Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 16:59

General

  • Target

    FastColoredTextBox.xml

  • Size

    132KB

  • MD5

    70d49dec6a333f1d94fb1e77c663525c

  • SHA1

    184b544e672f4c4cb9ed9cf010da568eed16623d

  • SHA256

    f3f2e537065317b6ce66dac64042e925bbcea65f00561f9860b7172c9ca07027

  • SHA512

    b78a3c4418a7c5014eb16e72f2113f00353e9e566942f7160067c826c47f1ec2752ae7ede796fc159fb9bae499d347f822401fbc4446e2556cbd680cd595c2e2

  • SSDEEP

    1536:45SVw7sekyF7o//t3zEzacGE5xa5lIV1/P5:45Sm7sekyxo//xzEz3GlM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FastColoredTextBox.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e1927dcc0e78e50ed8fb4fbcb6d5f437

          SHA1

          6c2bbe16a2b28966ae586944ddbc09aafcc914d5

          SHA256

          cfff8c7ead427ea17e6e79deae9af7beb1fa095f9095c5ba72f30888b874e681

          SHA512

          568fb36c0d41fe7588f96a1e70470ab959b50ac05f40347c9f46647fa14c8730c5ded678026ab1035574d931c890c0f143c73fffbabbca5d94d888827fa8dd95

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          28c60ccde6ef2610338b791af8956f80

          SHA1

          4c8a7a748b6f44fae604778a7f2185e54f328d7e

          SHA256

          f507cbc28a25dd78c0a96d50014da7d47a97965d54fdde1b47afa8b6a38ca0af

          SHA512

          b33c9c34bb431ff1136941a21814e49cd94c4553f19d69cce6a6d1b17dae56ed2f5a75d91f8a719f2b8bdbb2a6fc88d2fdbbb92c3ccff55923449d352252626f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aaf5a8958671fe5771779a9180b35239

          SHA1

          3b57218797c9e3c6809951564895ff843a9e34b5

          SHA256

          ec992b0280f5b16e8325c129ab8c3b04cf267eda1b2356576210b96c4f0b5448

          SHA512

          ebfd9d36d8c77d00798c63974240cfe3d271a86b05e9977ad399d61fed65f165d73097a2f667f6adce0105ec313db790d11eb6f7c47995bd70863ce3287606ac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aef62d2e87aa5ad48733ec61ff4a192e

          SHA1

          ec588093c276d9e4dc7d594d8663d6cf80e5e26c

          SHA256

          a05a79c398f2cb8d4b86bcd2f79e133a68bbb2b82383969a7b00439e76630ae4

          SHA512

          8f1c5c50b59d84a8bd3f35cceadbc312813921ace8d0504236f5b6b2575311710e48bccef31b0aba5fe59cb10f0982d11ff5e883d972cd248ecb3e99d23bb2df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7185a8781dd57ba00f33f1a703798ef9

          SHA1

          e941fc50260356416b07f62f020edec36969922b

          SHA256

          1e0abff9f202f9bcf020352be747494f9e36fc4822b104ba128069ad0b7c5ce5

          SHA512

          ee951ad8d89cbe01a5dc8e79832a7bcc0b7dc268b08fbea76cebfb147a770ddbab5d667157faef38a10e9fc7845a440b553fa4d3e8724cf37c9880cedd6fa785

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8daa663fbd9a4b5c31c41f4a178af30e

          SHA1

          16af0fdd083822bda9fccf8fe2f638b00b6609ce

          SHA256

          b2538577794d4ad1e87ddc6e91d2a586c3f1b2d80fb125c7264dfac39ca4378d

          SHA512

          811dd19567ef136d4d5c883eeb29de1caed8521c9b2126c1bed17ef6c5ffda6fee5837afdaeffaaaa30e131838ce20e34210525315295aa8ac7c6b814db0975c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f3926af4fd31ab1842e2a82f1b646e62

          SHA1

          b05ddce292d89e7d203434ed31d3ae58d753906c

          SHA256

          37c1735c4e6bbc5cbb44292dc0cee285cade78daf71852277dbc6c7dfa787ba5

          SHA512

          5759ce87c5581eedb5ca53c8c1fc8dca3a15a64976dbbf9cf4e912cb90d8ca9c253badafb4633efe5978ee0c34c07b890b214a7c49c309f1dba24cd19f7232f2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3705db32c6edeb0ee3ae2545f0fa1382

          SHA1

          3ddead602b6f4e95e22f8707e9c1f5808e3825af

          SHA256

          87a845783bf6e198de607531f66df22ddcdae66f1ad128d9b46adbf75cbc79db

          SHA512

          1cfc7288d2da05650b924e56c1b34af8b9cb7c55c16b7664751ca4bb340f11ae9fcdd71f63498cf214fccfcb14d51fbb0e6be5d0c9a5bbc4b6024825b9e01fb0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          412e41eea1e65b0e0c04396b728667f0

          SHA1

          9e6fc5e251c605170430b09e3fe677bd6bbc6a00

          SHA256

          383dbee724a7e828c55bc04d97e015bbba0c543cda4009cf882e13f842ca7ddf

          SHA512

          bc03ed2eefedb68b94c2945fafb65969293b98415679daa9347a8ece59f1f889eeffd0a00846bb0bb789d19c869f102ced9a84a8596219c33340e9684a9af3d9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          98775d1fe6d04c86d8cb0569b3d1e696

