Analysis

  • max time kernel
    361s
  • max time network
    363s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 08:08

General

  • Target

    Anarchy Panel Leaked/Anarchy Panel.exe.xml

  • Size

    3KB

  • MD5

    3d441f780367944d267e359e4786facd

  • SHA1

    d3a4ba9ffc555bbc66207dfdaf3b2d569371f7b5

  • SHA256

    49648bbe8ec16d572b125fff1f0e7faa19e1e8c315fd2a1055d6206860a960c9

  • SHA512

    5f17ec093cdce3dbe2cb62fec264b3285aabe7352c1d65ec069ffbc8a17a9b684850fe38c1ffd8b0932199c820881d255c8d1e6000cbbe85587c98e88c9acb90

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Anarchy Panel Leaked\Anarchy Panel.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cda14503bc1089f863de8306076d7b61

    SHA1

    45a557978a8725606f588a78fbd4ae9454d171e2

    SHA256

    e345d8f9f419e0e757234808b8915e7f5861897169bbafb1b1bddbee7b3271c0

    SHA512

    417d1491c73f2703b8ca35b0cbebe9fb2a462bf0ff259d73dbab9906c080c67162e097372c45de8b2646c36424dfbefa0b562b647e7576d7544484dd231b5d6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4074ebadc9b58c42cfa0462e8d0b4334

    SHA1

    55d54ef9e13f28a749b8d228f25ce178fb948768

    SHA256

    9b10937fde8562bde69ef077afda9f62b96b8633572c8b510bed964b3d523f87

    SHA512

    c87fc33fa8d9e27667a3a1af315c6405df9a2adef507de476b7fd1abe61d63fcce9d3170030a37c8b5360882fde8fd5134c16009016375c7f5977665d39d5cbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b01201611c56740c40e5024f5b731901

    SHA1

    14587e2718895774f0a9dabab72eaccfefe9ee92

    SHA256

    38c141063d41c122662ca5c7979840ed2926b9ca50ade256eb5a4b070315f4c2

    SHA512

    aebb013bc26c3cc8eaa82c232d2485d5fd4c59b7325cb2aa99d710d178aeec82e052109f59f398cb606c4ff64db874e0803669f8690c1279a5f63a65964a049d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d47a5a9857e9f916161d882e651358d

    SHA1

    c4bdd1c2098306f96591eb58f93d356f13355294

    SHA256

    9afc75758a8da16d4edc20ff92a62f5f82c32d16cd98c5724beff1c6bd72a6d6

    SHA512

    15b1ecd474ad9b878d972e2d886f7445bc0e34d8f7e4976717003d7c2a4dcb651450d9d45fd1fa443a5da032127f98c207b0a16a16e3a5063248b09f14cd7b92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9360aff494b72ccaf5bbe0875eeaf229

    SHA1

    4721bb66cdc88a38e5bfce60c2ae028dfa7b0af5

    SHA256

    d6e9fce6bba2c034b2df3ce84c84ffd3937b126c4ecad6ab44284c320eb942f7

    SHA512

    0a8cb2b7e34d7b0b7c9b89b1cdd5a5fc0d2841fea2422504a1f22e38a6336224ea8e4c8997a206838d766ef97bfdb00ad938749bf9ef66ee54a887800fb8027b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c690ae7d4b63e4b8a99e93e4b6bff48e

    SHA1

    5f9925883f28f5929e831a8795d629daa3ec2df1

    SHA256

    94fc5f0e5a003dc11aca5bb7af87f25ac078eec9b224bafbfced4c5ab9e6fc1b

    SHA512

    86d19a40bd4a1eccbcc4ebfa1ae6f878fc0a4ce3c17679b666570259a738e267f5d10ebabd157e0d936a40b1189c86d7d6801a846cdd8b106d38b732e2d1bdad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae287e2c8929ae8082e32bfcf288480c

    SHA1

    3f00c624cf22d9b2eb99c0eca9410389f6e743b9

    SHA256

    86f11b3d9e8457d8d65b9475b458761f99f424358b6b5793b10c78e71ff5f4a4

    SHA512

    36d509ce92d4b572e82b3c8429e204ea4c6a29217db2642533ea1419b37ec07d688043cb348e156f25bd4a5b293a182c898d89781d3e7857d84f0643794aa959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c24fe21e748305c69d45e66ab20954b

    SHA1

    a0b3005894955b1a79049066d4532130bf6381e9

    SHA256

    1ae556a2463d396ccb5c7d8096a1b306c3d6367ee083483a362d4010b31c1a2a

    SHA512

    affe454300a630cbf327476089ae949593d4aba96f076be3483f6fd9b67cf2a4598076aca74a6e871a6679a46d88ec4e11136e651c4dedc73a9c2bca5245114a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    913dc08fb5bffbb446ebb712ed86df79

