Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1084452457_QOLMod.xml

  • Size

    4KB

  • MD5

    daeb9f6b1e0eb57e8d474ec598a18717

  • SHA1

    81e057decc05975e4c484cc3f9ddec577089a056

  • SHA256

    b8f70ef2b9411e58ac39121664ac1b6c49aec2a2922576eb47984a9b64c9e1ea

  • SHA512

    3b4090443c3e8038a9a84dba109e5c2dd4e110307a18fa10bc6ee6434599da5df06174be5ba96ea45694beaf1f2900e16cbb90850020eb54b44f02917a796b3d

  • SSDEEP

    96:+brxiQFbrxOFbrx8FbrxtgHxtsWUrpbUufxl46EJupbUufxYbEVupbUufxtKGE0j:+brLbrebr8brAH0lYuf3HYufQYufimuk

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1084452457_QOLMod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faec44fbaddf34baa2109b77d64cdb06

    SHA1

    a794d1d04ccb43c88b2e58916e891ffedb668b3d

    SHA256

    4acdd5efd0335b448d01a15edb9cff790e45a736124f2b25dd0723a68b72203d

    SHA512

    bb0ce67127fee5b1f993223d7b578e4d3ed27755564a3750b356d01c5bd9802abf0750828bd8c538f6d6bf1fae6248e7452b710a3e2cf77c595e957a898682ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81072dfaef2cace29149b6193e870362

    SHA1

    ec065fd2bb536a32a646cb1ee9d1265bd1c89177

    SHA256

    053eb2261f23942c7e946c18e22396fc57496d92e7c35531d7b439e8b4ae3253

    SHA512

    9b1653a6f4c649d78082be2fab5123c2d191ccff82588ca744f6f6d91b20ec017647fc02f7b28b61833f1f2f6e34c97926a8767ea876fed93f0dbecaf8368127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9b865b6989d53b88f271fbe1cb8c7d3

    SHA1

    c0991684f597bee2d51cb793247de2523aa7610d

    SHA256

    3c4262176b650d13ce81ce52d66c9f686b717215e6fc635640de45be40f1faa5

    SHA512

    6815a45cb1b30977f8f079891d0c28907928ba7d2342689d3b46804195db62920c1ecb89228668fadde951d2de223dd96d710d05ed2317829740805305829ebe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    713488212a5472844a36db50956715c5

    SHA1

    9ef51929daea5c6d572d821f1aa561f2a190b4db

    SHA256

    315283486f8de6021f21f63e50586e8e8361fcc894c49b111403eea3a3144c32

    SHA512

    3e546a67cbf95158da0c65cdc6d9d497c11695efb51f9f3ba9f3254a7c7e8db742eee0893a56103ae69889b35a63e9741742672d639f796205331383ba9d5067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5eb149a1808bfba0a228265ebb167c6a

    SHA1

    828e04c22ee291ea02257e1aaf6b145697b89534

    SHA256

    9aaffaf1fe4399274260f4ba9fede6badd1ee087cc765bfc43d83882956842c2

    SHA512

    03950074afd3b45903d745bb0ec16a2c586602353cf51750fbf32e4e2b961a4e031ba4c30a2e0a377ace6653a9e52b96f2659409e360c23f8c4b2d5e12a6e2fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bac828621e0e5cf58e80e7f608d44e0

    SHA1

    1d89fc0ccdfb201e2b4b0fea5dab96211982ab48

    SHA256

    0763c04c6892cf273b3a064d9268e622a13c073dae7559ddd0b63ff7b45680b6

    SHA512

    ddae45dd738d5aaa9d3da22209710385da0a4d2996eba47a6ee3e786202c289d90fa7a1dd1c5fdee243623cbb71feb508ac5e16da271c3d545fbe4db0c80a68f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86e729fa04e6ebc1ab323cd8c6d462d6

    SHA1

    afe6d8096c5f23401705d440a73803c470018ec6

    SHA256

    b7c22cd6d43f3a06623f51b2487cc6c1ed2a6975916923ead1b0735973327b11

    SHA512

    ee036d5a29fa6aece2382ac9570f2ffa9a71f98dab457804ffc1aa3b915ffd63e1d63b25f89f68762adb5a346862b7c93877699bcecdaa25d152514eeb4688bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6caf1a0fdf11e746f39177f97ba7fc9

    SHA1

    9d55741b147a520cdbb20401b970490855366f14

    SHA256

    06e7ebbb85e76533b4b330519ef9549b1a9cc9b5fad2debcadd05c07a34e4dbe

    SHA512

    d752687e21e6bfc68213d47aca6becfebf13423ec4ab25f4ecaa42f751f97f12a2fbac5f0dd4d2ce5b7d1b979f25594f3d217c73bffc0f6afb40be97bb4d5c0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c4c79f54344ed602d1f6fb71d896d97

    SHA1

    8490a44983d98c16ac465c673bf9ccd3cc466e58

    SHA256

    6fb2cecd26af1b53a532f0017e07a6c19ad020287118f731c95ca4074e360d90

    SHA512

    1256d2038e59bde8c0f30a5072f5a8ad1ef2c5795769a7f7583d26b8238ca3a80ce8cd4abba29af4d21f2bb357d7bfda80a8d493a5ee9732dcf9ce861bad4d16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30300cdafab680762dbbf600215148bc

