    fee207747abb2facc89ffb50d54d87587f852c81447c7230040335c3ec46e275e3d5a2e9a777c084355978ff07705e49149dcc6412c40bf92c7b3a836cc4ce05

  • C:\Users\Admin\AppData\Local\Temp\CabEB1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF72.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b