Resubmissions

01-09-2024 21:59

240901-1v95hstdqc 3

01-09-2024 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:58

General

  • Target

    Mod_1279012058_Modbase.xml

  • Size

    125B

  • MD5

    1730a6590edddd8d22b5ebd8f6f7e567

  • SHA1

    ed7dce07c2ad5331ab2d0afa04f9c7d1911d9c7c

  • SHA256

    7a760751495b6f05097899b894ee0592017c080b8e08902093071ed3efd42419

  • SHA512

    5db29a6c6985eff176f18e7893662539f673b193072a3ad628e055d332b7ea2737dc9b2d223635890e29036105ae690e90b1482fce7bfee0022330dbacf46216

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1279012058_Modbase.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad323e71a6f560725f925a58e61873b5

    SHA1

    87e4b59901ac6c15c3b5829f3ff4192267ea983a

    SHA256

    0d59ae66710b61b5f08f267e451c74534eaed4f8c0231de5a492541cad089c5e

    SHA512

    06a992c9be33d7a5c898875b7e2d7bcecc36e511cf9b2ad91810bdc21890c1ca6a20aa5605fe8106d427e9b3091e1c237ac10ffc3b4ef8bf9d07dcfe19e49929

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ac631d3a67a334671e262b3f3d4be34

    SHA1

    49f6a735c624299e1dc79b8330a11117d0b186fe

    SHA256

    fae5518e90f5c6821ac1939e02e31e9ef0325de57efdffb6862c61bbff2cca19

    SHA512

    ddfb18e926303274257019c1358ef08f7586b198bd90304499c658d0beaa4a26d6cde56c888852f0e6dd6d4238a6b93721ff9f1ea11a9c8684f848872903482f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea565ef8a309d9f1e45bc4dcaa499b3f

    SHA1

    4a1f36f6b88c19d09714f580241b07855b06b816

    SHA256

    e05ee95f8e20b831c688f94194624f114da057e5255d0d7d5254b02fe63ecde6

    SHA512

    654bedcff5b522ba2c84298a15ac7aa7848985ed05e347775b29138b5d377dfa5a390898f369e1495fae395a03d9f0209655bfd457547ebb742a76ad6bca5381

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2570d286d08dbafb2874a8ebcc3c879

    SHA1

    1df9f69a385484cc2cf4c9fa9a77eeeeaffef812

    SHA256

    304d4267647bed6dd450e9e1580377b81a2662b5cf35deff101deb2d3931e690

    SHA512

    56c8f3e2345811f11e45bc4226da2d7997660e9597f5997e7aa4db5a404c1953f22ebd63e830e130574b682e345f9746d4372ffb483b12424316a434ca974acc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94c371fb96f4d59e657f77ae65e7ca5e

    SHA1

    5dbb8415787c69188087ae33acc47428dfe04e36

    SHA256

    1d801f96b4cd1701fb4e988dead5dd9129291d820c1767f5d13eabfdec95d2d4

    SHA512

    4b54ba10d2253ddaf2df7ebe7bf64cfc070322d57e1deeb4994d4de0b4685a4de680b2962a5f0d736340d4e696eda3869491e26802dd6424d05581a918acc3f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7852702b279f33e71598b5130e9bc0e

    SHA1

    f6aab3c378b783090799ddad9e95d1f4bec578e1

    SHA256

    91625d4351188de09ac08cd27ec4dc2d537dcc760626ffd4a3a469c2b80e8c91

    SHA512

    11eee7899d0f2bce66f0ba70c57422b42232c8e8537ebcf71a29944ecb8adb694d0f5dfff39c2c7ded0a92b89d37f279cc0778246169d27d51bef275870fa139

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bafca013a628e694898e3fadb7eb55dc

    SHA1

    bb9c6b0d0f08c584941158f444a9725eb9d5e296

    SHA256

    55531e7c590ca3f5e857c0b50b92f78a12632a1b441c90e42572d325a1944861

    SHA512

    b727f15a19d253a905c5c8cbff4ff6e9d5cef5fca35ea86e4a2e3f9d2348273a067ab80dd4ef2f849d615569336c822d8a7cb337418d53df36277d051b3f5ba4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bd8dd973d9eb49cecbffac2570288f3

    SHA1

    800e184c4c2533dda1ad05853c9d246a56ec8477

    SHA256

    35988a3f4e203eb9d305777738d22342f35dffd1cb498c7be095226efd28b111

    SHA512

    2a16baa068a5a99496f9d7fae1d1ba12725ceb2b4e7320c5a397847b08da28a569658584ad2100514f6cdde074778278130457b29b05f9f0ca3430d5f561766c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed31de753a9ed26c1a9fc4abd7750cba

    SHA1

    2497688e24a070c4f7e698d1173461e159c55c22

    SHA256

    d353dd58297e5309a2a87e521bb8730a3d4e3bd5e8b024e7f29bcce43b8b93c5

    SHA512

    f5f9d94bf13b9cff88b1bd7d2488c6305298aca3eafddc96449797e2f9f3f24368fe455ce7f43f29deda14288ec24c39c07f1e0928941245d8adc11624e937ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21273d29fd2694eee63ea81dd9f59335

