Analysis

  • max time kernel
    1561s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 13:45

General

  • Target

    FastColoredTextBox.xml

  • Size

    132KB

  • MD5

    70d49dec6a333f1d94fb1e77c663525c

  • SHA1

    184b544e672f4c4cb9ed9cf010da568eed16623d

  • SHA256

    f3f2e537065317b6ce66dac64042e925bbcea65f00561f9860b7172c9ca07027

  • SHA512

    b78a3c4418a7c5014eb16e72f2113f00353e9e566942f7160067c826c47f1ec2752ae7ede796fc159fb9bae499d347f822401fbc4446e2556cbd680cd595c2e2

  • SSDEEP

    1536:45SVw7sekyF7o//t3zEzacGE5xa5lIV1/P5:45Sm7sekyxo//xzEz3GlM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\FastColoredTextBox.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fd7b616733700cce7185575059fee836

    SHA1

    0f5b12d75fb875e807263f83100cb7969efcfa35

    SHA256

    0d26c306ba7471cc198940c9b2ff046619fc5f6c52ccadf4643a7fa9d1fb9d95

    SHA512

    e4a7fe8b0c7b5f447d20f52f8f1bf807001d81fdb9dae815f2c81e3a138adf66f9e4942656b5fd5831bf8911ecfbd53cebdb793e354b73f8862eddadc05ddabf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    27aa5bb2f931d7897788258fbedfe984

    SHA1

    5fc3040427609f57a603012bfc909a3cc640cd94

    SHA256

    414f95f1cd4627f8d92594991e92148ce6e9ba101a856b0bb7624ba070c8b45e

    SHA512

    b85205ec1d1fcd8e7b727f61ec966513bd7faa25b162fef9dbc744870b9ce49444036780202d948a43b01b3db45c8f71a171c8b4d393e743e54835940b93b92b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    10ea4779b1b2e7406a9ce976fc965a03

    SHA1

    68db0501fbb8de76136812a9ed26b223efc1afea

    SHA256

    8dfa9c82401efbd73f5574ad63d58ddc8b7d774ca96dc6787d8ed3bb45e0d3c4

    SHA512

    1bdbd7a9a1ee78feccca7bcc5a3c25bc55967a7c723e3cf2d2a593091e89f202f6f0ec5e6aee0d26556c6cfa4f2e61cb1f8a8dafb5896265620a708c57fdc824

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5d68cc552f08c1d9b685af89072090e7

    SHA1

    3abd7bea8c021e3aeaee347a4f4f6ebc6c57e3e3

    SHA256

    ef5ac4ad882dc69fefa8a888bcf1c8bfb9df1d47f36ff541cee9762ba0e12774

    SHA512

    fa1c9d68f24c7c61bd7b97c2680525c8921ef8c4ab770d640094dbe3c19b2b476a68d352c3d94abe96ed0faaefa4541f9378c2accae38df9e2b44f7767a4cf0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d09aa8fffbd39597045418e95f19ab09

    SHA1

    7bfa8a909fb7affb36635277c9391e68192d253a

    SHA256

    2a15f856b95439f5a07865caabe0b2d64c0fd249848c341a395139c0ee7fc4af

    SHA512

    f346dbd44f1982eff87fa99758cc5f4d648761f4bd9437884e68f2ed596eab3370180ebdc25dce3846c040b8cfe2a4a9a190736e7a567c3eb0c0a5277cfefd9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5c1975b2edef507838eaeb5b94f92148

    SHA1

    91fbe18a7ce801fdd8df7f32e8d8f07693233d9d

    SHA256

    3b5a5bbe720fddb11f3c8fec696e591bd60681d9613a6661ce8295b29fd3dc67

    SHA512

    6a153d94b0b7aa29d19b1e618612785a489e7fbd60f1a6b64d8940bf7e2e108b8e5c010e4bf2239ea3aa3925fef8d825d1f4b6062f421be5449db317d62f38fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    caf0c7d7c580928e4ccb472fa6b75c63

    SHA1

    b63d8f1309a57c21e7d3f305b6321d3e0b5eb31f

    SHA256

    69b63f7b7cce08e533641c639278a85d0bd561c71eb574fb24a7faefb4d61953

    SHA512

    2b4357f6f27192084b19eb29c5944e71a007e83c16cd039d2e9cb1a19c0013dd213370b98a8a1fbc2bcc4b9e05ef5990c70456688bf9a80d8296fc416feb9ca0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a4788c4b4f4e1154a5492be19f57b2cb