    SHA1

    b3ab8eff50957046fc717df89864fd68e607891d

    SHA256

    d056d3ade04acaa842a6e28ac2a20c6bd3e08ef0df2c967079f68a98f2fed2a2

    SHA512

    f0abb4651143b4ebcd525b1ce752fede3171a656e4a6cabbfca297bedc86878f218db421d7d2884611a0cedaae25e59095ae922376931eb05bc2487f8777f67e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71c2c5e20dab7bff8968fd98c8678d7e

    SHA1

    9484c451a9aeac2bd4af74483b62dd195a866422

    SHA256

    83b04a847272718eb200018c3922b631f82b16da6ed1b6ee2c321815b1152fec

    SHA512

    b4117d9b1a3a14f76ffc92c34c0afa3f58a34d3b0096563a54a9c8ed6f3aeb9c0560312c4908dd566b09ad1f46a4b3ab09604337d5c21343d4158ca361c0e75b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    628fba85cb0c2551a273008e303aa59b

    SHA1

    b8b7781140c7fc11bdf6f9096a3df3029b673d5e

    SHA256

    0bd7051ef912a7bb3320409531ba4e35b7ba99806d8f958b54a65d42dc399884

    SHA512

    53c9e4ff988ac578ab3c8404fe4e73e001eeeb019d677e4b0b3587f5b449121c5b727338ce2fbc681a046c474feedb64ba33f81b86814285ab921a4a564f6aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6d99b95f31f787d5bc856b1411c8fe5

    SHA1

    f018ab51d7eb489c64d0329448b41199a0c5bd3c

    SHA256

    c075a9302d7274b7f4ca084f1b4bfe9dc4b457c6600040fb3876bd2f3281ddbb

    SHA512

    2011a6def25cc4936f53373b673e1eb6f4c5a990e1ffcd465d4c78b473d730bc56f7e11f5125f56214c76b779274dbffd676cade640ee3c88799d07230094269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0ef53c817daebbe85ab215060a828ad

    SHA1

    db2499de3abbdff576c1379549b26c084b74e8b5

    SHA256

    67080f9aa6935ebb2830667d601ed28148e1de2835e10474e64339a4e5e3f865

    SHA512

    556589a270ea2b994734b215d1ab9a1c32ed652adf9a48baea77f03edd67ece44425a32b46d91def6ceef3a17c3ccc248c04f6dc29fe30b971881e8ed0a86d41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9a449adbff2c8e218c9293f47dca5af

    SHA1

    918c8010eaa5312062a222626c65d793784994b8

    SHA256

    27018e49c30ff5fdec2af791684fd0497cb4c6c06b788828d9b531c8b27c910b

    SHA512

    3e0df8ab7abac62bec30cc583b5860ba5973353b757ddc0020a9d2bfb4cfb08464b9cddb08c31f45dc7e095e8f31d2eb80235b902a0d8ff9670d44a23f9e80a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b7583e2022ed7f9b60d28d9d97d8b89

    SHA1

    18ba84c19fec83287fd7166acc8e36564c355295

    SHA256

    8f2f6e1340d5d03f4067c35596acf6440bdecfb17f6cb72502011e7e272f0fd2

    SHA512

    ed31597801dc7d844a49bbe4529f5d27948a708f8338d6af3edbb6abeb9054e774db9244b1328b38c2909fb4045ccf57ad121c374568f795c5754478a96dfdc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f6188587a71ca82353f8b3382f90afb

    SHA1

    a2b9d83aa71984ed1bf098d40e751bdefaec37a6

    SHA256

    f324940effffc8ab4ed53712fb584236d5c2f6b9e71a667f659ae1c177c9a6f9

    SHA512

    653a03457494cdba8aa8f84841896aeeebaaa249e44f42ac4d725ce8de9405c9ae28cd19c37704130647fbe9a1866ba467a52826960392fc2d17cb153509f774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e0070d6b13ac6cfff8d68d010a417a0

    SHA1

    44f1cace845efa6c7266c573f82abee49e6c1e25

    SHA256

    1d1ee1bf32fd53ffe42fcc38224bc608232ed5597919c4b2f6c7a1f713e66067

    SHA512

    87cc38cf95467256734b754a2ebd49f1b3611850acb3dc58accfaf492b118fce519832c200984be69ea24d48810b7e0fccfb5d40886fb5e9d47b85b99d7594bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f2748a000891a23e08c8d40b67e43c4

    SHA1

    93cc62fd23e7e38bff124bb9856938b2f45abc8e

    SHA256

    1cc7a68ba08d1725ce4ca8da679ad12f570f3acbca04d11c6050b1b1068f9739

    SHA512

    04607e404b750faa4e401bdefb0d516143a87e19afdc398a4ad2cf5771a8566b37d03f42f60158fe2e7a081c68f9fc44c609d67c6d520e2fd225c41081108cdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    057313f90dda4d60b104d6c2e9675f9a

    SHA1

    cc48ef3d0e57eea5863585a5a8d729c3b629993b

    SHA256

    9391fd60558690f2ee168939475d0a8232995509447cd40bb1d852060aab84dd

    SHA512

    fa315d80c189f0cb4a0ca9e293493289aa2ea179ee0950ff3a4841c5a120df06cea1aa48392cca2fcf5770e8b7dfa1c9f0214b465a5583212e215b07771d79f9

  • C:\Users\Admin\AppData\Local\Temp\Cab9A40.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9AFE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b