          SHA1

          cf7d517eaddbde9c62e10a254b0124ff0e8e199b

          SHA256

          aad5da917454922915ab939733fdf030e4ab50fe9b2fb4eb087e84027cda2a44

          SHA512

          17b2fae5e46eb323a02aefc85bf0371a292bcf459f739bf7619dce3b522e766efbbb4d88eb6ad4e808723b977e15250c4ab7ee59e7c3059155c68b252ba06061

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fe884670e1123ec39489dfa383be01c7

          SHA1

          b16784965939fbd0a9a7535524fba51ae7b3bf3d

          SHA256

          8c329ac3a1c0d33bb28cda1c30e4f0bdf0c6449db5eb807b53a2be3b0b95b3bc

          SHA512

          954c6145d8609b9b81f05b40628dfe7a72cfdfb5ad20ae43a06058ef6ff49103a4d1c707dda65cd337c30e69a7535b0c62aeff4438ea918bbb1f4052089a831b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5d0d2c5e14500dc81b2a08e3c3d37926

          SHA1

          35537d1f2dd684adad961c668964ac373da3309c

          SHA256

          e2bf5e81b90113f1150adfd61c97578aa988fb6dc5115900ebb2ccc050fda5fb

          SHA512

          cd123989602d0b5da506210299536332c336f920368811947b9070bc76f68cab4c390eb4b3339b56658b87b77f39b2711fcee6cedc78e4b66394f43f3e52df96

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ee128ba5cd8df21e1d4a3ed8b384f358

          SHA1

          cf35a666ef87fdf83d694fcbe9836897bbc07c1d

          SHA256

          3b4603d7b88a54fe5521602afe0be219040a3a3ecc7eba387952a0d40331fb34

          SHA512

          df459b3cd1245fe419eb5210072834ba9da81afeb5208724c0cd83100ce7d3f77e9865a5217b82224d95a18edcb0683cf66ccb8b6a0bdd72f4618c49270c8144

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          240a55251d44a152905e516cafdb004e

          SHA1

          62bcbba03f4f703136412ca3c04026cf0e9e5c94

          SHA256

          fb1ba30e0cba3065bc77724891d999372159b3e4166b5d851b86c030d17db0ff

          SHA512

          f642cf2d484bc74eda42bc05782a0814114c42f00f365bd25470624ece97c79d1537eca31d43ce18a45cf3bb6c122ea1dafcc7af6911e842c4201f3d9cebe7db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b70ad6b2c9a83f536439b6e365d25454

          SHA1

          55e8214d5f6b8c8b28b006ae94d659d7b487a7bd

          SHA256

          78b2915449284dbcf818f6c9a500bcc7a4a35ef7c89a83a928fd45d67babdef6

          SHA512

          56c1709d0a27649d9e0893fa82e1c2458226ca554650831eac55fac05868357d1ee956a8af1534e6e578f6b39deadae77575ce657a46cacd4522166740cecf80

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7bbd203d8e67e796f12a51dbaacc2822

          SHA1

          12dd5b54ff446275a9185df2e841411956f6e5af

          SHA256

          ab8de7592b3e18c6bf9cebb291326acd2064c7ade159b26ef8d9d8b7387e7d00

          SHA512

          f804766f6b81ab4cc65768e39e2da8eb6fedc08493d4d793ad9086e7dd49eff163c4f6b0510840618defae5b5a9a5c3c45b5a9050d0c11148935214033b55112

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          02ae34d3368258ce69ce03944cb48ad3

          SHA1

          df541584305ca747116e24d3799e4fe19675d70c

          SHA256

          879cda628e031f0e7ad6388d60b4e88b71f0f5441a5af2c8433174fd4eeb13fa

          SHA512

          c85f65a98684f10edbde47eefb80f3e24ac310d1f0cdcf62f62aa76584eb0f79eda698538811369fcf1350ff731fa88664966fa3bb12972d6217626f09f7e02e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0de6cdeb17f04a7b51686cc23115b671

          SHA1

          b641c7caebde1dc65736cba06be629b10308bae5

          SHA256

          c501e687d619c987a52344650b502d08c241941d0066973180c295b773f77cb1

          SHA512

          4807f0fc582e5eadf7e8e4ff7912325a5132ecbc636d5840e405dd91579d997b133cb51cf8b5992c304c50a08437466ed576bc0f52155ef8c285778289849993

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ef0e01d7287bc3ee0c475fafa4aea7cf

          SHA1

          0d5eda2579270d849e24e3b54ed107dd091908e4

          SHA256

          d70279981be76468a775bea03dde4f17d0919b6588cf27d055f00258cbd4b02b

          SHA512

          dbdbf377707a6cba51b204039bac6ca7ab4f8590c6ed8fc2075141f08c1b438495e115c788152737f013131dd8de226c551a4e862dcbde597afa671c2d32aff7

        • C:\Users\Admin\AppData\Local\Temp\CabFAE3.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarFB94.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b