Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    133s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1569605867_CustomPortraitsMod.xml

  • Size

    375B

  • MD5

    119f2ec58edf9787a63f54dfeffc249a

  • SHA1

    44e081641514dd8aea99b9e3c2ac34af7559ff3d

  • SHA256

    2bc8c90fd559a1d020e7b2591358f71a43eae7eb3df7a9be86923f6f0fa3de3d

  • SHA512

    79151da824f375dee0f4bc67e2d85487badddab7ceace9c49176ba510fef3bebd6e596f9779bfe2c2d29f79df037b98cc3182a9ceac3cd75de51d67825502629

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1569605867_CustomPortraitsMod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70acbbbc2d0c72b0d752b818446c0d5c

    SHA1

    49f0a031326705583ffb8ac42233eccd243841f1

    SHA256

    08d6b0921f016e444f027a5c60f82da7dab97e387892ef03094fe6882a437ece

    SHA512

    c8db7b5c930bb68297e2985ef8e6b70754b7a1e4262b4503d3a8230c2d0b39e9a3e59a270586837a62636c77e31f161b908ce538aba141c6bdec05cb994bba5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    528a3a9fb16b7914d231e97adef07b4f

    SHA1

    ee3b946c180826af1903e89a35721df819cab83c

    SHA256

    9ed85b00d99505f24d4b8337f822b6bc1fe9cebc84b03bd4cc6541e3a6a0155c

    SHA512

    08c3f425d7c1a7910a9b9fd524e44b50de62df8e55d94427143cd8d6c4ab3e9c13496969999e258664c121050634265e758dc321c0630cba14ec08636692939b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ab5ac58e9980913a19b4c9062c23a86

    SHA1

    0e358060b812cf45dcc07814bc4c0ed41528a549

    SHA256

    b50b48f62b91e1331f333d3ff74f126743db749196d9d4d14950913bb4cb5a5b

    SHA512

    f891354c6d3d08b051aa419f465f022642405c1da01fa2a6f90006c64c19713d43c13e59eebd1cc23bd195757e9b70870fe7a0b73185a561d35477e7821cdbbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa9eca53758e58be72242317e76b75ce

    SHA1

    cab23b586615971e8112eb1934083e5e6d722c18

    SHA256

    84363b2cc8d2c52fb21868662dce17c4d4115585d536a4d8b8269d5c1395be85

    SHA512

    c210345a410ebfa69ee3c1757460418a283ec98fcf13e56df633bb5b19d2faa0ed85deb1bda7f3a133c9acfc1de5bae7f326eb992838a16271e93208325e6fca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51f1535f86d8933c379dac601ae9e94e

    SHA1

    03132b7baa6077016df4faa2a6c920bcbdab377c

    SHA256

    a335e12ea49437e32992ae6f1d550d792eb9a3b6573df01f988aff0a36023b28

    SHA512

    aa22143f31a022dde6fb80f23b3a5e87217d62dbd28dbba544d2be8e295e982d53fe4a9ace35a880bdec794f49a5f30e9ce116d7edfeb5845135bf544e323741

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ffd56e4ec1f3f8c9cf32259021115b4

    SHA1

    f992715659a4c7cbc1289a76ae67663f994542f2

    SHA256

    08d7ce6b1f9e10875a46d60b84afd545fdbec85079636ca3534ce81020adf589

    SHA512

    502f0ef6b9412402c936d770f4f6eb82de30ce210d39304e13b632a9f4812ce85d6f3ffe49fd87c66f3eae25155e05be549d7208b12dcb5fa2833cc2a5aa5511

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f480209a785d98f4921277c5f8029de3

    SHA1

    afb4e1cef412526bdfec6a53729eca4b50748580

    SHA256

    3ecfb0df8a8e97f00cb11d6fb0f27c806783f25f47c828bf16458a2bc617834d

    SHA512

    d40521cc5775b9a279e3985f6f41e3ccf1c64b6758c4715254b4a763ecfe8a9e088546b604f9a2e89773bbe100f3187d5ff423dcece9521ed66af1265ac64c51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ffed08a4bc6feb90a4ab586734c00ee

    SHA1

    bee35d5a1740d5570cb86c753207bc9ee23d93e1

    SHA256

    09d855eebf9eba06122f95728b3da0765e54483113c2b0bf5a43e5811bd097d3

    SHA512

    8b8768c51d9e3a08e97b7d29dc4c3154dc72b9aef442afab4f81ae9e36cdb43db27eb50480e82dccf41874293e6c9c9d470898839e3744b8c76f31ba250c4a54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac2085c23c43b8e89dbe14bd7ab312c9

    SHA1

    40b34364d1cf0ef67fb76ae133114d4fc201026a

    SHA256

    11bbd380aebd2bb89a68f9f88b40128e43596063de12e328d9caeebc9ef5ee49

    SHA512

    f44c6664a85de83b0ee61ffa1644af02147e9286dbb8c03a8a3df5019ddb71f338707a8225ec45060594f3b6da0880d2a7a93500bab98132fe435e8272aec614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3a83130334a9bf9b76ffb40f3b1d929

