Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1558161673_RimBees_Mod.xml

  • Size

    665B

  • MD5

    c8d44f03c4639ec30dc96955f27b9b91

  • SHA1

    136280f280f30fe1069c1a5b2cf28d5973090b32

  • SHA256

    97fade5514fe6e3438cee41ad37959207f7bea0d0341edbba9ac74290e13e07f

  • SHA512

    07ce6c9524c6509c53ad6608e7d5812b85bb8b1952052d1a95e4dc8e6d516d87f8c28f4d570ce98f534679b3faab2749f05f6d6c670c1712a192d53644b20699

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1558161673_RimBees_Mod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c74d5f25955a6eca04c5135ede463f88

    SHA1

    82a66732e260507c959220825f1761aaf2dda52f

    SHA256

    ee47618f5b6d95d4c2065dd5de3e377d5d69aabf4e30b0c055212f9f0e2d3711

    SHA512

    254db7eb2942add437b181c75dca2b1df1f38cb7a3ccbcc738fb1391b51da2a9810f154864e44b366cc0ed56bb1f9e056023d68e065a16f5d156c3f1cb89ffa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7ba222b2039b7bf9f416fff65d4cd50

    SHA1

    4f9d0181f72f28db592d356ecfc5aba32abe6ada

    SHA256

    03af0e0be4be10253de20a88f4080daffbe72499623d7fee9be5b43ae7a2f161

    SHA512

    aa3170e03168a969ea40c025cdc3795dfb6a2a10356d39df650f2f4b35086b71fada083ff0231558478eb18fce2f238350fece355678ec525d85f529a01ac9ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48254e98e342c66bfd2afba790481a5e

    SHA1

    8eb7fe0623b0a60aed4e64296a8a2eff44e3a15e

    SHA256

    166cd1c89c3f0fceb9b47b3f9c0924eacf07477c903c5490740375b39d55ea1d

    SHA512

    c4ba6f6e8baffe539413f1bcb7d20640bd1cbe5bbdc322ea4e9dc1fbb50dc2573a880f8193b2129bad3219230fa5a5fd1156777c6680ef8330a387f4cdfcc9ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cc5bdd953b6e26d5b0da327d2fd893e

    SHA1

    3fd16159589435fcbb827a1555f012c75fb34997

    SHA256

    1017bdceccac8d0f74a764f2c4a9583b022ad0bb92657f5e4b665b1569475eec

    SHA512

    f9ad01f64d638140d59098d1ec26aca5c100e2dae4897abdf084cc8d79eb4630f2fa4013adbb584b8a59d30f54fe1ff141a94255f30383cb079d568c1c315792

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5f4c144d6344d833094db884cd7a0fd

    SHA1

    1e1c9c691d0d29814ce6d550282f4b861a699f30

    SHA256

    6612a343dbfd380518004182277301ce8521af3bcc6ffd87add8bb8d5c7c5e2f

    SHA512

    91a5034830f7c1858b480a16e43f37b310860b94dbaab43a0a1e48d4095f0283c64d71678433903b56db9b3ae1eefaacad4ff9ca7536aa5bf5c011844a9de790

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9f006887dc7ce64124187778e183a4b

    SHA1

    49f30e8b53273a27f5087a5e301611e549fd4353

    SHA256

    b71166bcb03d2aa8fa8656205732c726826ab7acbd5caecf3725a57039d5a6a2

    SHA512

    c79ce9222a1c1774f81fb972955332236f07f5026418aaa478f71ea5da4c010261d6f04e1710b377df81488ead8e877d79fe6ce7d5bfe9627ad073ceb2b44c13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08eb31930eefc488d8b925c39eae1efc

    SHA1

    a9d7115a5532a77d72720957136f52eb8d36c796

    SHA256

    9fb373ea08345801df97988542a85420b38171d454679daa5a215ab7ce4dea8d

    SHA512

    80f216f2535b771d06a3c6e51e0e7bc635be44fb5d62d85e669d6709c04ec57099a03160b7f83e265dd65b31d54b1799c39a63867f29e32e2d914c894ecc692f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f156115e49aeffd6c8b6fe4c2bb8393

    SHA1

    bc1e8adba7721609d2630bb754f04f03aa28163b

    SHA256

    3e71e81942bcffe500fe480b6dbb9a8303469893d55cbb97be81c35583b60618

    SHA512

    b0f9e82103d9e00abe7d8956335616600d8dc85af52e3f51ca8ad682cd2a2d0d5d007102b34e5427d6a3702e87c596023bf76974d9ea837ceeaf1f10f2b37173

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3e691abe974f78ba5fac953681326ce

    SHA1

    94e29f10612f81c968eb39e6bf192afd90e0fbca

    SHA256

    d68c9cfe5d334d7e7abd289253f9e1dfbad7fda76d5b2a2f6600889784fbae9e

    SHA512

    9c501fde274df072ba55a8f84afcbe4e2c45a7723d1fb5aa9c9ef91fefde63bdf918b2819a89895a524d985c44fa1a31e83fd05d43a06dbd8e524ad9d3c5a66a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44840f98537451645e1ffcbd2915c04c

