Analysis

  • max time kernel
    360s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 12:15

General

  • Target

    Portable_x32_x64/res/cravats/broachOneill/shaleDashikiBajoire/ecuadorCapers.xml

  • Size

    42KB

  • MD5

    7411966ba263e7ebaa428c782fe9fc45

  • SHA1

    8b3bee6e129a04255f2b31bbc336524123fb1262

  • SHA256

    8c85e34d186c96a65990d7b2c0b47c261fd7da381679c604a30937cae07be62f

  • SHA512

    329a494d2cdf57aabb91938625338552986a914e813ced0994ee78185a5a2ee05f1b4c7790b07516da1039f99bb20d2e241b2fee28a56611099d0a97b54e424c

  • SSDEEP

    768:AbcR03Pbz/Lw+HqmaNkIZ8kfCEDW22I1Iea4OytHKegD:TMPMMqJNNBP21ea4JKD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\res\cravats\broachOneill\shaleDashikiBajoire\ecuadorCapers.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    438cfde812430d8b34d410c82d7ade15

    SHA1

    445beb32583bb7584d74e339097155a6290670d8

    SHA256

    a533bdcba9b2050540814029669687b06373ea6718bb2c245ae88438474bc487

    SHA512

    82e1c525840c4e0a1583e46b7af4a8f8996e2af5fc2b3edd63f36f680372755e6a71877b03da5f3c5e4a753b36477e2e9a884557e3930794690c3cf490335c12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b289e7a0bf4a97c0a690f3d705205520

    SHA1

    fdfc4b6f1831d260b50ed1bfe6d0f75bd17c4e6d

    SHA256

    f3e8030a27e1767195e876fa2f4df7475d4fd5a2065303119600a839b7b83b2b

    SHA512

    71886824e1d7a248b4b7b7eb9e59c88507e61fbadf9bec35efb619e5619085800ecafebeed82d1aca0c95e32d65b7496da8c78d27a636519b6d9df3b255e0c52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    448f4616dc08a8fb275f4ec01e4882af

    SHA1

    36ed133c9844e9034caf79b1ab0e85155eb72a06

    SHA256

    5c16d1c25f996cc03d4ad9df56ad2baacce95c4e043b6974513c2aa4747e4152

    SHA512

    f80cb2893fbb601c77856feb4dcae348b1d684e00d532037b2459118ca0b40110fa9916c3f7f05509b31dc1ef6d0475ec637a732f5364bd18d76400beebd94a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebf2900aa2f397d85317a7baf488ab16

    SHA1

    5be3cc2b097c8cbadd39bb2e57246b6a627bd2b7

    SHA256

    4279bcd71416390925914e4922fcc0665faa5bde9b3f5ab5110042ee856bf9f1

    SHA512

    fc49f1eff730dffbc431f3de252fa4700c1b535e950ff062c3c2f9981acbf1ada1b7029a2ef5446278497eef71dce3519b85193a4127a97e88725520184c67fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ce51991dd2f26f5226f150d2540ed9

    SHA1

    69a9650acaceab22426124e0aa8b8b7f34739bcd

    SHA256

    cfb9572c0468db63441cce850b4ce699d0836318de80ac7e170f00d026aa669c

    SHA512

    14b3cc87075a45413126aebed7c0d2996ad77007467499c19857aff379068f76d9eec41a3fa2e442059df48c2dc79eba9a258a3063ff36695b0206011d5c823f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f08afc587458027cd1b6226cc5ae1502

    SHA1

    5367616bead98100b6ebe8fb9f445dde58627620

    SHA256

    d8cb50b00319b6d8936eef643593bdda14f44acdb6431060934837975a047b4e

    SHA512

    98c8e7f5a58884e0e7d9203c6a1981c0abb899c93d03a956cfe9795e145cb6f7720173ba84254404f768869e139fdec5f90178f38a752028c1ec68057263bd4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    533b9c8ae13b6561f602f5402873111f

    SHA1

    274171075eef8a5aadc1e2fa5f2396326b7fbce9

    SHA256

    f62719e23a8d5f6d54f790de3015a93ec93e357aba7edb9b24c63bc42f2cf2b8

    SHA512

    2730197ccdd8928dd22a143d65ac219124b564f9f2f3397b793d2c14739aae99146ee58b0f6759444ba04b0c2aa64900e9e9fedcc0180c13fea9c634d8126cf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebc6482fd9b160899998011fc94a06b9

