Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 23:08

General

  • Target

    OverflowRust-master/OverflowRust/OverflowRust.xml

  • Size

    9KB

  • MD5

    0f7fdcf4071eff990d689f5b884bdef2

  • SHA1

    6bc100ae21ed29021a261915ca02363327c7a993

  • SHA256

    069539bd7798978250f7c7e01d51c4cf38d4493b669307cb9a3b9cead24321c5

  • SHA512

    c0fe32fbc009b8ea6256ae876fb53017ca9efb99a70c0f165521b21ea5119e18d3f45cf66c2f849635ae302fc4cb809698ee673259761c0c00cf8fcb20095b39

  • SSDEEP

    192:UmTrwIeBIWtUt/yPcg/hPcJ/1PcJ/0PcdA:UmTF/q5/VY/xo/wIA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\OverflowRust-master\OverflowRust\OverflowRust.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bb7e428277d2f5bea3e7f6619295ccd

    SHA1

    11abdf7d766809a6100a66c41556c1fceb6f910f

    SHA256

    30f9b5c8ca70aa0908c77c45bb079fa505896716a93ac86248ba84f000e7b77d

    SHA512

    f342dc87b39e4f249f873cc74164446393b9048f4688ab39d05e81c9dc8c27e3564c4f57b64a60e7dd0bec5da5be07caca57a197009f533b02aa33cf45d2181c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fe1df366ecc367d96e8ea8ce6e232bc

    SHA1

    026bc5ab54c4b509860ca2fe1a7641a41100f63c

    SHA256

    3bf809e0947df479189ffcbcb83ac6245dd08c7cc6349d615a724c48d9a3e424

    SHA512

    e56c4b7ef6b0f3cd8e1d50b11b958441ffc81f10c0b1f8732fc8b393b50ea85770c2feb7cb74660e626c2323d502ba0573c52cce1b823449bb7083ecad71177a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c9b568fbc6130ebd30c28da6ca06561

    SHA1

    1511971a8e41c434d4196f687198776ae94f606b

    SHA256

    b51cc6e2873d465f9dd8346c0d610f12062057adca28f2600ae81357078686af

    SHA512

    2bcfde331fbbd86edd03e9139678859dd82e6530ad97de7c6e6ab5dc6318ec72b3ff03850c26135284c5e8025c372b96a9c2e17d7a1c44c31308b7690e81d2c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba7f943d767cc7fd94223a32bfc12ccd

    SHA1

    8b3bc6ca6ebd42e7ca2bebfdb56eb90a1787674f

    SHA256

    7ca92997477fc33c5fe415042df279b41633223a649e1b242ddcaede685f5dd9

    SHA512

    5359106bf6e07837b59993d2a730882e5487ffff853f21a295d5bc5e8276d94de0c0aa391026f61dc4f84c9bd5824e510a772d3281e1ad02ec21cfe3db5b2c5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7d2f7fef10991909474c917645119b9

    SHA1

    dc0f4c25e781599962248e76d87faffe23639ce5

    SHA256

    909db4a9ea85fc7ac695c20ab23d34ce3f07138814e00b09fec229465ae81911

    SHA512

    c0ccad3a7e2865a6a99a2f5caa102f33a41afab520fb5889996ac6adada501df04bee6f589d6e9b5860007cbba39b42c9d159beca0096e5b1241595fb97b4769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d839c7696c481391f6ce02b9317a003

    SHA1

    70b8893c358e84e551ad88b14cfed098f2d522de

    SHA256

    48d852c69e1ed2ff983a7d8c5c95e7e989d18bedbe935af32c704a7e1ab515a0

    SHA512

    568c55c03f52002e15389ef92fb2b6900b81009e0fdf4b822dba8153ce5cb61a779f849de9033deb75164559b9b75463678d52eac2bc39e547903a193aad2a24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b61f78760d14f8533d4c26a09e3db586

    SHA1

    92a815ab5f1e7ab1a964e8119f02e319f9b61245

    SHA256

    27984d31c12b80ac4410f0973079da5e4dd2c5f8ab6228952fb26a647aa3abf5

    SHA512

    16fbafa1a9d06b3b4870853117842d125275b641fa68aa6cbf48af9eac8cd98c197c110094a2347e4b2cde2cdbec04648e8a114818e68a80d8b0d80a78a48579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74e2f895e7a56852c7b8014a4d07359e

