Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1516158345_Mod.xml

  • Size

    196B

  • MD5

    a91fdfd8b798b4d323068740294ed8cd

  • SHA1

    9fd09c3fe1d06dba17725c6ed4fe4b52e5f94105

  • SHA256

    30ba0892aefb2f302d423b5718a0fb84b889c0fb3813715cb5caebe6ae537670

  • SHA512

    de64c21079441324244ba0383f0a31beff9da807efc9142e523ea3f22930290f50ffa758599f927c226059e483e9edaeea6f3babb6aff59ab9212efc1ef28f5a

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1516158345_Mod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ac589a935beefb8fbd3ea6c281fd7c7

    SHA1

    4a8277a381fdee26eca4dafa407c2b1877945e9a

    SHA256

    9263e02e267afb353ca818fe90786867545da458244980a3bd275770b426c72c

    SHA512

    31f5812d574929c50b62e999e4b825738ac8679035df173e903f1b886f583c0690b73e58ff34df6742b6b859f79f215ff9ca6baf16a85193eac054cd8701ff92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e4ef034bd810da1d9765ff52cdcd19f

    SHA1

    f112881d20babded42a6ce49b58b9d24fff98890

    SHA256

    1f1f425e55dc4ec6273991bb9798186759d70a9ad520de9b3d4e78baf5554eac

    SHA512

    36f9c3b32bdcf833b5882ade00296f0a223a129cd9b470e1ea483bc7d4d63b0fad0f69b3a27f567e05ae137b45c17d905b83ec867751455c0cbcd442370ef04f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31f29c80b0068c8716b6b217e44d688d

    SHA1

    0add53e544792f5b6f1798583a13e420618fda86

    SHA256

    011f0ea33e9adfdcf5668a7d8f8ff66af113ef8ed6d7305d725b5fb989c2669a

    SHA512

    9afde3f432e6a464760a6419a5f101d0a7e33e555b1ec530bdd6cce70f22701ef49f21512fab3f8a86d871867403b064ef91249978456ce3b56fdb06b1297dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47ad7433a8b800f86f1964702a75bfc4

    SHA1

    cd557626b0411b1d32c0dd09c683cb9f9b6eece2

    SHA256

    74baeda9051c4ba9b67d67c5e3050cf1e059593b1edd7cda50b778524a336128

    SHA512

    4cc9cf7462694da9440f3c8488ed5017a8e3cdd767a8ba7a8f724c6bf21418727e50421b5b3f9eaa9de574d9e305cc82b065ce1302e4839a0e7c752c62477a4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb85d30839eeae6ff61957dd0e20c728

    SHA1

    9b779894cf86373d0b3f8c9fb2f3f639011ab7a9

    SHA256

    41c624e18b16aae9ebaaf8362e85fce98ac0bf4ff60f22d6eb17c61e16cffb45

    SHA512

    1109b4c2094701fa67847a955d9a7331830e7b0cf92c83cb5d74248878e8c6d138b003f60f9ab0dc0ec80f28f0ec044bbfc585ea54c1d514efd5198399ce8585

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ed2cbb7fb9a0ba6c18c3ae978dce6f0

    SHA1

    702f897dba87a91e5dcec5de8432122ebcf2bca7

    SHA256

    65accbf21e2740f0c4659c8949e3675add4cc297475bb64023a8dfd0f25e76a6

    SHA512

    bd2e9029da91cc957578ab7e82570c18d3fc646a80dc31bd75c0d749146a6168377dc2a0a1f49a310ac36f2a6894b6cdeb162c79b2d63acd19137b0670700de7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1229f0ff669352d5ff2c8b868a19f49

    SHA1

    76590e29424aaa94de0e640e5ba996ca7f3fa155

    SHA256

    5f31a7069b6917374dfb4d4f34008a29be6dc3119ba51397b0e3372e3f58838f

    SHA512

    0620fc911cbbb6522e6cfd71413128549d11ca47f4d33c29dc3dbb93ff620e1fd295ef11877291d0dcec15057d30fc7d2f32d06a21f5c75be7689349455b9356

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db043cf243b316a4ceb63ef0c9d02e81

    SHA1

    b0001b1a3d89472bc7b08df4e348049e4eb8e23b

    SHA256

    4fc83ca2dd58762e978b6c3678fcc76c0390085937dfbe28fc289616a9c827a3

    SHA512

    9a223d58cf5dd3c14829faa28ad7ea086108c97182c8fd3b18604c83ce04e6578c8ac0b99e4cdde87de3fc71b75b1362c2c14213c0689e899904de58782dd94c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88b90cb08e5661fa403eca201c02330e

    SHA1

    82a4b889075727a169a600e3e90bfc7cadaf6045

    SHA256

    3282fcd8f058899f3121b5c30a4ca64b04fbf55c423fbe061d1a0799e6520808

    SHA512

    8eb1683e8fede1683b0e0d8b45aa042229bb427b1422fc38c2df469d867115aff7134b8d7e490c614c0394d32d28c30f0310a744fedae220c0461fcf5df74720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76204e1af910f91552af284c83d7111c

