Analysis

  • max time kernel
    194s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 22:37

General

  • Target

    7bebc172ffc7abb56fb196ad7b8aae029dc97d995e216571adf82bc66f4203db.xml

  • Size

    303B

  • MD5

    aaa75c5a789b9bbc046a7291c40429f6

  • SHA1

    12cc6cf6b8e091042efd3c30dce7e9f9e3c7b608

  • SHA256

    7bebc172ffc7abb56fb196ad7b8aae029dc97d995e216571adf82bc66f4203db

  • SHA512

    27ae47984eb5e346ac4e0372d2a55f122076f85722cc657b83ffd440a7ca397f8402d5875b590a6f0cf805f73a41f4843d297bcf440cbe34652c3e1890087baf

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\7bebc172ffc7abb56fb196ad7b8aae029dc97d995e216571adf82bc66f4203db.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2233834d7b6de9a8de1ba3b8b8368d2f

    SHA1

    6b1f15a67c00dc71d95d5eabf1a000de1a945b05

    SHA256

    5c4e1f8220255c64350070fbc04dc6f569bc63775732ec7209d4b0aa97c5f1ce

    SHA512

    4d78e4b36816fadd1a713cb135145486acf932f644f9e3b4c85d210d1fda727fe4118ff576f9a85cd3caeccf4e39562f485472b3f2c8a0f6378140bef934d3a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1720f3a0493f34492360e42f7808723f

    SHA1

    d3926ffe3f6f1e588a4d10e3b3267d8e9d4e42da

    SHA256

    10202298773d57434f3de190a779bd7c3c7fbf1f86947bed0b5382010fa63731

    SHA512

    5728f9175c0062504542025e2cc5f4ffb04b33ecc343733660a6b8c577b61fa7a71d0636d94ecf52e85d2045ef1346292e749e48e253226b5f9e1ce0035c3ed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4439d050326f47b7442cf00911e29af4

    SHA1

    c6d6182121dfbbcd3213f5a785f8afe18e8d0e93

    SHA256

    28d8364e2adb22b3a895967b58f9cdfaa37c5e959b82408974208a41f8c0d8bc

    SHA512

    e2032385a6974bc8a8e8a3398c6207fb16a128d397781cf1bce7fdc3207e92220b2994848074e706f2ca3b3d0805450248b5f92f0dcbb658b5d79ce480704e4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b670d7eb985613d334bef6c9452fbc4b

    SHA1

    76a5a4427e867a233ab11b9d3ab69da1ddaa2558

    SHA256

    5c7f51f4a0ef46fb4111b6d704bebe35926a8bcfb42ed10ee8a2143ad1829dad

    SHA512

    f83ac740023d9cb1a7d48c515f1b24cda45244b4f0a0a67ebbe31758c6ce1097dc742eae69d04de6c1ad7c9cfa849a56a553988ec06b154da91edb91b2e761e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9c6f4d75dbef75a02816c1f2ef07bdf

    SHA1

    0a8f905edb80228751809fd09ab3c7c7a62514be

    SHA256

    74eabb760e985fdb7a5036e2fe43faca28ec17c0b755c39a226177644f78ade4

    SHA512

    2346b703e67fa3b3d1ee45368b1831e443830e0fa69d6d01cd13bf641213d193ab482112081ce9d151313fe07fb3f86017dd5b016633ba0acfdf1e660554a371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69c7457b73f3aa9c9ffd0b0fc3c7bdcb

    SHA1

    b2df0d87fde1edc9a391b190e5b0404521f0729c

    SHA256

    78871a5e4c5c2e921acce0e0b1dd6dc24e4742fb3250449a0727ea1879a625cc

    SHA512

    f65805a0bd784b4b4c174475bd261d75a666b12fb0c7c710976d28a7779e9657f437581b6186a13cb2a548b8b6ea898fcb3f3f6762f883b6d029d393872d33b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9f26bea2f79625bda1515f568341ea9

    SHA1

    3e6bd7240bba39e410a3f185069befb2cf355152

    SHA256

    f07448b2798082c31706fd188f99ce5a026931f53b198401af07ebcfa0d1c909

    SHA512

    1145befd0e569feff47079fb6e87f064bf72a4c266f670d8c15df92fe84dcb98161583c229afc252f253dc9fb02cad683378339ec990c4edf38875939598b72d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2d34b13cd9d34f43fcf822a43930ae5

    SHA1

    a4a804975e6bb0b811720804ab250301782d5801

    SHA256

    85d158e2c2c6d5df08c2659751543b688ef706777b7595946c77f58ffefd9306

    SHA512

    aeccc5d72e9cf41b8c16b14959669e8739d76cbef52012f6d9590ea01ffa5388d8c912dfb2fd36949fb55ed4e07efcdd361e8641c2edf6df220b3bed0cc10873

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8952265cd0ee20113e47d3f768be4a72

    SHA1

    e5cb78acdb813ad241e18161dba048a2d1f599d6

    SHA256

    7109a21e5108d230808cec2de79036b4636024e141ba5961dc72ce89f9aef3b1

    SHA512

    9897a10b3080af266484036ac05e270f9bb0e6f048b0c9a6df90fbde4751bd2f30ae44544b3e596e236201dabfdcf14ece3f0c017f10824b4f2617a91bff125b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1b509bc80bdada08766958d5a4273af

