Analysis

  • max time kernel
    361s
  • max time network
    365s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 12:15

General

  • Target

    Portable_x32_x64/Data/Packaged/Main.xml

  • Size

    1KB

  • MD5

    7b53ebd64e5781e02eaefb6739a6b556

  • SHA1

    d5332b200cf5dcea0419afdb66a15d89b9eb619f

  • SHA256

    b975c9251ef7394dcc69f49e54dc5aa5e8df32f9b5e8c687484ddd840eb94d20

  • SHA512

    c4a25c07e19760547e91818ba6e9ec3fe89206c29429668731c7563b7407cb56d8c0adca519bf96dc82a1631e82cfe63b68439cad4102ea2a1df438bac8400fd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\Data\Packaged\Main.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1be75362b1523b973262ab8ecd54ab8

    SHA1

    ffb1931c34de76d2f226fe6ef0148c344e24c4e2

    SHA256

    fff84b697fefefd916ed311fcaea985ba0f094c286bbb97ee8847bd737482172

    SHA512

    9809005a87d881e0fd7a2875b93502ca74b4b4b8a8ca5d21bd60e1fa870850474707fe7f1ff250cbb4926dadad36650f5a4ada63e2552a9090b4fa7ab0734627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2b1e6fdda3f7495e32c16e2f6213180

    SHA1

    ad7c288ecd14f392e2b3f08e25b2f073cf8e9d58

    SHA256

    f105432914a1eddf5d7fce4388d741d6c5541f365e66132ef5af84b4221dbb9d

    SHA512

    2d62923652fac088f83b39e323d03c453bdb85bf95c6d51b17d84bd90bc138c7e90067629531e06bc11d86549ff24217c1f97ddbd52f39eea756b91f6bf75398

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4010a69ad7982489376c97cc446d2a48

    SHA1

    e482959ff753c0d3b86453b6a7d99224e244866d

    SHA256

    be6835e453d78f1c06c51b5f2e9cf77af92ec23a198f2a5da1f445a936392ee5

    SHA512

    f0e68d10f8a4c397187b72e674fa4853bc055a52f0507a38af6627a2559ee6a547d8fdd797cae314c22c8e9312a9e3133c6d235980641814182f810ec8678b0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14535c8e39b55f24e29ccde14783f027

    SHA1

    284920ce616f7463f4e530ff8351736b74400101

    SHA256

    2da8bf7e48ac2ebc6a93b9148effed92f1a7c8c6b0c9cde5f28a34ecbe8664f0

    SHA512

    88024b000afe00c66502bc655823cb40419338d1b62208f364c38906d8e715b3b95f0b41ad13a0222506d438ca0f456760b6fe9b79099994584e92390b5891e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55be7f7e6c27e20580e48844aa54a39e

    SHA1

    94150d33d864c53750cab7f22aadf1b808aefdf1

    SHA256

    03f4fbbda2368510ace19f8161f85937fb2a6e426591485efac177961c9f3e41

    SHA512

    34a44e2ab9bce9bfaf749455dccdd8431017c58ad6235faf46d5ba5002469df8535ebbfe69a996a328e4d36b6a7de711989e6c23ab45e711907323ff069a5394

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecfb7efc2fd9598a5c6ecfc4ea1b8b70

    SHA1

    d93d51dee4228c44014c83ecf37d113421acd320

    SHA256

    5f9e9a18f4843779625f8d70e428e401b2473f40867ebd19023b1f8b5c2765be

    SHA512

    2c11c165a324b0a33c265a564375fa470d71e01acaa0fdf600db5d630f4fd1d9b59d7f11fffbf838d0fec1c22458d6863ab47705551ff8ad1f875569d348562f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89e21e190dabfe4c8cf341247b0d8749

    SHA1

    f678721eff2154383467b4d03717175029335274

    SHA256

    833e16dd207cffdb57f677de82b262de350d314d48e7f878b383140d3659adce

    SHA512

    6558a14efc1a26c4c49f7d5ed6f79ac28a89e08590ff41c32afabe36cb9dd34538e8aae5cd0756a8ce219d6ae76eca44c7e9a908d83ba7b91a5ac1fe77b491fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c2f5848273df60825f2fbd544595952

    SHA1

    8b636b9b8abab459a8f6c048525bc97c9f10361a

    SHA256

    59144399f33d062e9caa1d8c6b550acf69848e5e5a16a36124e748b9b53284f6

    SHA512

    2a6c33504a36bb257cdcdfb70e3484ea650627b66e299889eecad925e2b5488975d0b27c386ec172c2779b6ad9a9892d16430c140393f2ff6e2933b3b7c55d95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a3552bb54f302ecab29af604c344abb

    SHA1

    6e818831a4cdb17363dfb8d5432722803f5538e8

    SHA256

    3c6d594b306fc2c6b333e5f8e13920e7dc69ee6ef9a4f3efc1c49a7f0056fda9

    SHA512

    c8dc4b76409a41c50aad6cdda469125749142310d86bfc57305b6df9987bd125c6d86f08831da87aa3b7f08c85930ed8840c57cc72c8a773b8648e9ad3bbb88a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e65d83d9b12ee0d70258f938ec45f92

