Analysis

  • max time kernel
    359s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 12:15

General

  • Target

    Portable_x32_x64/res/cravats/broachOneill/shaleDashikiBajoire/baluchKenlore.xml

  • Size

    70KB

  • MD5

    be553e5b5288fcfc8115570b26c8c849

  • SHA1

    fa5b7fbd3c297e4f540ea15944fa0a74c487eeb5

  • SHA256

    cf715dfc6cbbc90a78b8d5c9c656b818026baa666feda2595865c126b68c142d

  • SHA512

    4845ef68c356b3ccb993d162b4b0ff1f99d2a88fdcc5aa3bcb28115a2ecc8c1c1802835d30a8b019ff88226c07107bae0ff7edc689827c59173701ebb38e0cb0

  • SSDEEP

    1536:+tyzXm9kPizNKupyIw8hTF4+z2Vr43JJAusaEhMEpJuu:yyS9kPizNKeyIw8Vqj4J+aEhTJj

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\res\cravats\broachOneill\shaleDashikiBajoire\baluchKenlore.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ab57b92d0fca994bee2cc7eed144315

    SHA1

    7942a48375dc66b2dc21127803083d05e7b46734

    SHA256

    c36bbf75a56de5ca8ed6b623136303cfdf1b66a228a6cc90c06c48241a6b08bb

    SHA512

    871316ff6821a555e737d9b3b4d3a7bf8bcecc06484be91587fe52f57f61666bcba76d6c7a96cd6085773feec1e790ce9ba38d2730748042ea07a7fbb1a37bbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    632176027021b4630a5f94a824f4887c

    SHA1

    67e094d68c9e875fff6cdeb2d559b6110ff26b0b

    SHA256

    91e9e796d33e28cc90d60af69f5b30583c6f5086a570270e20726019bdbb2b5c

    SHA512

    f48d448bdcd10dd42f66ab5fdb05429576e84e164974a364254c0c52c39220b9a151e294ae2f80de5f2314fe64204d43361ed00cb9a48956663511eff0a1a7f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a11072c9e0e28559303d0a9498a836a8

    SHA1

    8bfe52517bcb3818200a4624b897a1abe0043025

    SHA256

    f1826d35e9e3775a57905770d4d3cc04efb42f83e66101cdbe585927a393ac34

    SHA512

    1d85532e6d4ce4203b94fd25f461a6c1e7e3533482e419ebf3057c82c652e745f07f12a63d040c7b0224dd58b046b692ae9a7f185b930ad22f9500ce7d8983f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    729186600e1ea126fff1fd2d4e41ab9a

    SHA1

    19af58f50264d0f896765601c3a07b98a365c2ae

    SHA256

    8296a090b540449a24f521f85190d151183c89c545d5c1f70b3ffb3e7f2814d0

    SHA512

    763098dc3a161affecdc424a0af4e2627b10f61ec7f7ef2afc3470df0d8f1680ae3889f73d0f5ca9813c2b0e5d4ca7cce6ee0936ae4362bfc7fc82b6fcc16b24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aeb1f0bd9c43eece5370f7ac36a640ce

    SHA1

    61c4d3c8000da27695d3a83b091832005d4ebb1d

    SHA256

    e210101d86ccc34a0c5569e20e24bdaafff2a5caa70dad4a85daebdec2a131e4

    SHA512

    26413107f37e652c02936524223535ec02d3c10e0ecadebb8685d315db122653668aaf6ca9e74d889417c53028755dff974c6aad35f26fcf8fef742dd44fc020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e975d1ed9ad07055e872c73b910d3c69

    SHA1

    86718e5b294573f8a817f714f663f98ce715ba59

    SHA256

    89c09cc34fad0855986abdaee9984284aeac85c8b9a92ca75df64f5f98fb9076

    SHA512

    8091b97e2e02bf59605f072d85eb2ac65d32c1a028f02563096758d8d2991d1cbc46acc91d9b6f64b1cf7438e2ec00cc08a264de2b7c02d619de71642e26abb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6c61b5047c91bd1ce84e71dd969bf74

    SHA1

    672f923586e880813366d5199a177c73a4582e95

    SHA256

    3c8b223f3e6b18155fa2afea5d2aacf1fbb40725acd07ab6e1be18def8bf7094

    SHA512

    0e270539edc6944da2035bdc9935c7d4c601f8f391cd30e081d420394c5f6b3fc564a966bfa1e9a521a7dcc0a4a97074d3d05d27ad6a1bf1b89ab4dc3785ab24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acc24a30b4fc6eca74bf61b4f8772331