    SHA1

    174f36445a869be2fca58ad8275f9fb452ba719f

    SHA256

    5f6b5a9f96fe100d8a7feb22021baa98a1f245aa3a6ee4860261189e08c1c65f

    SHA512

    ec23fc793fa717df71f2278d4eda3c90da819c49c0a1b42b14250128f46929c50e1fbea365daea0d24fd37a66c8247aba54ab23b67ecc5c3f6a589fd9f9d9f41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    855e996af47046f42c8e063048beac3e

    SHA1

    c03744120612c2aeea52431abbde0c73c7818ef5

    SHA256

    64f28083178a3ffd73627fedd1459f8fc6d0de94cdf1e4ab501fe9063f0773dd

    SHA512

    b65c97fdfe826179ee172fdee9cc813ef303152e0d01b51ea32943ee49a9265a56b5dac35ed4ebc6370587439addda0a45a8211573077deb6631c1e3ba322104

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9d02ef1bca622b1251a9899d3e4900c

    SHA1

    4682dfd516568b661c59efc7b864ca0f66e978da

    SHA256

    76352ff00622fc13d38a77b22ddef9a17cfb33954a9471e618f2b1e3937cceed

    SHA512

    179c141413d754d25014adad685c970ddd539cbee6b781eeccb9eacbbacd819f7691c68b34ae52ebc6a9343c804d9ccc00b30ae6663bfc96e399282b2ecd85d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f38c091701294f86a9017b664d18a3b4

    SHA1

    e050d648ae156e61f4857929fa96a303fd7c5dde

    SHA256

    56aaa44b8fa8db4150b1ec61d2753b42754ee2498b210752a85ce2cffb89b042

    SHA512

    ce8a536c24db49faa83c73378e423965ff968124951c381c4336ac1565d4f472c52ed67dc0f5bcbd183d3fb1c7a7b54d340883864d3991e6cdeadc497a495736

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    887209aef44882e9a3251c4a94e1b799

    SHA1

    006db9f0da44a69370b1fc5cf832ee9ba6ad3088

    SHA256

    5a51d8b60efae6dcb041e7077bb287371b7b57db46f912b254144b605f2af04d

    SHA512

    c208cd74277aa5a97fec8563314dc80da84978c823625bf78ca21e0d23c050af05dea8c8dece72232292af2d15e4e9079ef7601f31f85e49b2680c485c566016

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c6d4ab6842b3eba5d2b6ef113c37f53

    SHA1

    95a7973d27c09947026a4d17724e1eaa64cf928e

    SHA256

    ce3740c11ab4893ce3f62122a1eef84da050e4126b305a92c21a3551688f9376

    SHA512

    842fca3a9567725dd8de788c0e115c0f0e37c1372d22e5fb6cd7690c4797fc184c33f64971ef53d9395a8ff343d04bf038819d3f4a756d3e06aaab384a8ff1f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da81c4fddc0ed4de1b788c1818213034

    SHA1

    ecbd268307dc1d592bacf8c97eaa58b166cbdc6c

    SHA256

    3f90f3bbf0a9d499792a2a954c1cc25b4c742ee0b496b773f665f0a725245976

    SHA512

    8358c9e35fc0565ac29dc0b92a07e655e6523c0c2a36f8ccb31f528062fcb0c4d494c579697f3888faa057e63ce699178d4f2cfb06c7eefacc3176c674111650

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55755028d739737113c12bae6f966355

    SHA1

    8f767f83c9493a1167867676c036f0d64c053d3b

    SHA256

    b092724c8a5f5ee40a5e8ceb41f45692bd24a760c5d699ffa649fe8a4b5427a9

    SHA512

    2fe26bba3d37de091209c52de2339f56c77098231e9326fe64fa2ccfeb1ab50b7e506bfa8156c975d3ccd4f216fb8c94a554a1e447f0f4fd159abde2bb636877

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ec774ad2f3025295570997e23ed347e

    SHA1

    ec4cc09be2b44b51d2301a995c3a591b22a6c098

    SHA256

    47b117a8302f283c8646cc3aeb21780b86d35ff819764d2dd4bfe59e81d5636f

    SHA512

    074156c120fa2e6df242906788fbc9cf09b8f8bb9b496975e71fb9a7c26e073e7a558e8d828d6224ff6bd1e0edc4f9fed44798c69da2c29186daa30c87b2c5a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa54145152a5199ae8d91e3281784fa5

    SHA1

    5dbb9b62688dd6c085bda176ea58d660f421e64d

    SHA256

    2aada565e9f1480eadb7b555b4de30a821c55a550a199914cb30094fb41b0c7b

    SHA512

    109f3cb75ddcc50ac0606e4bcfadfb0b5446967d457625b1c2935a8b0a083e1cff557312fae729afcf940ab6f5861a7d28e6226e25ac4b1779b270b4eee17527

  • C:\Users\Admin\AppData\Local\Temp\CabC12E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC1DF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b