Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    67s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1668983184_RimThemes.xml

  • Size

    615B

  • MD5

    d434d7e552b0b36b02b27d1d4e1455d7

  • SHA1

    a613014460a27d10c923e5c1cb4c0bbec6d463b3

  • SHA256

    fe98c91cd08bef2feb2711f12aeb626d86a00615d2d29e5f738f8618ab1b39f3

  • SHA512

    75fc90945c5a55d85d6b4d34a08749e34a3f7f5a58b674d1babfce416345a98f60c8be20aa6e15f0526e20e3884768c02985b5fb12c39087ff87e48385c5f07a

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1668983184_RimThemes.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dea78df25c357d6230ede7047db807a1

    SHA1

    3baf1134349383ba90c42f1705548dd2d38c7f92

    SHA256

    0a03771a931a1b16d96dde09a678ab0c97b58e51e1f34456043e0f87e0eca999

    SHA512

    45adab17a8fc225aa2a2e4e9b436da5c5527e985f6ab5334117873b613595c06d664c2b1bb8c85955ddb311382c8727f0fa2106ad700460eae4a48e9a875dd1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce40485885295b958a549331ff4e0c5b

    SHA1

    f207ab83d23c17a20c3005abfc4a1608f8482139

    SHA256

    e42baff993c3d5bccf43b9dcac464ecc20b4f0565a5c5b651c199d54c2e7d6b8

    SHA512

    c6b83055820e19800f9f0000b4ae891f41bef77ca6534fdc117aadbdc8e96f4fc01b769c0cffa74b4076eddf44b16fc592e35eac313bed0127e68e1afa999ecf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9af5459fa01af685c5505771f04c9256

    SHA1

    39046fc1f224322ded4fc56d1b6489a262fe08a7

    SHA256

    bef95f263476ab852f82d78887827a0e2384a3d64b923f99601f9353abcdc0ff

    SHA512

    59301369458de575e8b8dd630c6419b59b2bc99a0285806f8a2faeef0e33b0248e4b47659d1e9feb7e12d6c1b4166feba121913dba4d71929c69b5e06d7fb6e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8071e0fe2d9ab7c4bcbc958720a5758b

    SHA1

    b9b024eb302e69b239984fe995111c0b7bf425e5

    SHA256

    bc82689bdaa29839f2fafdd2d2fef10b552f50fbc939fddf8697681c22adb745

    SHA512

    cde3bccae3cf892dcb97e9f9d4de65d55ac4ad9f88a50086829f75326360d8159d8df304fc4f5ac39db588cc642cf71e5107bd215992f6e88f97bfea2c786776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d60952ba9c0354dd6730f898227a9b5d

    SHA1

    bbcd2c988e3918fdbf3e41ea7cec80319f8a7e40

    SHA256

    851dbae54b10f2ba51c2f4886070947dd5dfef6c3568899d61f8cb0700f0ecdf

    SHA512

    e35aef6dc1f4da320990062d65fd91c9f80f7c3462507e01da97760a4f2941a7d57a12c222678651991bd72776b99009a9044f0438eb462577b1553818ac8b68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    254335336115b3353babd6e5ef12c74b

    SHA1

    79bb4ba7bce651c6d6974c45ad43955657a866c3

    SHA256

    fd994781804cb2e99230cb0063da7a36d19ede7858d7d68fda77db8427b43994

    SHA512

    7545911a3d83497cd85ba2099fc0f00bf154f241346576d4506684fd1cd295c8624513999a945876112949f0a9ef7a565952483726b5b36f43ce165dc0e6097a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc28f0ae16e2145f6ac38a08348ddf11

    SHA1

    bc7ee50bf47bbc42e0d03f7b6f2e1898a723e837

    SHA256

    8de82d658d0611f1aa6dffd1e77954194937dd612cf127c950f7802611bbb6dd

    SHA512

    d2df306f95be6403a814a91c9031fe3517c68fad9c3eed125e0bc629094482fc73e3140c8792e3d74b74fb1b6a61c34783ef67ef166706ac07a499b3910ccf89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c1178e2b9ac04bef357ebc40ef39d79

    SHA1

    2447e0e52e2eadd9a0ff91e079eac78ffae3a5e6

    SHA256

    e4e796e882d4773b814b02bf5afaa791bf87dc5f5aba3101af69aaaa9c8e9d99

    SHA512

    fb0f8f00175a1e31d00c7b1485c1de8f9543e5e2fa4076dd5dd2d6f929e1888db111c4380836d8d9babb12eb7b7154ea0ddc206b1038fb56c4fa267a726a9c9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd629b3b4e3858382634effb1877fff6

    SHA1

    d2c4e901d4301f99c530b6668fa2e328278092b6

    SHA256

    6f8c94ebe3e47beec18999cb1ccde700971400ed1cd2ea458713718f3c873614

    SHA512

    cb169e0713e635fbe909202d99f94672afa1f85cd23700f9ff8d62d2eb7932a481658bc249202533a3c4d2209b504dd602778eca39026eabb0c2966aa6d7001c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56ce566e78c24e8a4eec3c5f0ee588b5

