Analysis

  • max time kernel
    360s
  • max time network
    365s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 12:15

General

  • Target

    Portable_x32_x64/Data/Packaged/Utils.xml

  • Size

    1KB

  • MD5

    73e051427246dd4ca45935b1a4bd7e2d

  • SHA1

    7216f05041252f1c3a9d84aacdf84ef62f1a1045

  • SHA256

    b7b8b412ab1e4f32da8a7cd42aeaa6e7d8d340cf14977d3e87f7d8f5eb689b0f

  • SHA512

    3fc10dea91962244389214d189c141466f5630e99b01af5761738ce884df14050cd08a43802dc45bbe9117290c34143b85a75694b6301954b51972180dca1e36

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\Data\Packaged\Utils.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99b50b4822e5da2498f80b49ba71ab7d

    SHA1

    6c61fbd965ca2984c43fabd273d09167755d8bc8

    SHA256

    7e475956e36657352e3956ee7111ab2cf9839dd53e86f183a9e43361752355a0

    SHA512

    19e99a9e6102ac797635874d2891fb3815aa1f22698b6f68995262200ea4c371777b7d42bee9dead1270ad667f95246f275e616f42e2f5030cd274b36e2d8c51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57af71dcd9053903b34c6764ce41bfb6

    SHA1

    11415de7d333eba9778f15edbf4bc32096278ec7

    SHA256

    5fc8bebe9572c7446b5f541030eefef12fa7c5e46dab18d3d471206491937cc4

    SHA512

    4f3ee85670a1e6eefe9173c31e5172058a661288fb3fba50c106f20edcdbef815bc5e41371b5ee5943788ceb9e642676d26e7c166b48d59919cf352431469e82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65023cda32a558c28efea834ff9d8141

    SHA1

    fb17b32176a913c1efa4d942f0584d3cf3e2c6e6

    SHA256

    6d1202bc03958b5e550dfba7fb252108634a16de7d9ef26d63d9f20547112df0

    SHA512

    5833c4572fa623b412f47468a5b0f1010746f2ab8f60f03242e647d72f3f0c50f7b61b9362c4ba957fe3eea6618b87181af2c6c7ad3bbbbf3ff034995db97684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46947c112d039fda9736b83b2625286b

    SHA1

    87b21cc0df722d3d3521b8dcef8cc2d9c28924b4

    SHA256

    7a2dadee61f8975c2a99705552745513a1233a74a9398743ded5211bafb9333a

    SHA512

    fbca51606b94f0bfc87dfceea558cd704e30069d436304e7f86f2aff2a738dccfde22206da7212b17df14a24955f3930e83e50bfd91fb9a44057b383f4c15d84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3915fbc99c20ccad18d9ed37f4056f0e

    SHA1

    dec1081c6635f017f75ff7b638ad266e8151340d

    SHA256

    deb99f020d9728305f582fcce85bed6ef572a7a32f02ff1007b75ebaa663d03e

    SHA512

    69ad93de7118a2dc20fb251381e45c3dd46f2b1e4e1de6185854b5d152685bf06f6224fa326289e3932ae979a876f024f43526373216f5dd74beb130ccb56a4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9827181fff10c10ed2291d57bb60349f

    SHA1

    5da6dc347a4928a274a9350544fa95083bd8f077

    SHA256

    fb1b60ed818b62c0c4c92692dcd008e3f47e59153514664c77ecd84d0c2e3b9b

    SHA512

    157ccf629be131edfa6478945980f13f50247213fcd10ea3ad7e2c98533c12d8bcf45e41e27a504e99a0ffc6cf25b7d54cc41093079f1516717882bdde7d3423

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    788547be6aa21da27da6e706644a6b6d

    SHA1

    d2313bc15f93907aff3fed482d5e0d8c82c0e76c

    SHA256

    8de3f7865170affd7487b346e9b01918e0521f56f94fbafbbad426fd54f9cb41

    SHA512

    0496d376aa02f9e795872075174e42d04d295f8045a243ed738593a64a42031045fe689600838e36a6033c9689a90f7e45801346e874f127dfc1ededd8f2e957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6b5d8de105af055ee62769ccfc8c4d5

    SHA1

    667e38f15bed77c917b322891656f539ad0ff49f

    SHA256

    a71990ac2826f33785c8c917c97763fee7d2cca5523cbd170408362208feeddf

    SHA512

    1a4adc64c780cccd4a9836fe1838e53ac3843dd46b08018f68c16c2455be40b2067a0b1fa44f149f475b31a179e1b91ddcfb266d75dc8096e05e66b8e54a0095

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5023db86f3b3244f2b613ad7f37d978e

    SHA1

    280ba8de485e1ec3810fad2efabcfffb214100de

    SHA256

    1962f739a679b907434bb4b3e31233bd2a2ab6cf4e4f0e3a05ede8d273f7c3c3

    SHA512

    402719709c36fe2b8942d128a80ae5b9b6f0153be4ff3e28a39c8d76e7411d3b888b9e9a95fe9f33711413935704d2d463918c631728093b40c76fd00ab6d0d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36da07dad2b26f1e5a5845a73d0d5852