    SHA1

    3d23519580d342228646457deeab3d20727d5e20

    SHA256

    9b028d807f7ade7d8d1ce63581fd29c8c4e626fe1567ec7d85ecceca407827e2

    SHA512

    6ebbcd3c2b6f745b04b94fbfec076805aaf65513bbbc4f59e7e48f7c2d5b3b75fb68ea9fb0057c02b2c9c7937fecbd0fcca77da89d03b9a34cd0c19667de51aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    526f8ab3cf781f0fe3a10da45ad0e9ad

    SHA1

    1f71713b863c57bb4759ef69ff682f27ce68cb18

    SHA256

    e8f02306a7b985cc11adb3d6fd4e890ff4bff8b1e7058565bfdcd7824ebbdfd6

    SHA512

    ecdf8d411e63ab9c56ff8a1a1e2aa78a0ff6f4afbff214dc2a867b7fc7974ddc3b52ce5342e161600a7d0f1e261e40dd877fc43f96f9ffb102fb643ffb5b37db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e18d6e57d605e9e7708b4448256f1bd9

    SHA1

    82d60d4f150662f357b3b537ea475f6fc30b05b1

    SHA256

    5f71745cb0ff2d7287ee4fde33b8f2778ea994566744eba0e297350c875c1b39

    SHA512

    85d0b7e0c4143d974b00e10501264816253f03382039bc3805d90512f6cab7d70f8fadf467ea39650bff050d5ef86344bc7ca715ab54128237a25d423665f398

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c67e70001b2aeba9a7813ba6eb517b9

    SHA1

    50c529cc8291a43bddd905ad6e10c9491c0baeb8

    SHA256

    42bea220e7d7e82afe76f8d3e274c5f19459a6b65805ce8cea7b30039c214836

    SHA512

    62ae1a035973d4031fe44d2f2b7b9a38b8ca22e41b5e54ef4741dafd49caf77da3e1cee7cbad5e565ae70a9245cc3b155608e869413f74836b184deab67884cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8c2d6f4e5e1cf90b88b3ab0562bdbf3

    SHA1

    371b2e816484d85427f3603a811878b6a27e00a0

    SHA256

    4db038efb933e30a572a38c2f0cab252075786fa8df73178311bfe3da2e22150

    SHA512

    157bf5c97f02643f7506f334221a35d18fa083b18a3c58e4fcbf5238872af0792982b1c3e655ee98c147023d739a0e6664274cc6e4afea83fbfe6ec49572ddbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6ab57555f37fbbab3b7a2f41bd56534

    SHA1

    ed775fe863ba83575d56ebd79395575d6c47a2c5

    SHA256

    c8680a0e3dac7bd5d837fbf17f9e659442d867f5052a9778323a02bc9814329d

    SHA512

    720761af4c2d3348182985dd7002836a3f9141611fb94629428f6bc93b799886513a2e1dbcd3316ad6d06e0a378db5128a0e58cb199d780348943ed573fcaa1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40b710902c83d75099e1514c4db162f5

    SHA1

    dcbe1588f933437733f181412a54a8ece3318448

    SHA256

    c816ef1c7c087100f0b6251a6a3bac85c23089047e5731acdc4d6abd92762b64

    SHA512

    840cc4080f36076c616c861a4c000af2a0e242b0b8813e52e793fbacdd1ede60af0ce3a561eeaca216af77decef50914506399b65b83df974ef0742a70165478

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7d1cae2584be18f9a019536871df0dc

    SHA1

    45b3fb38d1769eea18974cc2600d9fd3ffe50eac

    SHA256

    099ccb0ee1d6fc13ef524a5bfbd60c7c8f414edfa957045a2b31765a2429ca1a

    SHA512

    78a23a6f24432290e9e63fd28c39fa3575c4906ce8c400defa9a3cd1fcd729b3bb8923707fe5acf2bc2c304fb87f61bb7adc3f9995c4009d08dff44355cb9578

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e961ab5b8372b2d8fba6316ff9b77b90

    SHA1

    e6d8102d66b06fef439a10894268e0ddd4e26d5e

    SHA256

    427122d7197274f2926ed15740e3cc532e8ae7c8df3a19b50dea2013e01bf78e

    SHA512

    822ff09d39e75076f5ea12d2034d3200525a9907156c4e289ed4bc93c0489fc6dff218a182fd37af85179dc3c489459a230d517ba5249835b0d9f5b70747c2e8

  • C:\Users\Admin\AppData\Local\Temp\CabA8EE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA9AD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b