    SHA1

    2e4b7cea0b9d8a01c61058cf4b4d828e47bce493

    SHA256

    f676cdcb73948d78eba2409ec1d21741db608777f7c264edb2c7a165cf8a884d

    SHA512

    b2ce48376c874c4443a4999b055ee047a9bdfe77d0b20b012132ca5f9040f159bdeeb8183d726b5c2dc610a5763cb721ab7a3c2ec3a005292e84ee6fed56c34d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c16ea2decd32e9fed4b414fd54c369b

    SHA1

    7cdbcbdee1304b87c222aa834618853780f17be7

    SHA256

    14ce5da1a8b5f859731d8d6501c42f1495241f1c45dc694c6d978878eb4cccfa

    SHA512

    137973d0db16e21f40c11785f35e7b9b2e96acbec95efca74968c3a110126b4cf1a3c41fd533087ce9a6185ed98c485fa40ad2347e3da8d469e6ddf35e541467

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03de39bc22d2639362fa905c76c23fb8

    SHA1

    3ec517e6139c2aa43b6d3ef2cb1311491ba526f3

    SHA256

    d57ecd8e6448c835f8733e77d3a49eeefa23b53e4826ca7fa972c2e93c6f0052

    SHA512

    19a1a43b5fcd19510ae6ca8716c15395a77412083de86d2b71dda53b2330058595d35768f6bb671cc8ec3d30f9efbb513a247fa0b8f819301ee887c9df4625e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6e0c19b9b97d61e300271105840bbc8

    SHA1

    14646d9f32022ce96f1a9d536b570f6b0c817a71

    SHA256

    1662313e1cfc198ab9bbc59b713e02e01f884c06ca2bfe7fd4855dcd76b0c957

    SHA512

    e5f453bd45db117558e5a337650ceebf02d674f531281bae5112c5a1db2638dd582b7e5c48a8e594c484dc18b2222ee9222ee5340c28f0a09108e7c3959e1334

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f0e2550797848d1eefa10862f1dbe32

    SHA1

    8245dc288c92a84f08a975143aa03a56695047ed

    SHA256

    5433cbb7a87784f405291935a66b1eb0d107c2eba9a7f1bea60bf304a35c05a9

    SHA512

    51f55a2d69f9e91c0937101526a54db4f2656e76e5188c88a793c5a6e6d24f60efc94e2cea7e93701a4006e1224f16020b4a791b763745265fcbfe2f0a9ff99b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37cb298f95931e18b619aa2d0809ca2b

    SHA1

    7296ff094821441e8e7311d747ceaf7d3c7fbe42

    SHA256

    5554fc06f6180e613feb52dc1386e184fc6074594801482d89df9c029929c53d

    SHA512

    3c3fd9d443d85fe5014942983ec6c2f11d6979517f27d72e141ea0b5bebbf3b00c89bd61d8fb59340c4e18b65abd90a9f3671b04aec677753d26e348747d4d18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb619e602490a94bfe1b8e907eada1ff

    SHA1

    a873917b1d7eb4889f12368760493e8eb4f07510

    SHA256

    14bfc6159666738b2fcb506c63a0f8bbca60bd35af467a9c332d8c4e46044c23

    SHA512

    8e4d33b294c047a58008dbe4b06ba0345029087e96c98927c1d91c32e37e142f127cbad45332449325d296714df241355e283891937f6f67b574ae5849a5a6cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32a07e779478daaf5db5bac7f2fd5ecc

    SHA1

    53c2393ad4eba0f0ecb7ae89921a15a28dc55a85

    SHA256

    0a031ce686968b98b7abd22733e02463483de05d29746ab91ec5d779017ba1c8

    SHA512

    647a158e966bb1d3beeb6b354e615e31d0040e9e9330ecfd1a65795ac2ebf1121cafb946243d634aaf534288536a6d95a47d9b8e8e3bb21fc8fb6af7e1114e74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83b51ba4e3cc74495381b13074211cfc

    SHA1

    d541a85a20f3fa3cdbecee287ddd098cb27fb374

    SHA256

    b86a16187f1949e35423741aab5a7219be858cad7e01d9ad6d2c22b100eb9b8c

    SHA512

    73d5026e317a7a28860f566b1932e44248adf008a628d1a4e4c7ea0bc045276fbdcd8be32e052d107e171ce136ec3bae572b4952b27282b250b913f5b2d7f7dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ef24383ab8d29dc877d47e9a7a3018

    SHA1

    530bcff214e1b595c7beeba8110783aee5bd0705

    SHA256

    25c33f4a38c51a6051b91679fce0e67f4cbf34b3c6339409298f7e332e4d8894

    SHA512

    7ae68781ed279c50516f05e677fe53f736be3501674265b3c08395c6bad3849b207fe5461b4965e454e12048c09cfe5c90b08c1b468fba26c5e2562742234b46

  • C:\Users\Admin\AppData\Local\Temp\Cab2FF9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3069.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b