Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    Mod_1541721856_AlphaAnimalsEvents_Mod.xml

  • Size

    793B

  • MD5

    f628a8103817dfbc8b869ab583d5d518

  • SHA1

    c75f3df99f213f312965983de92ebf384325c2b0

  • SHA256

    fbb7a255b4c4ca11b262d02ebe1c21c034da3f5ae893680c52ddedacff074073

  • SHA512

    c8dc343c7acafaf0a339060fd062d9ee7afd85dc7644c57401f273a930e286cd352d79cfc88c959e16406b58a249cf8b7d0171ba0346fc5631fd181e3eccc960

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1541721856_AlphaAnimalsEvents_Mod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2768

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          21e46dcbf8f8bc95a47583d80ca5d3e9

          SHA1

          9483d4adf12999174e60ef3cb7f2d68f13c4adf2

          SHA256

          d71b585b75a39db9e10bfde527d6fbf654eb3b4a0826546945c6b82854c2e1e9

          SHA512

          2f17fd9e084079bfb954fb33fd8a1906c2ff28428aa7fea826e9d9bd04a67a4d5e61ff2f77cd90c1c66364c3a9e7b2484a6bddda48cba8301ed76c4464ba9a62

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          5f09aef7b9b381a8c202c3b523faebd0

          SHA1

          a3954247ca7e249523d8f03af83425d97286a464

          SHA256

          83d6fec09bdde5d15c5248cfb6be3de3f2e6f1295c325fa50a76584a0f1069a2

          SHA512

          95dbbd5b31340b3dd9ababac31d00ea7c041215e8c880e396758dcf53e96ec49906a4de2f717d74ad3747db94b7a9dc0e34257d8bff3eb83a98852eae79357aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          126919a846240cb4bc94b123ae49d9d1

          SHA1

          8127d7aa50bf720cd133a1a8ac38fc6104591d29

          SHA256

          de7aa3c370a18ab69fdf09e029a635f20257b2cf98629e604ad5be89c5d5d4b1

          SHA512

          ba9bc3ffb787e3e3c43d09614eebf708570c0ba3a214918502659010719b64be68a0b8549cb0b0a157f6ba9ce0ca3fe58363e2e6100bf29dcda4d2d309133b1f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          f205788e42e8ab83d18169cecc88aac3

          SHA1

          eb0b8629819e03a47e10f5f4085e58d874702be0

          SHA256

          3ba540e710df9d8a046dc7de15998a1ae6facf812933745890181caf04dedcd4

          SHA512

          3d4a335ec8558d4c2c5b23d22a2d83dfd3521690a459baeb7a36230071fc3bfaccc97952244c879759d0cc552e767f71b991949ac61e19cf6a1386a8bc83447d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          c69fe29f179419fec01dd691bb84a18e

          SHA1

          42332ad2bb8761710288830dfc8a914fb1b9a05e

          SHA256

          319648277aaf881e78343187d5f044012157d292cf0007d04f4f7edaf00895ff

          SHA512

          3560ca184cf84ae0cbe8d37696ac50495a13bd3e56a8d44801657721ee5628789bd7c1bbec53e74dbc17741283d9ac061622cd2bc2d23abfac8b1e7bb87556ba

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          1cc336658af796555db8526b19693bb3

          SHA1

          8cc8ce8cc63ff2efd15b769b372758da963c57fd

          SHA256

          bd155414794389cfc93177801cfd05bb0ef4b7eb803270246faeb31612bfa2a1

          SHA512

          29d91f645b3e431176e31357dbe3e41436952a702954f7f1203679a380d0008f0e0e0dae50c00fe31837dffc144b641126af6fed07b9c8db2f7eefeb8b9d4644

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          adf1496c498ad151926c3067787923d7

          SHA1

          98ff42cb4fbab0db56ba78626ee6dd3686130b3e

          SHA256

          f85c57394a96b087bdadfff075e52f711a4ee20ab9961fc2f1648327ab898d67

          SHA512

          3a18c3389834df64f5a81646d4f1c7f92c20a627fd03b0e551c619724e2b5873ff89c7d124a04e05111e9b8a8771bc1b8af3d11eb7fcb6a8c31253071c0538d0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          6a4022f49ece83ddef40e11d18d2510b

          SHA1

          a2d9be9ead27737518f107aed9a70aac3ab0582a

          SHA256

          98a844f5995cba6d359cb24989f79500126d043fb5c7c1ff2ee1a8c9b15dd0cd

          SHA512

          77bd77547051a67dce35e4ccf62aa74cd1f01543bdd2716336747486c16cebf2f486e6ed9219117f021a4f31075c2a2504c636df8d0e1a4cecaf6f644497a5d7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          f57d8622006b6c5e416b78862329c614

          SHA1

          258aa08f4fee31b71d1cb4561b2ed111a74861c1

          SHA256

          f727749d3e9e9d15bc7e831599f932c512efd4b87f738cbb79404ca078d3e32f

          SHA512

          ba1b09860de1eba48277457de8cfa0b3a1aed85098f6054a644c4d6b0e9c1d983ddb9fb6955bbce508bcd6c1e726cf04840d30a96bf6e50be5b81a5f402b61e1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          3995b1b97d145db76c1022909d6fb28a

