Analysis

  • max time kernel
    134s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 20:29

General

  • Target

    Astral Spoofer/Newtonsoft.Json.xml

  • Size

    696KB

  • MD5

    d398ffe9fdac6a53a8d8bb26f29bbb3c

  • SHA1

    bffceebb85ca40809e8bcf5941571858e0e0cb31

  • SHA256

    79ee87d4ede8783461de05b93379d576f6e8575d4ab49359f15897a854b643c4

  • SHA512

    7db8aac5ff9b7a202a00d8acebce85df14a7af76b72480921c96b6e01707416596721afa1fa1a9a0563bf528df3436155abc15687b1fee282f30ddcc0ddb9db7

  • SSDEEP

    6144:XqqU+k/Rik5aG0rH3jGHdl0/IdHXpgVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QA:DU1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Astral Spoofer\Newtonsoft.Json.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc5037adcf5005e42c26ca98258ff2c9

    SHA1

    7f05748534926509e51d69bba2668b312077117a

    SHA256

    495548aa21691a81a86972b7dcdf073e4c6b8db315a00b5840ea1631ec0979c1

    SHA512

    2022abf456243e128950f8e2c8868ba03ffd82fbde6553463928b6b9e1b505139826b96f497131868a4080d283b0179eacee6625d84a113b2ad0be2a3c82d18c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8110b3725739248df1fdcd3409de3e41

    SHA1

    584d986cf1792cd9d22035d2cffa67913e7fb3d7

    SHA256

    7fa75e1fb99e1236f57a30099eea176f0527404a63eaac1e2ec364876342f01d

    SHA512

    82008cabc3f56ac3fbe79cb3dd7d3a9dd7a73efbeaf14357913cad46f09dbedee798cf413fc6f239997a9d3d854e95ea750c68a0a9521d30d016a314a135cc5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6af11946407151fd5ff491c8390b510

    SHA1

    7effd22535da6bdfb6a8ca9adfe8c07e58fecc46

    SHA256

    fbd5509c15725b97259081e7e6d5a24385f24067e85da9b38f81f457d301ee26

    SHA512

    ca4ab911e06e41999111e66e8bb1546ec53e38d941c8ab07287af4bbe3a19039e6be6a780e00b33257eaf6552dfb22c6d2c048266735d63385163c35bb099a0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d01072a86822f90b98c149d20b131f5

    SHA1

    2852971745cf180a0ab23b700b8ac8d13d61e4cb

    SHA256

    d059499f8d838365ec25373cdfc7d911a43483faf24d255799c75a82cb0da50b

    SHA512

    3ed2598166abba315da0e1ae7cb978c6df8238e93c0ae7451a7851e7681e99e041c7f72b63fb36a6c42225eea63293df1fb86833163b315547c42efe639cdbc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21022885edd14ca3e8ced5b2462eedd4

    SHA1

    56466acc30eab06284087e8e5d627030930ce825

    SHA256

    a46067a2b5364dc617d809b3432fd8d690d46da5f24179cab8e9438723566ff4

    SHA512

    c26c8485bdb2cdd564cea045cd95b294fbfbfba9e07497e28ba1b6b70f9ca826c2b09c5b2f03ddb0132289ea2bda697dc01043266fb07220d848dae7d7fd96a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30e6c0a79c7224be2ab3ca6d27362794

    SHA1

    feb6792a69445e0e9485bf613ff06d937a0d3939

    SHA256

    b88facde2b6a1bf5637b63660a16c06e4ba49c465d4004bdcb713cac1e7f3cac

    SHA512

    4d8a3e922bed3892b6e52d8d7ec2f04e3a1e9aa17014a0773fbe744dc9de2a9b9505f8e3561cee9190d6a4116304c8449adc8c415f77eab69aa8e9c6d4693779

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f99a9622d5bfb915d22ed2c959f3eff2

    SHA1

    46064f6535a6cfff9e8738090801d804c364030a

    SHA256

    6b2976201a5746af118555b1cd8296f2c52ac436ae591511f4461f8bd17de7e3

    SHA512

    5ad3280fd91e2cee7def897f7f94da8ac2184bbda77277cc64fb7934d2e84732ec49f914ab07e21a7714e01085974246595ba755b050ba54635ab6405e759269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72b561f24fd262d2c91a05577b0edbc2

    SHA1

    b46e55eb54fc45db35360d0b12841d7912acb22a

    SHA256

    f4bba72226aedc2c528f985009188ce5d2ae98109c36225ce148f4dea4d0ed4b

    SHA512

    3ae0c38ff707d03fb5015fa8dd547d9440a9ba86f4f9f7d6c460e15ba3e61f53c8d251421357486a3004d45d6297e8d0155db376a023ae2294d59ae4167ab22d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcbef8d537475c0c8ff05938756a44e2

    SHA1

    18ff62617fc0fbe868d346c2a1afedb1f83f895c

    SHA256

    7c2aa2de4befd72d88e936436cf1fee0ebe8a877d0405368634b330830a82b60

    SHA512

    61df710f313dc5aca13f1e884088530af188323aa69d0e0ff9cd0cc05cb89b8162ffa99592136b2e3bc22fefac2b4ecae6d9a2403455a10a072f2103943812bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7898c03afa240e6cc8c3c69731877b4