    SHA1

    06b3d6acebde1a810567e558dbdf8dcb9c892b15

    SHA256

    277598bc02ee198ace1b502e9eec86301b1fd361515a13f5eebaceb7e2331337

    SHA512

    204eb0ec1fa49620e11a0d7e7f6deefdaea07049b5c2e9747ceae6bc53872342bde131bcadadafe22aa8e4bb99fead5ef3e286888b732b5e50703f402e1f7258

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6aa6f79aa869eeb40b8b3d3537116584

    SHA1

    a9e5a912bd01cfbe47623da4df89a3bca0d4bc15

    SHA256

    a760ba6b23d7593ad64c7b9d40504a4e0616436852f8b8181d7e74dd94848561

    SHA512

    bd2f437656f35a2acf13de3cbbdd83345eee2e9148e33a9d3ed6c67c5aff46c290a0745e446dd7142fdfbb3d962249e2146d52e4681981f26ed590f516fe3bfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77d0e8ad4849bc20a51c0a4a0f8cee70

    SHA1

    cd164a510fb23f5720c0d8e6f79d2b0d8c6413a8

    SHA256

    077b238fd9baa47ebc53f689fbb7c0b740ee04b34192f6ccb92bd7350e6d4a55

    SHA512

    f7deea28c4dfd5e9578c0d20ccba1934d444d86e9572856bb9e86d4474eb62cd6951fd54e348a7fcafd805e4781727b3bb98f1f81d81126c8df35e872d89ef52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8aef3b4b152c4bfe11f61fa7ae54233e

    SHA1

    971a9764a7f92bf56c4f4163f5aa70766e355b39

    SHA256

    7e7b927e8d8eedb45200360c946a597f870bfee9bc260fbe9335286e9531cb3a

    SHA512

    5d867b520d4a9cd0b9ca57e93b027255fe39baa3118e81b64da725f1b135a1c4b19b8b69056f3d72053ed1dd9ea639b82b88b6ef8ca5a6dfceb1986279490091

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dd8c5fb81f99fc860e9002cfd07cc34

    SHA1

    cbcfa6eb206016abf8ddbd39b05e084fe4298a71

    SHA256

    a1528acfa7c5d05fa692d0ef5264ddc1f54e2880f89ce5b46bd4d786c522aa55

    SHA512

    880bac1da5ac260a0e8201d654cab3f34d1b3e289faecb6cdd437ca0c927bdb5d9f2b35e561313dde75c3184a5b7c095e4304794aaa7260b8e14b908c9340a7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91dad585fb8aeabcbc2157641fa0b836

    SHA1

    5188f148ff1847c9bb891e7b014c4182d11cf6ff

    SHA256

    3a2266ed0101debd5986d8c587ffc9b7c3725ff8186ad1c1d7101c48c63f9599

    SHA512

    770cdfbc317e3aa6fe6ea198507e2a69d3cc1d5c4a9dc9ed3b54c3153ac5d5cfaf7d6fafbc1f71045417a41bd929bb281c760ce584d7f6cf3f738417b0f5b47c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f48f9bdce09c61c9ce4f25a1457a82f

    SHA1

    7a876c40a00c6524494d86b16e25cf38dbace36f

    SHA256

    f9c8f01c3edab2d91644eefe97e021c1c6dc290237aa81e883a95101012ac3b0

    SHA512

    5b4869e1f610c413cf0b5dd4d6853e78d826d6458a3dbd444595c892bbae2203fb0a7df89c0f7c16c77b77a2a94fec02bc91d2de21ccfa9c0accf97ea4efd1bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bdf27b7d7bd31cf3cdc7549e2f64011

    SHA1

    0e527492fdc698b96fee1d268b6adb725224af06

    SHA256

    6674a4cfe37b6e32d66d912b990d586f16c48f4cca77382214a565298ffbc2bc

    SHA512

    f4c94d760083474babdbdeb2fe19e6a748bb532ed9142987b469251a5d08a738b973038de42bc165802bfa24f174c45ddfbb5a074cdae9635c28225d135646b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2228a2484db800ef87a81bc7646e633

    SHA1

    0371aed09ed43f97f10b4203e63670606f2113a0

    SHA256

    23ab6460c5bcabc1d0540e022043d04591fbe10646a012c50bf1c383d020e895

    SHA512

    ec1538e088d3e122729ac5aa1a9f4d888d774f862c8e58f1958a825c05a199a3280929a2f95bec0e0b1ac8d502535ff6afe3bf5422aec47c09a1a1c8ee6bb16b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d52babad0ce1f6eaefce227053f6d00

    SHA1

    9b96d1851e15cf2d78ba1f4cda13f6e2cf47ecc9

    SHA256

    00eafdd6f047f709457034c4b56f2af63551a876610be02c84fa82f24b0296ac

    SHA512

    2b990d79e10772c2b14b0b72ca4f0643f74653dffc1f21dc598177b9adf72db762b55d32a2e6a4f9d3787715f836231ea3a3922cee961acd51dbea1f5ab76961

  • C:\Users\Admin\AppData\Local\Temp\CabC4B8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC577.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b