    SHA1

    8c5880f76f408303bb3fae4d69ec93b49fdd886e

    SHA256

    5faa8fc5f0bd493fcf1f413d52a2f5afeda9f8d7c6cb8ad51abbc5990555c5ad

    SHA512

    1537c3c2be5437d797cfa286c004c10dfbbe6f4da6934a33525e017a678e0806a015fedb508e04c5a3771d35445b230dbbff9a422f17410ea05cd12a8fb017dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f12054774768ddb3cb02084fcf0031

    SHA1

    58cb51b023acbd359cab32b0c1d298e79317dcfa

    SHA256

    678ba2817cbfbbc149c5528cefd4288c2b4590e62930ee9e4c55d34deb734a15

    SHA512

    ee07e46ceecabff375e822309ad4a30d3a5463583654bf34ca8d14b72ed252b92596490dafc354e29c970b0548bc1c30bdadce83f1f63b88758cec445218d7c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59cdf0f4858c845453d6b0e6939e8cb0

    SHA1

    116d401b6bd9d2bb3ae5a89349df05cfaa23a5e1

    SHA256

    1478bace6d4a45fda9f21bf7094a104bd81a029fb12154d44a5ae290c8badfcd

    SHA512

    cefe005f0f3f91ec2acd0e54d9c1303718408f1295b8b6f1231d905f20b006cf2cfb7556677638a61514cb7701c6fff43119fe3f5d8cfc65a2b6cd4cca788675

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2710a4535e95efdaa6c06d946224843

    SHA1

    4f2159d2f8f408d8227126a4ff768f1c3cb004fc

    SHA256

    e2d451e6c8003d8073800614fe6434c3164c1e8e14d72fb6b4b4eb7f927f93a2

    SHA512

    fe04a42f0a2d1232897c7e347c60110310b30572c2837627c4c74ed52c04f936cbf444447e465f240e32c229fb6e66cdc06cfa8efb1862efaa45ae14c9861e96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74d31cd1ab2338f43b119cadc986ce5e

    SHA1

    6586e1ab24c7ac3093e8c72b3961b54f43ce0b7a

    SHA256

    f869ade2731500bb9e9fe34ac1a1964097fa9880409a78bf579dfe774765c198

    SHA512

    9f21aad1daf4dcb0e4f3b8a75b753e9dceecd04981384e295cc2c8c53524ef6cb296361b724f4ad2f8e7c61fb521428a71d7cb7710c380845b887a58f5ad4267

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51e978f06aa13c95c461a229d4a3e6e4

    SHA1

    217222f157790274ac91c3a54e237d9787bd1a7a

    SHA256

    0d4e6d48e28bdf6b81518d0ede78f5170fdc3b667fff9fd04d409e67ef7f7e7e

    SHA512

    ed089009aab68765418db2166cce1013c4881b1bc0aee92bbc2ec6ec36464ed5d1897240baaa3aac7ea4ad40dabe37448287521706f40a44f2c4435e616f31e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22581ec812fc34eda6702d52e95998c0

    SHA1

    e002ce4d7e2769eb1e19ebc5af374836a86f8231

    SHA256

    d0f026973295b7bd9287f710833f9ee98dd27d71e8a0cd9889a31fcc7785adfd

    SHA512

    b8d43887f29dcf4d162cff4efccf4c5bcd195cd95d4d800bd5156d9e74a8f793454ee5efa6a15c8c2282ca3bc1a392847046aca48e506e70413925f9052564c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96a5e7e21dff545f87fa8ba7215ff734

    SHA1

    cf516e5134465e0d76770cb3cc4ad2872dbdd292

    SHA256

    fb82e1eb67ebf3a384bf302de3d2fefb6cba6881996092c91d4f698bfcb1c857

    SHA512

    4d0dfff81ae256f56f10753a4d324cbe964612e354944c4c1b11ac2d1e62b1c0f85e97f66d12eae5b747993e276b074a5fe31e9b07ce918dbcbe1e8afc2fcf70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    345e03b6e29be90b936662bdb5f7c138

    SHA1

    b0e1547796322ea708134d2d972e7581f14153af

    SHA256

    be124c59159ccef0c4683e0c77a96308a4acc4499c3f130a73d84ca536e1cc2d

    SHA512

    6d1159546a74c9b86fdf2a55caad3e6141b766de3763a6cfeee77ecff04c1f733d790cdcdfca704920b411ab24feb9c3255173cec17aad90ccc5c497a63672fa

  • C:\Users\Admin\AppData\Local\Temp\CabD4EC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD55F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b