    SHA1

    df853297ea35ab7dfafe41f8ac2af5974b045347

    SHA256

    cf41f1883c91b91e8d7f4bbaa9381657d33165145fd1bb88c55aece04ea59787

    SHA512

    621d90e9073f6611ff089bdf5d4e69d56f15a516edf61e583956a54038f6f6a845e1f0dfb749be029f3b54e122bf969855df3800d742d1f3e64c8cfbff0f5a23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fe573a113398c32a9b85fa2c90761c4

    SHA1

    6827210cd1a2a9b4998d1c09c3d4eebfdb64594e

    SHA256

    490be9c0ed6829b58ddd3e7df063e7cab4b79180cfdb68caa0e8e4676ce08fca

    SHA512

    2d7fbb626b213d602b89e4585bd3d6b1e3f9f0c0cf336cbcb2ce114058b6cd97dc3840193f247e523d79fe1880c1a0eab9009b26507104cbb509b273f8d61fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3cce893195eda1ace11c155ba8608d8

    SHA1

    a9b3a44187f53a756555d6a6254d7ee6f5834073

    SHA256

    10dccaee208e783a3c85a2b2ed324bcfb516e207bb590a4112ed06f57c1d281b

    SHA512

    241dd7e01d4a499a148630bcc898f34d668caa601f5a70aa50723f8ee3a1658245d3135ccb131151669e685b802c08d09ff48305dc5d60ba3de379f5145a0d01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2715ce63c93c597e968491de444e36ef

    SHA1

    fa6f66fda0e47e1aba2ade2d36977fbca614a5ff

    SHA256

    9c9ccb988f068b4959a7e6b66b0c5fc5d3019f2e93ef64e52312b4750486a8ed

    SHA512

    230b07f6a7ea87a847061e8c698a87824ac166bd174502fe8580e45397fec86691b5e7c618d9af34c086ce6b9dcc6f9148ad607ef10b3f4d21551a9215201cf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bd35d30ca0eb034a200808e00059362

    SHA1

    de9372f3f492721e46923195ea8243e8d4afbbcb

    SHA256

    950b2f77196d3dccfea5574d14e1b14eba6dfcc3744e85f722d7f7b9c79881a8

    SHA512

    903c50e6d46073ec3c5de93566635f53a82b8caa3891d46b22499ec0ab4ef7f9fdafb7be556df8d96f63d813a0653eb506b198dbf6e8dbae7263b48f1b506985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40a0a6eb18e79198697aedd0fe2da1a8

    SHA1

    7830ffdb16d5034c96ddf18d2b5aa317db714563

    SHA256

    b57444d590ebce20a64dd95eaf1c1735256cd7a58be2154493f7135067f9949e

    SHA512

    6789e37c91623af599cdf8158e32833f68238bf67a4721f89909958a44f17e70346b7bc456911f75649a79a4cede4ff66f8a5d20ae5055cf2fb64fa2be17f62c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73bd97182c6efdc11c93e29de6fd56c8

    SHA1

    9092edbfdc26733ebd56480c00d7c97e10b4e7e5

    SHA256

    aa707f856174b85ef5996394cb5c8fd9123d2fd6e2a4d577771bedc2359d2c3f

    SHA512

    b4d7cb5acce65506dfb5254658b933f208687baf175a0265f9aeea9fc80335e851ca64edc4a060e9dcf037ac4a6280e87e78cd65be709e70fe88ea271484470a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae6176a2f1cfd9de464a0beaca4c307e

    SHA1

    2c1570df4e39e96819a4391c76f527f8a676dedc

    SHA256

    2fdc6488baa3da3dc6402d77a293ec443ab8054d526477e5ede1b7b0a097345a

    SHA512

    cee07e84e6e1bcad35b76003b8702a7e590580de2a4f9a63edf258a790a82f9bd1661dc869007a99649fd20ca7806f6371f3a36fef0403d11ca5d738de013660

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78c7aaf7a0f363dafb6eba629ddbf192

    SHA1

    4523f9b05fbde8eb91b85f462e0d40b2cbf7ce88

    SHA256

    af1cbd157e6b77ef9f13d7f64bdb1665598cec95f4ecf99a9af89b202e634f19

    SHA512

    021a01b2525e8fe72ec9875c572f66425769055c755f85cb7ca997596301a05823aa81b542d7a0e601cf68133cda9d42307c6e6eb227feefc11c54969742415b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba68fd9639acdc88b223d1517fb84c49

    SHA1

    67375626a2d347ba6e90f7f4307ee27b747b888e

    SHA256

    3d1e66969a09c92e4e8d0ad874968746927cc6907832173547366d34db597f27

    SHA512

    f8e60dc1049922b01dbbe8a6e049173d6a5c5358891e736c4372c3a69f81b7c7e9aa83409f60ec09c83a73d53366d0f434cb285e1c713877a71d1cfe6dec805e

  • C:\Users\Admin\AppData\Local\Temp\CabBA99.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBB1D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b