Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    133s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1579516669_DubsPaintShopMod.xml

  • Size

    2KB

  • MD5

    fc6d4e918623bb399e17acba2f47144a

  • SHA1

    c046dd0bd44ccabb551a0baef4ad853d029648ee

  • SHA256

    895b28035d6bce26e876b60c08a0d6af05f9d381862632a9f3cd662881a0ab9c

  • SHA512

    a53d4dfeb4f625fc1305379de6d73066e563fa881551a98a0d73cea81d8b99b0069afef5426cd377520db058b1089c03c0a4e1b486ca0c5121b5e9191d726fd4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1579516669_DubsPaintShopMod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9ea53f4f9f0b510631943c1cb323921

    SHA1

    371754b8581c84073727f368ed90ae4bbd4fcccd

    SHA256

    6671b67c8780d79dd8e866d1f29fce55ceea0803d793a1179f58aac15fc35b46

    SHA512

    47ef1e3e81dca3bdbedc977f3c4014d1450fca06c36600d5d83fffe576d0f06434620b5d5a8fa6eb1c3b80786a1ecf1f55ae7114ee2a21ae98d91be1b5a53903

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb7807d709e4491f782739e9ad242925

    SHA1

    3650708b492a85accbc2a45934b3561a0f0bdc8d

    SHA256

    5efc857e085b12b2d28cdb2d40a3143803e11f074a86c81b20bbd2bcddd4fcef

    SHA512

    cb0d8ca6c12680fb8e2b5ed0e467c189ef5202ae6e3b0bf2d39ea282ade8ca00233406f87ab774c44a34d0b9cf48255e6d5e955628790a1aa9144b4608d1d2f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2de6b261602ef8db2327aa2177723d98

    SHA1

    2a134c3a62febb8fd9a30a8c5898513684c765de

    SHA256

    81d20ef1cdcb7c35340a21b6e066e496d5822cc8f573f8d35b2b75e3a6d76329

    SHA512

    145717b2f496fea0a676c5fb699c385032e840e03e0bd32e53854d360d2f029743acab44bf13112b241beb2d7dc4965fa038297c2ff1765dc7caecd0e79c8e1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1967ab0c649fe8919a2771664515512

    SHA1

    33c5533453572fbb42c3ac27b09aa9d70f4d33c4

    SHA256

    da1ce776978fa089ccb2e13e3dd0f530cd479aafde318a0c6c47b779d41fc516

    SHA512

    5a73c0292b3f23810bffea10c1cd2ff20bd69ec801b07466bcb326e58216b3b9f7765ec22e2058a43d174d70f286f171f09bb75f9e3f973f9b43e3a52a4056f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce2fbbb4c2d2b54973b5bd3ca1113bf0

    SHA1

    240d5aa541983794ef6cfcc94db4fc65704dc6e6

    SHA256

    a007d89574b0d08a84c01574c59615f0b883c0396cf4458eba306a4ddaa1e154

    SHA512

    5f00710feebe46c109ff05a1c07619a44446e3a73f0aa1cdc7fe0e4c9f98083a57e4c0d77fee0839cf16b4c9f011e2159891237094362edfdd93da966708db69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b9fe0ef86a712be17398f882b875270

    SHA1

    52f38a205ffecfefa79dce11e544ea4fd4e2f2c7

    SHA256

    9345b98883949ae60620d221fd65c54ca9161fa4b6145c04d966c791f103ed5b

    SHA512

    37f1a37bc29b969c6952d47d4ab5d50cd3048d96967095014e7b9d5f7da7ef473854ce93a8789498d1370daab670c7be3a90f813ec6bb2f2bc4c73d020cf6d62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9b5e06de6a6c68fe86667625428132e

    SHA1

    796ce0f4d5157e09575e0d90b3288935f4ed4eb4

    SHA256

    6f56b87340da9315d2402d71bd25ad8ac4422a1e747602270eba761e49e4b0d5

    SHA512

    ae02154a92519542758889d7bb71b64c425e5a4c5c2466e56d3c8fdb2a696e1e61623a188836d3e8f41ef97ec1d905018d7e43ee2c8ace92c3add18f038d65a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31fedf29ce05141ebee72f0d411f3252

    SHA1

    410143f8224b444396ca0d88b74566009487adab

    SHA256

    9d58ca7d9fbbcda70900e1c30a4c40610d9d8bc8f1269878f4999a88254af0d4

    SHA512

    5299b5f8dc3ec1dea4f04a8655f9f0f2d83dfc832fc35115418c1dc8b30c3502a8a03c44a857b5007ab9fae62dadab83ed738436b22ddd5ce1d46f6588496cb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    442a82fd217bce1625861d341ac45af9

    SHA1

    d994dcb880df60d0e2e48e464fe5f6eef8fa6bd1

    SHA256

    78700a6506a76205585cbd40d76d5da8e6d74954584c7877506d337535067699

    SHA512

    d6c7f18733311ea38567715022dec49ceb9d965237c8bea8673e5a5b8ab4bd608449f842e4a02f2c138634ff925a447ebb62ded0fa56180dd1a62d3a86fab9c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84a592b99e2ca34092d7052e139d7dc