    SHA1

    11a236b07b73cbb6797c9fd155c2482e45c0fef4

    SHA256

    d12e48b1f16bf9881e4e9cbb461ee855f1b93ff7e5c11294f4ef0abcc66c00e6

    SHA512

    48c0241b8332837b29412458aca3b709993a2e2b88b5d05b1d66f454ff26d12192cf617ec8a3ac4e622445b7129c423a69b82cf9ec2594c04d010846384047d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8e24f263531f84de5fb8e75466c177e

    SHA1

    b1bb7d72ed9427c158a75eeb8707e27541184e71

    SHA256

    d8e65769aa7f8f307360f34234311d39ac69f065bece98101f3552a373dec8a7

    SHA512

    c91fb1a24a7c1724cac3bebedeab9b57dfda122f7c7dcf8dbfac07cb330df9675bb47c52b4d2df9386ed6b28f45b52bd51415f055b41b472502c1cc42e6fae0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8aea381b6e0a4f019612db1fc41aa7bb

    SHA1

    acc68a41f5d5d78f01a1537a2bb5dd360bd0be36

    SHA256

    cdf7875e337ded5bd5dc0e743695d3d392eb3e19d2ba33483830751f6218973e

    SHA512

    ccf339cceb7d69a1ec7f92a398347168bd657c6557a6582c722a441c10687b3758f1bfcf4b7399fc4c4c36be0a912b027c9795f203318f7186f711ca1d612efa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fad586b14aed07183ccbf94997045e3

    SHA1

    e7fa1677dc30e0b9ff36f16e8695327b56e8ce48

    SHA256

    55bb90847c5eb79f15f0c94b5f3067803bac057bacbe8229c9498ad09193e71f

    SHA512

    b9651950d3acb4527f372055f46b55d76bd9ebbee531e91303fa09981891608929f93075ece6be53bf44b87dd3831339abea7a95ef9defedb45d1d875450aa38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e33f1b30723dbdb27cf548807f776915

    SHA1

    572f9621f452a7ed6a8fba5a5c083cc382f0bcc1

    SHA256

    ac323b282dbbede4ce47ac910e0d5295705d13c01ad715707e93d139bd3320b4

    SHA512

    576d3b4d8bb9481eefcdedcfd8e51eff3314a14e92d864f83caa26e33fbabbc34eed7bacceeb8ccd4c11f8ef48adc4c43fed4c80fadd26408e102b177e1a7285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e002dcac9c697fec1066ba57a1902a0d

    SHA1

    c6b74365b51a68715ec226192498dff133192270

    SHA256

    29f0854c0df6eb7b6af7f90f2ab7474352f06e91428aa15e327d2c0e76732e06

    SHA512

    7c00fef9b8e4bcf1f80862edc3f88249890382e04d5f826890c5e4c6562abf880f2a65a7dcd801b78f57d8a5bf85f057bec596effc5d4bb070968d607e9aae51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6516f17003a9f1414e3aa0a9b7dc3c31

    SHA1

    359347b3bd18aab0d36f094c17030eb56aa7ba96

    SHA256

    0a8983452d057563e6ada98e5aa859e2c380ba8d7d58a7425bd9e5ad6fd2f689

    SHA512

    e55b658273705ad1130e82fdea9b8ea544f4102b473074554ea52153b8c14e91642ec099df41585517aa8d06b13a42c15d623b9edcd644d7f3894a4094c9607c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f5b6fea9289f62563295146e06ff149

    SHA1

    7fe7f79a5a7921cb3904b28c0f65f90f9cd2eb75

    SHA256

    ffff7275b16df5016bc78207a0cc7805026ef242839a3a794442a522529c7110

    SHA512

    664b378167709390142983355c18352d1f8e42cede8f122f7ad9370b06a321355b717da0d6e441bc86e6ff00df7d5a4b26a3203be0bea6348d0c78f668e8e965

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfdfe5abdd2ba1a320a8abc9fe5d70af

    SHA1

    cd8094cf25cefe10bb4a307a8ee2ab13354ca235

    SHA256

    207628a0c71833151d87f54627426e451d19c684861dd6b7158757a310b7e8c1

    SHA512

    9550d2aaace7790816f8e43510e519d921a650571f63792ec70ddb366e723978590f208c44ad699c3d8604ea72b5f058eb92e192fa9029cb84fdf7ef3185c0ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    446614c0bd563f964c3c3f0cb7e9ff4f

    SHA1

    dc35476f1f6d6a9ddcd74b393e044a45a299c1a5

    SHA256

    76a9cbcf2821ea78ac746598b67cf1924bb0ea4060391c6bc38a389e439e53ce

    SHA512

    46422c5f0318878cf26b4483e95d6e1ef5a98273e85db2699762ec656b50ab7b72ea8fb93f0b2d5ca852b47c90d62e41f04e72335d29e068672b4ac0645dc612

  • C:\Users\Admin\AppData\Local\Temp\CabB904.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB9B4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b