          SHA1

          80b8cb0f108c7bef94fe29d29d9387fbd9551ded

          SHA256

          d4d6b4c25ab9e6ece8dc1c360536d65a551529adcaad02f03616ea916eb4fe3d

          SHA512

          24775c4c576a12f5ba2a11b4b120b134d51926950c0ded07b59dc38df28287b9d7ac93eadb81192eb8131c8822bda512c027c6df6dd87588e92b73b3fc3169f2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          d971ab4c6beb40f1bb9af76bb8e882d2

          SHA1

          daacbfcb15b937a0460351b55eca69de31ff49b3

          SHA256

          250183bac618b431d31bfed5b9e002b9565a924a6f277537108d78601b1fd42c

          SHA512

          f99e471c4028b12d9b3ba0532ad6767a89a35a532dceb33db24ad33fc04d61733c05d406080c09fe7f7f78a2c598a5e0a539d758636b2033a408b17c15f4f7c5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          0dae2aa4423ee8cf4812095929fff7f3

          SHA1

          07f743a0095162490646e80babb225504ac757d6

          SHA256

          3b998dc75c5976922c094b53cd1dbc3dabec751a3f9fefcf6b5e3120291b808c

          SHA512

          cabe88401fd8a7411e857691ab36c7f163b9084bded5fe6ad5e309ed9643d920a255f7653fa61852880c752f8b3b7c06fc754b62a55f0196846718fc59139556

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          2a0ca4de88be30073705e7b87727dbbc

          SHA1

          91de59f56b94502e35aab6db0ef481297a871e9b

          SHA256

          99985d407965492a3da47c4dbed4334ae4eae1fac15a0409404cfb139ac3b4cc

          SHA512

          fec2dd5d75cc97a3e20ccb22a9ffc0f3dfe5783eda977fda8b63bcfc2c00d268ac06aa2a7696deadb50c5ba48234dc8419494bdbdc9f015613863835b4f8eb48

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          d3d5dabd0aa566656031caa433199dd6

          SHA1

          b024bb096b11c4c7e3542c00275655d09b35aa6d

          SHA256

          3ff85f82e1290c5516693ee49a5a5aa844b3085e21342d55d5f0172aec7a30df

          SHA512

          453c3318c103e26e3a17a590e710c6f9e9c3511681659798cf900cd7b4229f81d4cb5ba19dcdd96d129c0e1d4f77d93eb286227dc93fe02789ab65a2ad7152da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          376a559e454e1d89b9d5a79ba264d8e4

          SHA1

          92509df42a6b91e0450c1f8367d5f2c96aee41e5

          SHA256

          70db8ed9ed0665fcd255a6ff01078e653eff3560b42b4d9dfc436853e1889adb

          SHA512

          a4a5a3f42c6f16e279be81d2abc9e784b7a80aa7e48f72120f908f89b686c3ca9ba8e99c001e1e1cd1af254aa46a5078ee2dcf72f709700581bce1c58615aeb5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          292f1586b4ab72164ccee3d3c6ad148b

          SHA1

          7ec4f554622eb2ad9c1727d3cc16b00b48320119

          SHA256

          5cf1123ca92f5eb16de2474a84c36c5c7165188ffd9a84a87c2229eb0aba7344

          SHA512

          683a7ffd44a522d17e81c1f53118121b819982dc2cc2e9e894c6fe3006b68532a37feba1fcf8379164e707380a6a8a4bd4d293bea2064dbb6518d0260e5f6e22

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          a0803afaab04a196f71cf5c823848cec

          SHA1

          c582dab666afa295848311c3959119aea86d905e

          SHA256

          c88d1f536affd59a5d630c6920e23a44efa8772fe703213a81d948fd61b7a371

          SHA512

          82e4d1ee32ca66341d978bb014f548d27597e81e7e00f028d45edf956078ddb8d3254b7699a7b478e51bb5b5072d4cc41f598697c18d1f77a5a82470c46d1ab4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          70a43b44cc2c878b0c2173d84191deea

          SHA1

          7a57dff3f983a366a46f6d5262a35971a53eba7d

          SHA256

          bdb98379d3c1bd4fcb4506ed360f2b489cecafe39fa07c8c5698cbf0d766fb49

          SHA512

          390d8f3b4e4fb5bf01b5a622774ba270e37cb9a038b2d8c3ebdeed456cca4358be7b3e30f587941fbf3bab128babc66f21109ae485494ac03aa60185ac597acb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          950806df397caa01488dc340ab73293a

          SHA1

          49fe3e8b6fabec6fcd69947de0ae0bc462f025bc

          SHA256

          d3f5c0ed80a76ec7a6c2cb7c1f16ac44d1455e842f45d1fdb2ae5eb8f92f6503

          SHA512

          66ffd358cf138ab00e8eb4c05b339cbc3314fbdf72c333add6a71c812ed59f0ff4a3c88e30f81a61de94b64ce4094360345771365e1e03bf63cb13287f169a0c

        • C:\Users\Admin\AppData\Local\Temp\Cab7AAF.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar7B4E.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b