    SHA1

    59ce61741ac4bb5da5cf05a39b05ea66fdc3283e

    SHA256

    23006b99b92d58a2f758ca087d6e1a82631253bbe944d991ea26e6ed7b4c8165

    SHA512

    9eda62a2f3c2eecda6f402f3700ad58678f3f7383316ea6c48c70fae43d65ed6fcbe1bfbb7ce8e7103f742eed5abce288d68846cbff4b0444c5c477862f5bf81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    055cdf7112361b9bfa821f14c684855c

    SHA1

    c49cd0cd2c5bb514cd183cabf894c877cf74e611

    SHA256

    a6d05560943ca3c7aee9c506d7761791902ba188a9d2600f434c3764f267427f

    SHA512

    6c41a3cd32b1844d0a55971ef0375601568f6c1421d0572fd6d8928fc438c40344a1c798e4ba1755666e664d3d573fb95aeb1c9727750aff0798b2514b2c4b20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36f1de7e0cbfe1837dabfa3a993c46b5

    SHA1

    f6013c4fc04baf596898161dccb9f9fe827fe161

    SHA256

    9d1a9fcc77a2015d2b0fabbc5963120aaa7219f89dd7242a1229418cde44b31b

    SHA512

    2c3d9a6a6b403680822540e548270e86b795b2f26657bb392e520686afee72184db00ae95981a0769e45ef257cdcd0b15fb9856d295b79462eeca4f1c3f674f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9c3de50051cf6a02cfb3f86eb5915ef

    SHA1

    289335bd38b7481ecc23ee0752d1eb7d67fc2571

    SHA256

    4e1e318c162ab662713f96777cb1bb9a99a576038811a06109421fa7a6fa89a3

    SHA512

    a3f9654963fa92372a97675174c8a42199d429c8fb9666d8edf3389bf5ffcc9e9021deecb18b00fb7ed4ad32af09c79bc69c0d5ee3254f8094c3d3b254238b00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c6491ce36e573b5709a4d466d5d4d5f

    SHA1

    f81c3fa24dfda4c44b5f3ae2b92949a8bc9ce7d6

    SHA256

    468d5aa3c46b9a7105d26a3e3aaa0c290bedcf57b10bfdd08d6afb83d1c78973

    SHA512

    d1c5388da64bf23420e031c2ddf053a1c8cea7b2f68bd8b116e393701e19654b618b098417f002353806ac3c48d4c3b0b1b741b7ac45e7704837f42276fd6832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96395fb21237c4f82e7dc0c58d18f553

    SHA1

    1f1bc5f15f9e8e6fa751e93e06c5bd9c3877d580

    SHA256

    1ec8f91a9ac15afea1363270d3e26f68dbd716faee280bd724586e6232deab5c

    SHA512

    3f13fd7c051371ef35243589f8690dd1840f989ba694cf0d4adb5de6b27b81ccb452d58e54be38f6e54f0eba788cf9e055592ff1380ff684225b078cadca7ba4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cbed8134ccc77ddd4d7511399191b8e

    SHA1

    3cdfcf49740c6e8f45b4db3b569a33fe167b9329

    SHA256

    06cc73e79bd0b6e2417d671cea3db84111881d7fdaf30baa9e5c11c1112c9593

    SHA512

    824809dd0713aba02f5908cc5f4d0ee4a59e7b1ca92eb432856004131f7f164aa57c1482432a21ff8375e811352e534838da2976a07df6b1add1f8a91283f5f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64e1f50eb0bada19ffe601f5bccd58ed

    SHA1

    b52a9241e589a3545338bd3ea9b0bbe57ad41522

    SHA256

    57cec9850695e7abd734239b7e20256e062d4cfedd1078ea2195a7724106acbb

    SHA512

    1e963ad2784f0aa3ec1bf380b4babe9334c46667a5d0fcbd4d79fb587287844e2c7a3892a84baeb2dacc2007db9922fe345e3bacd43865b6679395aff0b968e0

  • C:\Users\Admin\AppData\Local\Temp\Cab66E0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7343.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b