    SHA1

    206ffeb8cff4d636963a79422e92b54b230ddbec

    SHA256

    a924aaa82d0e744ccd9a3c930da29c06a07386f0eaa44a3b240d6047b753f5d0

    SHA512

    4c4539261d2e2cd6f4ce932f2bdb5e1c1026e8c3fee72fd699821dbe5db06054f2c8df43055c954afef44d537f59b97a2ae023f25c3a0a9b1197fa88d1a69c1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3f3a474f1598c84b6bee3b0991b8d73

    SHA1

    a93c3a5cd09d75d9cff9b1b146e71e78ec4b0e0c

    SHA256

    66e0bee41ccf00df5b34bf2d278d6d69e95c5a1a539052af5c92e536b32aab28

    SHA512

    09e87c5ce06441312aa2d0e06bbdc9cc8c1fd7850d08156d58823ea257cbc26114a52fe2eafb75a55c46a3e30840a38c5f7c1ed1c01fa4629f3ed1818a4e1863

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d06a077212de1d5dfb61ed3c8c5cd0d3

    SHA1

    1ab54e8263263e2f62b47c105a3fb3db92a126d3

    SHA256

    639f119bc6d6a67c233dbe353a320cb975ebf232371cf8232a3294c77d11d8bf

    SHA512

    ae63ecb45bb60bb4ad1b1ca7f5e2fd550fe6cfdc16403c86bf77fee57390ce76f348e5dac5f1d0f95695815dddb54724698fbb9030b7ae898570ab05d858af6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a16e15b209c179d3497ad2fa9533e298

    SHA1

    c2cf48ad37966aa1f09f051246c80ece538b5efd

    SHA256

    9282f1aacc1eb18fab83880dec7ddd5ff6e06725ff866728f7f59b5edcb14d4f

    SHA512

    e4894a2bc30f5369cda6c135b4cddf51fb48f69d1e61b2a657de3e1015423f9e38c008ec6cd161d47aeb009c59db27e2f170e341bd1b6361c47396d67c663959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    017b3ad0efbf8b3ad3dd233e0620b7b4

    SHA1

    805813bb81c4a74da25abbeb713ea8db13dc9e1c

    SHA256

    22c3962b98d98e95b6af170e889bc0055671c17f94ce1597bcbc3d886b1a644e

    SHA512

    faae045555d5bf7fe2666f5f5f5d61a61f1cb2be4cfd341dfc9c53355d4628f177803299e375c63608ddb800f96406e6b6904fd5979928d8c215b8c345746ee1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0125081b72732f32705a6b5a558fe74

    SHA1

    b7d75b3fe862888fc92df9d7668c63c7fde7da6c

    SHA256

    493c3922ee9b222ff7dae0deb8047dbfbd3497963bc6d3899fd1dede1f43472f

    SHA512

    d210e0b8a297953197edd0f20499880f62e37fcb35ae1396b4bddadd846d354eab15e1e005ae630512356cea5c484b10a8a89a1a9b050a80bf32e58b613f0148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49e0f7f28a06fd743154d8e53b83df89

    SHA1

    e997ba7ddbc4417ba7515528996c46f380862eb0

    SHA256

    6d49e549ee6a27fc8480431443cfacce36e1396a483ee8d2408e24b313eaa1d8

    SHA512

    dfe53871616f435f876e26c2be2c288f30e2913fdb5c3e1fd8f87562079f2ee2c71e52213bee60dd7ed3d164f0b128a00e3d7256cef86f6a86f0da17d8395c30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e102c12304d8ae36c49db25964f02019

    SHA1

    ef6751163cd5dcbc45638c3d582bcd4c330c0c5d

    SHA256

    30ea0df817328234980351e694bbbd4002e87d79eb5d88724375ee2cba80c49c

    SHA512

    4737928985a27a1fa10da00e88d9ed06983efd53f73281fd98a7a07458926af764ff37c4e7ddb1942dfa9dc927c4097c38c14e1d53633f3413934c644606fc6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd040711916c1af27b2acdfbf45c1f92

    SHA1

    f706fad5b7f6e60f08c3a92a96dee548164607bb

    SHA256

    4d868f077637041422f079a20ec201f3995482626bf776ad9d36393185fe199c

    SHA512

    6a4b38b14be5f2203c0f17d0b40111512d186c30c8a182ce34a7e2a2c0ec4e95e3de4044d252ef204d2487d350ecf3436931a9494e3017e714a36d972a8664b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    420db8e7cf482022d521f5be404d3632

    SHA1

    889e236e78bd678818dd775f7f6d5eaa38f0c4e0

    SHA256

    305c9c92182733fd207f7fceb57732c9a5cf052ee893b4c74651319d7b012075

    SHA512

    8441cf66aea34f6ee9b92f9a856813032ac6e833b22181f467934634add3e9059108c407be09f234cd6d0fbaefc6320988bc118887a370f3fa17b807e6b7401a

  • C:\Users\Admin\AppData\Local\Temp\CabFA57.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFABA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b