Analysis

  • max time kernel
    8s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 10:08

General

  • Target

    Everywhere.xml

  • Size

    248B

  • MD5

    0fa26b6c98419b5e7c00efffb5835612

  • SHA1

    d904d6683a548b03950d94da33cdfccbb55a9bc7

  • SHA256

    4094d158e3b0581ba433a46d0dce62f99d8c0fd1b50bb4d0517ddc0a4a1fde24

  • SHA512

    b80a6f2382f99ca75f3545375e30353ed4ccd93f1185f6a15dbe03d47056dad3feea652e09440774872f5cba5ef0db9c023c45e44a839827a4b40e60df9fd042

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Everywhere.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4785a6dc66272701466d502c4c992957

    SHA1

    87516e7c0ba15235d816cddf12007b02ff1d744d

    SHA256

    1be57d665eb8f9b11ca38174889fbafebd90dd491397c21358749d144a39d7c1

    SHA512

    a6658d58d37a1a844f13864a679b0682fa1ee97aa2b577eb1894b0419f9383e3ba362dfc8023cc4eba1439379b0dfb67134074fcf2e8b6168a2a4f5e95bba4b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77341c35685a75e6a982c636efc34c11

    SHA1

    a5fbfffdf85e6eadf9476791aa188485d470f387

    SHA256

    b3a1950fdcbcb833918d53ba4b3f4071aa593a745c8233bdbf06066294a9c8d2

    SHA512

    777bae9714a8a80945b066ee266fd4f47e4f82b7a0034160db635b95a2bb933ade43e79a18ac46bfdeb7f6096890c8461b38d95c28d2157e784eaf07c223813b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfcc674dd538be458936b2046964aceb

    SHA1

    0c243dbbf85afa85203d5ed6ab1cbac99ca5c6d8

    SHA256

    d06e843043de1bef170fecfdb3971304cb6d1219889629cbf8adb62c16900ef3

    SHA512

    ef9fbd0bf85127ce6e4d07e29cbbec8d2cb4bda158cc77f2f05ec592991311c2bf3a2652220a6d5c77de248cb8cce43ac4cf0b7b300c1740b911fe7ff90f261d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c75879dbac972e83bb4934f321114a63

    SHA1

    1b5cfbf40a49a1a223a4b2d31877ec82d51633f0

    SHA256

    b49aabfe3ac24584151459c9c96aef945f23915ffbfbe92bfd284a219cacb85b

    SHA512

    b2a9f87c45535ef94272cbc00a8664ae01cc11a9b4785891fd60c2b4f6665a2fb272510a585b260b822e6eaab9f2d80d0b0f6b917fb1e3c5e5753888aa22a634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98316041a7a5f5529a683381cac4256d

    SHA1

    125fd9a2127da416f8f3c42902478fb7d76042e9

    SHA256

    71e656cc400825c15f7048b251c88ca893a2019ef7e85317b1f1c60aa99d6be0

    SHA512

    8c6c9736eaffe35772051a610fc2f9657d6c9a9e2f7864742add50906bf2fa62df1dd7b668bb24e991b6c5b28ec8d88c61710977ec8b5bec106b90318dbc6290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60fc51925b8a002cfc48145d1f49cb85

    SHA1

    38675d6b5db15bed5c613c47e62cee0a000c5b11

    SHA256

    844c9bbff1bacd54442e59ddb99bdd9ca8189b3c548f2f466088ee30477a76c8

    SHA512

    1d44c7fd922482b50f7d85bb48bad6725b14bd79b1ce488e8579a5cb5e6f65daad8f865298bbb0715f2a1a28b6402f677447d5bcdd37d5ccaffe389cd4d002bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f73611952834155d285e7e0f1a70488

    SHA1

    3e7ed1bc002a2399aeede88b36389ac3c06a2644

    SHA256

    baedeb6165653d38d1cd024eb30fcbf0a615ba7739cd80c7821cea0fcc830d26

    SHA512

    5723bf1c94968a188bdae423ff8fdf416abe6773f7ff40424d7e54c8add92349e38bb7b8a0affe86fa7a4dde6d47287715e5a2eabcf6520990c93ba048864f1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99dad52a40b16979d82d3f33235085d9

    SHA1

    a6352cb1a77ef3a356d73a959898ea98198fd6cd

    SHA256

    d4f2fb75898a8fe1ac662672f270ce439c20619cd7d2dacf3efc07a913327fc1

    SHA512

    f6a07726fee4b17f9db4023620622e5d4e9d6a5ba51bfc6d90cb838ce99fd4f032f961f85fd46f5f858b78f2ce33c346f9967e42c921191446ed749230872d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79ad646e7097fe3a0922b289e55798a5

    SHA1

    26d34bfd4863bda06b8a88e3d77497798d9cb6e8

    SHA256

    ae0b9e6ec5502622262c06c194de000e38340d444408db08d0e4ba5fff44a4e0

    SHA512

    4fa4206b68433ada0dfb81a29134707d2561ad35740648d9f3218f8f19e52fae99842744bd8a3d2b76bbace610be51b2aaae4a2196f19af8fa3fd3ede5249e2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3613b6db81db3d303394ee3589e87097

    SHA1

    19e7859b8d779025b94001cdc1c17d6d5619f182

    SHA256

    8149b90044285d02bb48f9e03756a6ece7554cd92106d96eb8c3d2245415859b

    SHA512

    bf0d5955dbcb8c63a691fa70cc98ac2d35f1ab3e87e1460cc02146585c0c6d58ff7b26105668219780d7c20878492dbef5992758182abd84b8d3dd83120591b6

  • C:\Users\Admin\AppData\Local\Temp\CabFAE4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFB75.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b