    SHA1

    b17b0e4d8356348031d36becd69370b3b0ab18f8

    SHA256

    67b76fe2561a03dc297949fc56071bec49f1d764f7a3fe8b45357a2cd27f7fb2

    SHA512

    9332d1ac95efbda600a14267406b1ee1c76455f34f5853ef9975b226290cd24dab3f43ca7e8388c08dd3217626e7467e064310d7e98e3dc18902fdf8f28408dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a5db8adfe8b3c39bd35f6df176f35c53

    SHA1

    ef224ffd84232d8debe1cd963c817b60faceb7ef

    SHA256

    2e3e8442b867d745ca4503cd6ebdc6c576e87898507244334ff3d4d6919d2d58

    SHA512

    8b839320d73539599be1441a6a5139df1c886e22857706be0ab24f91cb766d1cdfcbc5d18c8e76833cde3b0e41fcbffdfb021cd6393b66ff6ac00fbb40f2ff87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    dd09552720457923750b5f8666f56542

    SHA1

    c0701e72fe7beb6d40015e415680a7c6e94b45a0

    SHA256

    6c0436f95e95d9ca159a4a08f22a33db26354dae160768fa855da805178cbfa4

    SHA512

    2d1317b0aab52be0082d2669cd5ac703472af5d6e5b8807a794131044b07f95c98bc7f1128f3aa62ca9575ebd69fd44ab9e7c3293012bf73897468558dd5962f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1125208fcb9cfd9e9eefb6a5085b3e25

    SHA1

    dd593fa2f74d637a4ee1e849c16f40a377a58ea1

    SHA256

    1c070ff551f4a42364d0f6e06b472ce96d54be118d23c965ae53ca82cc69c569

    SHA512

    4a49105ad89aead786d5aaa733259f5bf19fe00b7bd49406003ce19c8694b1ec47912fbfa9ff5c16e7b8694b827df9dcca2ecf405f06466f34a53637a33ff588

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    405a2dee167e934c21ad078fe84e9c54

    SHA1

    89265aa124472c26ddcd91a6192bc69c28789b51

    SHA256

    7784b9957e6d5b76a503e44a254527cc24f11106e950173ca1ebb69fd325fd1e

    SHA512

    fafd0b20a0603f85daef1efffeb626f53327fa191febbd8227e9c99f87dc59f1ec1a91fb4ec1af501b11fc3512d8c09e9013a1fc2cde04754966aa297bb47d71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a02fe37efd2d0668bee3202de342b202

    SHA1

    64497d1490a1e25337833f4cde974c8ee131636e

    SHA256

    e9b63b207c1dd3b89aa898c48042b944da8ff2d30cb3ef4e3823f3fb610edd2a

    SHA512

    9f559ae007cab1d26a707fe73e80dd8ef9878f6e85457e3917ddda8146934372a7434167ce3b3d93883fe24b54e86a911cf0ed5ba27e21ad338d6de3746fffdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9f47766787de7ca25af2f663bb2fa5f1

    SHA1

    3e650fa7f7147ef005ce02e5dc33a35b34215775

    SHA256

    9559a8c44c7ca67263f6cc2d4acb34524580fdc6a862bd9b23479dde2530c89b

    SHA512

    1b900e8d2734f5c3175d4729d97e314429f0d7cb2f9ae9dbc31b152f31e4bae61224a3f579c5082de5d4dc6580759827e6a13a94b930863e29485c0f520b8238

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bdc61b368cf37270d18c74854f02e4b2

    SHA1

    8c4c8baa3abe7b21502d361ad79e66a41b6b30f7

    SHA256

    55ba470de55627a211e883e871d73311231db33e36a049da8626162c8a4de75e

    SHA512

    c23b47467a7fa67626b13c306c1e714754a9e88501351ac9dde013b776b1e05b9bbd2e7392661d6316d658ea2a4126be8be621e449fc6cf4f3522faafba3b5cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6edf1aa88e590f693a4ef83f69609203

    SHA1

    d52549efb5336d7ee9425740a1d4670f2ec1b1ca

    SHA256

    df7082ba9305896f7cdb40e4268b91cf93976e8182c91be9c1223afeb9ceedc3

    SHA512

    0922b26edeed442420d62bfc65a23fef5033a21a745bed29c7bf79fcb5fd27d55da87d100924749d5560201063ffae3cba7d1bbc18241ecc2acf0295f8ceb23d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    20f8b1b99489cf243972c5faa5dbb059

    SHA1

    ac6933cea42185c08fa554a825777d4e8e33894a

    SHA256

    5babdc1b5889107c5905446873dee904969b2066affd3d24f8f9c0562a7bd192

    SHA512

    8afe077a4ba221a1040643edff17ef7331e48e18690ab5135b9c02cb6e0deb0c131105e374eaffeee96ce39497d44712ac02d8246c584c02dae699c7723ca248

  • C:\Users\Admin\AppData\Local\Temp\CabD961.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDA10.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b