    SHA1

    580f8847fc7311300836e7fe04191498fb280b71

    SHA256

    d66f9ab32d8b84c58655322a64ecb0403a182202a852fba35b56a590e1421910

    SHA512

    15d4b6c0e3ecea0be9d83030ba9933d33af69df3f82750a34eba1919c20fa2e28876e6e2b97d25c8233cbbab07a67de2987a5697025c1316adee98231136d50c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efd588d158de964319ee2ca3bd26a3f5

    SHA1

    272925500808cb90d09e30d6475a2f2ae4f9ad2a

    SHA256

    fa8602918c6e825be41e122157d45c43d158eea69b4b10c4dc97ed919aa0e09f

    SHA512

    55016fe6f98db6fdd6362d6417a44979afad22195ca2e302265b19ef1f4ca8b307f26b6209dbfd89590f829da044be13563829777dba4c9d6670d4977208d823

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5cf76992f788e78dbb0e572835c9fbe

    SHA1

    2b9c402f70a535acd8e8bbf22eba548c61b59408

    SHA256

    7d541e4ad8d82be50fc56973afb7375539b1a1a242a7d480a99c1f81a02cf62c

    SHA512

    ea83296c27c31bf76cd6d19b8f834591a869c9c387cf3e8a615c7e1e67a5577d5ee48a01e35fde4cec13db10cbfd4b9d9e32bc79f29d9405ff0a1d2e72f2153b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ea824fe2afc8b8d21dee206db985d72

    SHA1

    4c4f49e48332a70d3bb5175f21c4d5eddbfa3bab

    SHA256

    ad6d4b6db30794576d5ed112d5e1e61fa394d263985e1df9e2ac6d13715fd90b

    SHA512

    c695980bf9fb1e7dca3a6cfe949d12e26f77ce83a530b2c83c640d85ac56fc6a50ad54a500031bf6d495f1522c5e7330b502b231915e703fc5258005f937105a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f0695c4d0fbd3c8028704943cbf3530

    SHA1

    704e765875fa75a51f8e39f6de1ad559d63f204e

    SHA256

    24a06be9db939fa8c8046f324113277b7fb0a659c5e20aff1a08ccfe557e0199

    SHA512

    4d7b27234b63c5248eeef03aaba46840954e4dee60af66c76f703e636fe0f02a69af003d57d2847af0d783af22e8ad1fce06a4788ede0c80f4d6dfd90b0103ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb800a14481219224574f37b2e7589f1

    SHA1

    947abf14efa15c9c38296686382f5c7b29711417

    SHA256

    1ee06617b2224ed5eb64530ade1b497c3891a47257dd9b46fabf8f3716405c87

    SHA512

    24ca18300caf2c53c6f78a43c5b7e5c2b90e86ebe49d51ea1a349bc39de594b51a2e8878ef56c86a29dd491cec0d11742e0d24176270a6399a3cf2554cc82222

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc707759b1e0c239d64407488919e77f

    SHA1

    234ca708824fa33772f97f918f0bf0b9598dfe4b

    SHA256

    7744994e36539f49088eec01416a00d1c1295b043c14cf6303ada1b017c41f0a

    SHA512

    6deea79398944dffc4665b2b930dc3af878f74325b3a24b8bdaa331101aa55f2bb38d491fbbcdfb9be70f94e1c960646c9b48613f26de3e1ec83b86e4e849819

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8989bc50bd3c2589820e93955eea1e54

    SHA1

    a58fa2d8127ed9a63bb4b38edd0fcd86124748e8

    SHA256

    b2d2cb5de286611ef43403a038e7b510a6e2901573bc4a9d49b0c029b7198752

    SHA512

    d2b1795e4d8e1bcf48ff4f049b459a70739cab7c95ef2236783ce27816ea71ec1bf92301f3a8601feacf3db1651eb309fce9c703a4108f226935523e6d68a1ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4a397b8242be3bef3ef79f2eaae4a6d

    SHA1

    6143b93f4b4fef5046f26c30b1c0483f0dd7c6e8

    SHA256

    b100f021633fe83c7ac22ec4b607b0d1d0644f226256fca40f28d3122c88971d

    SHA512

    ac4a0d5176bb63c26908aa2466611e59acc4305c7c09f3034e2b96612cd673373a14289d785192421c0219fce95a4189527d9f6f8fa5515ec6b7bfeee0f0d03b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dfdae080fe4949f39e33a0d3223d547

    SHA1

    5038f9bd81cbd67e0fec9195434b96e3320166ec

    SHA256

    d4271297ab1676b235f6cb9be09222c92d6fef53ac7d2ce261a7e7a2cc38b97c

    SHA512

    52b6ace8d9c2871dcbc7654c802fa6945c5e05410da98049789c75b043e1238b47390111356581991ca5d2ef15523056802f43553a8dc1749bd8276b242b6319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    731f6a86165f93fe396a542ab5e93019

    SHA1

    57f4fde7f87fcc42c34f690d2c87e61f4f3b241e

    SHA256

    2030844515e6f1e66254632c7c52c05316895d651cb49ec62d12aee934bd55cc

    SHA512

    9c04dddf4ad6afaeaa47ad4e411d082d5dc4f4bf31e97163107d5f0d89c95ea61a8dade9eec1701f67c7bd510dadd2b5eecca880b72776cd8783e5098dec1133

  • C:\Users\Admin\AppData\Local\Temp\CabE0C0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE170.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b