    SHA1

    080db65a509941a1f5363aeba121fe337345d541

    SHA256

    711339f4e0206219a94a7133cce908239f660a3b8bcd268f24e5c600ded5c621

    SHA512

    7e8902e07717abd84e341dbcda1423950f709cb7d7ff9d1a8f3d451656e2077b258edc31b0e4d69cde1a71fa9db9d1d13b6e1296495dfcf356af2fc1ff069684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    312f43ae83787f1d334978bded3df716

    SHA1

    d46838bb34fd48d0626c964693998326dcd90fa1

    SHA256

    974a52e869f4f7f8df58f6004a2239022fa39bd644946cb64689eb8c276bf65c

    SHA512

    b240ff0fd4ecdf55492c963ec54f452879afcf7af1c4801fbd827b82ae8052a01d9bdc59889a61f877840b03f306888fd4581bea659e15bd695ba68ce3d9fd78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0287f6a4177ff032c3d8350e4f6b1610

    SHA1

    9d58b33ff27e0d6c892a21c943d801cfd4e77589

    SHA256

    6efe514d5ea05fb9205ca5e77d726cec7e90e1ae7db2840ada35b9b26191ecf2

    SHA512

    0d0ecce5fe7061dde3d7ab50c9b5d9b984561b08a8440604b95c89f69d499f4f5b59ec79dafacfd8dd0dd2e27aca4af5fd94f75445408ad57393a30975ca8993

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5dcdb34a60a47a7a15b67d11c83fa42

    SHA1

    ea9ed4fd129459fca17a65429e5b588d6d8e86b8

    SHA256

    7ac65b64c96d5bbc481d07af59c3621e033ec5c2237205749ee1640ccff23554

    SHA512

    dace0bb6854618d5988f1ad788f6e47ffc659095d7218b7714e51b870d82cfc67ba803c2ea7112263836c7224205e17dfcad24b0516d30f8ae61f1686a55269a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5e33f0aa2c2b3a3eedb78d886041a82

    SHA1

    2a9266c8e5cf5e0a93aaa75b2631071ee8f6bf59

    SHA256

    05e2af5d14c21d4917dadfda99696a1635ae412f754eb52807a7739d3eb4a4ff

    SHA512

    f7ed3f3a2f4e84c3c2b5c3e8ebeb5a1c861d7b31b94f8ec1328501b39bfa26f0c7faefec5c88e2769d9c2911454414222a9624ef3e0ee4a20112635f7177fbcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c293abdd28eb4974ada6ff576066722e

    SHA1

    ea14b8ecfb3869cdf23c2040e00ae5f57b220667

    SHA256

    7f07419613c993be87897b934acb48c1f4d99f0eaa5c77d4b9ba7872440eb33f

    SHA512

    0904b6c6e9f355a4e42e7c312b1fc38f7279a9705dd92c0bfec773e6994086c9ad5cf7a6694dfa3428e06c9c8bb8cc96651684f130bd593ae34e5480e255afcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    594792ebb430446c1992ec7624417da5

    SHA1

    65262b9e42513af82861436f1a25db1c177ec49e

    SHA256

    cf95f03657aaeb5e7dce388a52e38b338d6c99fbe8c8cc9faa95af628925d250

    SHA512

    d8b84c1dd612fd600b225d7110ec9d52f10bcf3c6b35fdc55ff058302b5f6f4c85b5e3da6854a3d951528fa32e76499f625e28bfa48f208d11037a5b0c7e05ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33de4ed3f0cfd268c6e51d847820a7d8

    SHA1

    5ae6639e3933d5710b005bf5e2a8a0a25804bb8e

    SHA256

    303e46e9f40caa9d9556f0805a2da628d0e61c00436a61025f5a9eeac347243b

    SHA512

    88105997e824aa27925383c7ee0a3a6c7ee4c108eb52f2e7b2b443c8e4530696932763cd3d4805beaec7adbe5c4f9f20bd5747e2b4b53d94fbf9eb88eca07c67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d3ff5bb1425f8e8973875a0e8b36b45

    SHA1

    37dfd0d2ea7df8cabadbc16ff7ad51a54d176449

    SHA256

    ceb4e698874eec697aa665c90eaf22f669f7cec959d1925c38f13914e544f14b

    SHA512

    e2bd2c71ea68827e15a8b0a89b302319f26d4bd33b1a35f99d664744f7575184aafdc7836130386b9f8d3c046ac210418d8ff9c3f2667e166b696670dc379dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bf3baffd1a35429cb256d8a632a26c0

    SHA1

    96e04a11b446eb209388fa70e0280b135663c8b4

    SHA256

    3d7d6dba2cab29c3b14fb41d50a07353047bfa59293d9192c8af3e9d39de55b1

    SHA512

    720fd3532e6f872d5158f37bb484a369452120cebf772a6973b0a8db0adb939d1746a7f41c2f352fd739b461bdf2db3d67382d04673fe09d67100ddaabbdc362

  • C:\Users\Admin\AppData\Local\Temp\CabFB53.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFC20.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b