    SHA1

    2e9e9a3a9d1dc48c994cb0eb9540ca511623384a

    SHA256

    c05ba7fcb518e8270eb13d1474aef25e232f5903595c3ae7e53c69badd62c027

    SHA512

    c4b3a83f74bc7068a984183f8476ca845a8c2d2b6376f8d7ac89173b30b5f5ef77748b51935a97e8a3bde4c1f952ad2c4fe36efe37ee9330e26b9ab29bc816de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c88e9b14550b3caea92593e1f6d16df

    SHA1

    5e0514ba70f4d4ed0e757571cd0550a7f2154dc6

    SHA256

    500c7e685c8b96860e6e53cf54cbc61dd27337ca98381db9e59203433c361ad9

    SHA512

    96b2c8cb55bb3156b87c023ea4b535e798cdd23d8919a383c56f99a28589814d18b51d90bb778b25c3fb65c48815c909d9c2a8701f56ef7de6b29ba12f8c8bd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e84eb3dcb55601bcb83bb08e5b11c38e

    SHA1

    07abf002c5decd962adf3500b4301841a0ac9c5c

    SHA256

    9c0a9c1db880aec82aaebd2995d4a8cf25844060ff99e01bb6b0871b3567d43b

    SHA512

    e4785f38c4efcb7417513529c299eae7fd4727c3879e2af2241fb07a363514a2522f49a08e2e4e68d59c573954dde1fdd542c735efc6194043494f29638076f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c70ec6132be0aaf093e13f702c588ac0

    SHA1

    74998e0a4f33d030a13cd5ed4161ccd5c3c648ef

    SHA256

    96b670b54eebbe69e741d411459a2c5e683bb716aa50caa9569f7bb0d75594ee

    SHA512

    e32f26a36631e0245b09a32de43b3c2045efeb14fb20de6994c6713272de6e993c7ba8498aa4d90323e43aa0b90a2038593d8b6b2f7339e523c35f277a0255c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51ebb84e6db598026470306a5f222857

    SHA1

    54347be5216c47ad3bbe0fe6dcd567b818beaae2

    SHA256

    da76307db621e9265afdbb8b2e1d59ac225a51d8d944d85e01dd9896b1f64142

    SHA512

    6efc6b6012837911282b42820a78ec154d37eb0ceaf06ee100773f55bc64bfb2818af6a1bddeb0adaa4a3e9a4aacf4b07f0444b5d645578f29b9f9768823140d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f660855486198cbbd25909304e0232b

    SHA1

    b00650f6d61416510c0f86432b6088965e5d945f

    SHA256

    5971b564b8c6ee42b1226000a3c2c65d45abbd8b76bc9a042e6795f358c754df

    SHA512

    31b8ad1c91bbc4bee3421bf09c953e0908932130379dc65a50b9a5c795693a536e93b201160a4bc60f0de5c24fa98c75dac1e7393974ac329883736608d1a6dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85c7a686c7dd9a76c454b6d1c3dcb8b2

    SHA1

    66b8a1e2b76cd691f8d80d86e6ec3731ddf6ee7a

    SHA256

    346cc3ecf7af3bf64e4ca26ee24a4830e79b473ba4086e4575ad5a4ded7b5882

    SHA512

    fd3b9d64fb92bacfa87049176cf40542c8cf5ac7d38dce53688f1252ca1131e49d8da29f71a5571aa1df3cf7e740e16a322e45488e173b8638707d6ab4c8f328

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e971631236183fc0bd952d7289c9276

    SHA1

    586b3eb484fb281d11d941dd0494e8b4c26df599

    SHA256

    5e4ff3f71e9d9fac98a4123be219a6885b2518b2eb7c11f2b963c796ecadcdb5

    SHA512

    4103ba5236a713f095cc1e3e519840c84f4b0357eff4ff1e280824618d6c25eb4a151ff07339fe4c2aef4e0aa85a602c240992cd58b962bb9bad0e0149d396d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0263b626d30ab4d68dabf2748578bfba

    SHA1

    1a1b491cbd9a67b7aee9bf729aae03e1141f17ee

    SHA256

    d74f7d282ba6df84313acd2433f85ad89bc33ea0bf0e6696d5f163315b00bf39

    SHA512

    d71e740fb68422ff7640700fbdceac38c9b7a4731c95afc68ec708c2504ba90a21b0ac6b3e1c6d88c5608cffaac0a39add118a15a192db96171f5ea78bed2d72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36cfb88324e87a25091bdbc3591456cf

    SHA1

    3d89dcef5347f609c7f73b9829cf0c153f7f2601

    SHA256

    97f9aeaf2f603bdd0a3f70d9f605d3a691ba04322fcc126bb3e558120bffcbd2

    SHA512

    c59ce133306d2ec268a80d66e367536e5b8695cff0a35c98aa9b855fd9978a9a443b04ff17153c2a8e27bfc357c56be53a8deaf0ba9fdd4d90015104b4be3d02

  • C:\Users\Admin\AppData\Local\Temp\CabA6CD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA77C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b