Analysis

  • max time kernel
    839s
  • max time network
    841s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 00:53

General

  • Target

    libs_github/lib/luvianMellows/ceriumPunkestAstride/botonyEsquire.xml

  • Size

    13KB

  • MD5

    188674de6ab74192dc846f0871be1ade

  • SHA1

    71d6ecbb4a5864eac5abbfaeaf344743a02774e9

  • SHA256

    1d1ddba1251ebc53c582f10ab681fb206ab3d22cc747a980756e34da4631caa5

  • SHA512

    6ed94af480bd55c38f725cad6e64f37b5c68b46521bb577203d3d06e4f3ffb23b7a9d993618fcfb56762b82169a41d935ca09905a84177d726b3576e3e89e4e5

  • SSDEEP

    192:XiTYovs4OTsmJEWfK4R1TybXYxue69dsi9AVgB45FEU0U8cjRb5VN80KrZVNNmeW:XicoYPK8AoxupnsnVbMIRlVlKafgsICd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\libs_github\lib\luvianMellows\ceriumPunkestAstride\botonyEsquire.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4c164c8d424e20b364420af82fa24db

    SHA1

    5cd59955fe6163b082f725b4567df1f1f6976aed

    SHA256

    f63bd2faeab9541ea53f29530bfce4156ada91ad3dbba327d41279bb8fb9536e

    SHA512

    83f19d5ac23b2cb52264ee6d6abb75ca9a29ddb133ce4d58e8c2a0d3174cef1945f76d084b050a9d1f02caa10148424a6e25cda3bec1370030f66788f2e8cec8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c71ff035e8ef9989671371f5d7628838

    SHA1

    f81b2fff095e21090fc92b66078856822eab0c70

    SHA256

    8ead3fb7346ef98446c722abf7f3d420f299c773bda543642d6fa535ef62b0b6

    SHA512

    c4aacf43f8eed097a9d9922b308aa8d321cc2cc893a76b4cb53ffab146670c7110adf643ee2700b554d2661c472bfcf09bb9da49e6148b0b4e2988a10654ba10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    149ace7cf63c2643f25cb3445857e18d

    SHA1

    b451b89e898fa4d29f02e6025c7840185e52f1d7

    SHA256

    26d43d8bef13b7c01d486993f5aebf6626c3ef93a4ba7229f4a490ea8c4c6604

    SHA512

    3a05aef9fa901935b8759c235df581d999b401c52b8ca700acf5770481e8f763701e2c68df951c1cbb9e36d5cef106f474edf84e2d2eaa0d4167a6a4c6425440

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c9861793a66f42268640e2ff5b34b31

    SHA1

    678d7b0c0f38791e1aa102a05f52576ecc32669f

    SHA256

    5493ef343efaa6000f26b907bb4edefcc1150230af4435bcc5b89016cfbbbca2

    SHA512

    65166862cef91aa1114a40fa8a73e4aaf2f5391e701a3ec3f83ae5688cd1a758bac96069645280d775724e18881224edfc7c3900033d8b0a10fbb04d7bc24e3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1b6a8da2bb6078025b32fcfd0b8e594

    SHA1

    0bed1ec572e1c1c9e717900d4c0a147eef8e45ec

    SHA256

    3df3d54c5485e8045d22f111338dcee0021bbb8fae0251376cff2867be7ccb9b

    SHA512

    e133529eddf96d56b96538faaa8801d5de4f067f8340da3fff05c41ced49140ecf8f732644ae4379aa5094611e27ded419d9d9863c8f481b63f56db1bfcbb7a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4965a935be5a6ac47c557782f745f119

    SHA1

    2d719d52b45b3694e1e9bb7945571feb0c5077ef

    SHA256

    353c0dff8aed7fabb09cb38f6e88ac2903790e9d4d765f82c483acb76fcf9048

    SHA512

    400864c65eb6ad61a5130a6500b5488baac86f7cd94fdf0414378210719d929b65d8d09111a4981b4d4a0c895039c3db9bd65adfeefb30076cfe293bd95ba226

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42b23199fe8aaf60cbb7d665fce38cff

    SHA1

    d46e0673bad43e217a9e1b1ee22f10a542200954

    SHA256

    3f056aeb8365750fcf61e6387cf2a012c8c680754f347481b2d2f290f4e1d840

    SHA512

    f4ff0783cc755bd9e80c2f60cfa8e733dbe64ea31764c0d81696b57977bf1c67b5b09a3424bf7cc38bf6380cbad53233f671bd0b3c023809727d5ae4f836041f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b595f93d0a7409d4696bc11837730103

    SHA1

    0f7c1fd851be62c3463b3bfff165a9675e79638a

    SHA256

    662cd2b7f6bc0c312893d17578386c1214aaad90cae36d2e50aa2bac9f528562

    SHA512

    65324c549e1c1f82406ba0a472c5f0c6016d4bf7a601a43ff7434a94613207262f10aa29aa422df6c891db8d10e9850fbcb829b14e4f29aa5f03d10ab414d922

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd7d190f860dea1a19161a25eb7bf7b3