    SHA1

    c76bd50f5aef02b5ce07f88032a98d53f2d58a88

    SHA256

    9bf07ce86ac730b0eb51efdff55851f2fc173ddadca95f3ca3b84b16e66ccdae

    SHA512

    3aa87bfdce685f5e697f0dd87ccb2f322858ed2a08786c35d5fb893bb8d26a17b6c8ac158b3bb11f09f948d66ef5cf31c30d3c31bbc420ae18e9946e63ca3d42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bb292fcb54baa86efcc487db14d84e2

    SHA1

    232ee1311066d9002696ea7f0d812957885b90fa

    SHA256

    6074425ee3bacc7f5b96c777dfc60f30d582a1d74d2401d561dd24efc1f3981e

    SHA512

    5d960a3ff4675697c68d24603dfb044fdb15c91113fef3717ec7c9090fcb702510fd15537508f6b497e02d9b29bf690aae505489922bbe067bff86ada8731e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3c08bb21789693215b3fa20734c1410

    SHA1

    8cb4178300e20a5206fdacf844328d3d2429ca55

    SHA256

    6579b00299faacefb609c03214720a7ca1afcb1edf87fd10dcf3c8070da0ab82

    SHA512

    c43a9991d10a2bbb7369093c51c7ba486151746bda3698e1039af55b58c5ed0e6754a3c4a164ed88aa3affdc465f66c9f8827892a25a4700535b6ab1bc27d49f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    848f5ef2e25900ab281086133ae34477

    SHA1

    d0f8e619b5a2b0cfba0ab156d6fdbbce0903427f

    SHA256

    f503bb9e7480de336c43c4d66131512f9de17f4a2562e22e9254d80b2a9fa05a

    SHA512

    ecf22a4a9321634a213b4e7aa462dadc4f6906dddc54cc4ed38af33bb6595d260e4a86d1275ed3710ea24d423b8ffcebcaa240863e3ad687dcbb3191a698fbb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00abea7da49803a022afffc6c3b81035

    SHA1

    f2ddff42f757285da3284bec10c5e598ae3b99eb

    SHA256

    234a259afbd98666dbfda0f4ebcfad05fae84c4eff4a6cc068785d8e6bfd7402

    SHA512

    08049162c94aba632f1611e46ed690ba00c6704019da1add52f68d1f6363f27a929d2f71e558cf38f9894c50a413d51e7e6c21955df8991c470cac13ac89943d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca248e0199cde24399753d8f2fa6fb9d

    SHA1

    f865905d2fcb3c889ab4ea63ab6406dffc16f26c

    SHA256

    0988c772c1bb08edd8aa476ea442a7a75ed664adde8c647c7d2fb1c131bc8964

    SHA512

    db25ac08b67f7c23549bf79a482a0e5cef4c75a1ad81964ea73e452dc6ab00122528d679793fa39dd8d5f4fdb9204f8e75c6bc75d3f8323c586a74cf55679fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f793cd247870e4fd2fefd21b8f293d0

    SHA1

    153cdfbe28fc106d1df272f53f5be47a7bb1fed4

    SHA256

    b88b4de7abef7e7aaea8013d48093330465abe1a861143f4a557766430b1310e

    SHA512

    6efea952e0bd516b62e482db7531457b67c37d59adc52659045b4487585a414e1bf78089394dea31bec36ce2b448f1b0f06e635b0b47771a6a5c929b1ebf7213

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4558aee7e59e771d9d5591c50301a962

    SHA1

    4a3e15710aa62dac4880788410fbb39ccfdf67b1

    SHA256

    4edc9df6291dee0f9900386b4fb2ee95c8fa10eb8b69bb55441709fbc41ab197

    SHA512

    3127ef0b7b5ad48cad72f733de123372d72c7bf0254c5cdfc7f91f5ab8c03039a4a7354c2d6a18463e606e31f90e95241d2615847a5e4a200dbed8120ac18319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf11c2bd161efe5aecad71354f6babbd

    SHA1

    a26a782be3c48426397ef9c295332da316eb172a

    SHA256

    da170c91cad140efef2b3939d17ce9c12a13cf23d2a5a16bfd86e1985235fca0

    SHA512

    585ce7f95b0053548e1d00d66c75351f8e7a725b41cc9e836b3dcf5ef21999cb2764607778b7c77d2ef03a3d0137b7cd56f7e6020d93beac47301ebff856de46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a4adea76904f7454f08cd36d81fc700

    SHA1

    17af7abf2979d95fd90a42c38fa5d18e64a4e584

    SHA256

    3f2e55c9d7ef09f204e5f879ca604f4d9de0a0f5158c3efb4962ac227c5d02fd

    SHA512

    735194d194d2dbd495a522186e94027e873694f57e2fd4c9a1d9e8d8d76585ae9aca37d38a068a1d499289c667c0f567f31711f9d82e10af0f7380457cb7fa04

  • C:\Users\Admin\AppData\Local\Temp\CabD8D3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD945.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b