    SHA1

    54e3172965fd2462b52336161b633ca4c9aa02e8

    SHA256

    bb6206399163d2d5093ced81c6a1422a265e4f19b9e4f719362a1603c3ca8ea4

    SHA512

    6b392c4bb4c7b6de0af03cc63dabf8eb51cdbc64f75dc90566bd3650ddeac40eeb09dea32ca1f9a8d5ef9f1b8b26f47f22eaab994b833093a0801da3cf9fb01d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3618ec963691a65088ff3a3df28da5fc

    SHA1

    1bdacdae0fd5aad22101f2fc504f8ec3d0ab10b8

    SHA256

    768fb8dedd088b69593777364d5004c12fd1bef34f7ec1d819468e078178993a

    SHA512

    50586863914864eac2c110c5f9244ff32ebbd0cbe8468d1ca53c1d26af362ac60cb8e76ca5f874071f75064618057bb4f13372be993ee49a9ae56071eedf1b89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c216e6ba0ab070bc509e12ad12f98d33

    SHA1

    39ad8a31180957e7cc9c716d38a1f8d2f2ffe21b

    SHA256

    48c4ca4d93b019820eeb7d4f5c1d3953f24452c9758178a16ffde0cacd06fc4c

    SHA512

    e936b706613caa3ce896c51fee24119c4044f93b7e57e0a9481cef669a44e1b271d9af7814d654fe2e9281203c759dacb1ae3e74592b158d133ad6d3071b3283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    941eec27c028b1661484d8fcba403262

    SHA1

    ff5afaa96f44811dcb33d1b3e4abcd209c88e1e1

    SHA256

    1bbec19e0c95fad90aa3790680548c76908893747d989a3b388b6c6e158c878f

    SHA512

    c7b6a0b2bd1aabb99a5b0d6d80d4f57e463c04774317952a4474b3d0f6df984ef4b9c1d8c033066f61b12a0997980f35cd042643e3323cb23a8778310479ba42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a333a2268b9f77df78e68e395430054e

    SHA1

    a89cfe25cfd65f4895ed3b93d88ae4c8feb27fb6

    SHA256

    0c5a903ead6491b3b2950fe2657864ee0f36dc7346f564d8c77144a5b7df1618

    SHA512

    ad9a4c7b7e578be7d3bdbcfe3cf99197388e6024957529e7afa2671e54fd035b7af6ce47acde1f4069044d94516af8db7807e6ec62657fd71e2267f69a254c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cf51a87966dcb95e4d2bb1666be919b

    SHA1

    3711b2a1f844d5a2820a664a2bb41ba2bd314625

    SHA256

    f07fbcb69c61b43f583510d201011a9ae4403089590e53d6aa981c3aad47de71

    SHA512

    179e3bd59bbb96eea693d269cdfb12448457261bdbd8f776797eb2742eafff9e3d79c739c61538ccd4f655f35a98cad1af47194170054ef2b5c021e16e5f21d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0555e0a84be5d427d272b68135dc39d

    SHA1

    85f4a3a11763f4eb06ac99a3f47bd8bc6871a496

    SHA256

    86c48ca4cbc8fea186766e675893e19ad2eceb9c14958f61af47b9c3b26a9c3d

    SHA512

    fb94d824fecf9351e39b4efbadd1753278a1fdecdc1905e2c4f0c98c244b4dceedfaf54e9bcf047cf33b74406dde8d8fa505c0eebe0f8b983f1c50740d8fc7ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fa4c8c1b3433aae67fdcb8bb522a912

    SHA1

    3ef5209a4bba1ff0daf7cc93c7d0cd67b30f3183

    SHA256

    0608bfda6ee040edf2ed09b0c757d5bde1c6f7ce5e15eb3dfb6b55e845deae61

    SHA512

    64218bf0c447f97ea984de137a6fc0b36cdb46a11bf72172b03273f938e24c96ca8b9021f3ead9b56ec390b5869a657f2d791e42907c8fb312f24552d88b61c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d73151bb7e828ff2fc04ef6ebbe5e73c

    SHA1

    a32f2a1c882bbf12b402b4ffb3f9c9d94be9a165

    SHA256

    b59ef388a8fe22d24208f957db3b15f27355f4a7cc064c9f4260f75bd49aa209

    SHA512

    6617db82765be253ef17ddf7692c322388c1d88fbec1917904fe9131ff51c9a2151f11eb35037d6faec5dec5575b98fdf39f7ade099eb39b9a3fac2524b1cb8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07f91644f979ccc4e48c8dfd8b91ff4d

    SHA1

    3e8c992569a529f122b476d26a23da1c389292aa

    SHA256

    d5ea846f8f900b7da3e9041a98b3f3aa5f7067399f46d8f2bdc91c909d019c19

    SHA512

    cc8b6f7f4db24b4ece0426f1cc541c786536c8d1bdb2a70ffefa09bfb06e85bbfe19bf1920c774a34239ab530398fc6ce18f396c21b92c6229617ec5a7a2476d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc224895742d221ad23b79c548d27512

    SHA1

    2060894675e6ecff036a91fb53ac20bd3aef0289

    SHA256

    5cee2181184628058c60ab9765e813746e673020f05413248d65a233e5ac67b3

    SHA512

    5adab29a995821fe919b61d595f5d0be86956431ce789ab00d146b21039addd1a33bd8d3c594db9c9abe477fcb1ff6b69c8a64da9098521b6fbd577a64acda08

  • C:\Users\Admin\AppData\Local\Temp\Cab9206.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9266.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b