    SHA1

    6c3b036f072e599ea45b3b537d992370ee538b57

    SHA256

    2617df300db423e74d9d5b1c0ea52e775464dceea9bfe1eab8de158fd9140b01

    SHA512

    39c741fea638d0f8fd6a5a257ef5db16222a2aa81ae2c87f531ebd7d11f4d48a38b06e31633ac0dfabd4cd9c6f9b019cd662f140cb1f6e312776e99a93c329a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b4f753cb202a4ac5cfe5c560baedc6a

    SHA1

    9b79f63fc4d8b1e7c754c96f299c4ec9b9d993a8

    SHA256

    09d66cb8cae47a8cf2e6e026c7f5a941aa9e6749922e49105d5637d8cb2fff53

    SHA512

    854b891053331f770fc8625b801765a0332bcf406e164da2ab1f21325ad69e16dd6fce2777a62349e3af1529a6a647d15481654a296b764d795e08e2504f61fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a37a034bcea6d00ce044a1ccc8863f50

    SHA1

    88fa85bebbef1aa97a3d8abe7a7443a003824c15

    SHA256

    e81d60e9ce42c9200d5fac4d13593941fd8aff3f5976db1245b6b03364684132

    SHA512

    0f887ec0c20c3fcefbc42c455376eb34ec2b49a3d56842d482f5be616c97ca339d8a7bb827febe7f4bcfd0e21ca2bd9af8641e38cd76b8c97a29ae1cd17f2a99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f9f47b24846eb4cee476ab657336635

    SHA1

    e146652b936f949ffc5790bb671be724aee0d561

    SHA256

    da3a06be3b7271cec787183d843b1b4794eb31e00a0ecc752f2f01dab859b753

    SHA512

    0cd41909abb58e73ec80e8ec2983c2c5c640ffff134ecd9fe7c193c628cd31dff5711eb34213f0d7c6530c17e9b56a0573e6104262433e6342e08b43cc57f2df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09751341a103bb49e49a1435d9a72278

    SHA1

    0b7ef578e9bc785d4664022eb0308dc3203eb017

    SHA256

    ebdc12d3d9144fd568f376f02d772ad25857ef10797b5c3b8b36fa390ad7c712

    SHA512

    d469718179325a2bdc27bf4d7fa5d05bb42258cca46f8befed96657b2ace4a57fc4b8bb64d7fe08e658ba8087799d24f8b037409b30d933e1164a40566098f42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15227887b2f6922e0065fde8510cfa87

    SHA1

    484ec3beefdcf97b22fb431312edc1f2568d01b2

    SHA256

    51bce65f47544a28b2a3589058da5cdee7ed3644e8af6d338ca2087993588a29

    SHA512

    3766de550f950952efcd47253ddb49f4d3f453e8dd4eca18ca8cd69c61a20e80a8161bd806c4099c865ee6af622bf0b027ec87ab79f2bbda194fdd545343aad1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14a64aa160f85c748e28880d819aeb7f

    SHA1

    a3d456676555092a1b5cfb7d9944157c174da7fc

    SHA256

    899812e8b6e8fdaac59bdf6b2191267c7175ef4e2b13e7a1c120515e0213ecbf

    SHA512

    6c044124d791ed9d797a5a96ef486a2900eec2d1242ced1ec9a5dfa0440be48adfd7861dac0fa0bdc636cffd608751fab72adaffee0b39411804ec1deaf3af8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee75e1d3981e7219dea1818ba8a832b0

    SHA1

    d68565a0bac3a2d0ea2c3afce01b84bb7fa2d79e

    SHA256

    25c1a76bdd7db027edc735ae8e1ab3e4e6e9d902035b5385e7041ee13e5369cb

    SHA512

    4ed66e874eab6aa55d4d9b1b2cd2700414a883407c3a1a0430238352c7713348ce70c649a3c82996867bfe73356aa5ba86c73a110d5a153e8ef7e652fb87dd4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    110435dc40bf461c2e16a2a00d8452dd

    SHA1

    eaca79764840f45bc51b76e15d8f455a5551aaa9

    SHA256

    8042634ce785b84118baf0daa2452120c11842cca9dff2275cd9cd3ff35f0522

    SHA512

    f0e48628279b4d6fdc3cb617c23b5b9bb0a1a8ff593dfb10487e93fc80b489795f07b546bf34b7fa24d92bfa595ca528bf4f750ffd38475bdddee9edff1a2386

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ee40fe63ea66b27d031c48a1c073190

    SHA1

    e903c4ee19db607fc2f7cbbb47a3b79854063a6d

    SHA256

    5f16c4db3380b74cd4a0eff776857caef6b2832e36402dc7cc8cc5c770594ab7

    SHA512

    18083a9c38811c6b55a79c72a4beb641958a88abc97620027465aaff3cf363c9905b90d8255b13b41a83debd76f7cf87cb3b9a978b806be67d82e1d1f9cc880c

  • C:\Users\Admin\AppData\Local\Temp\CabBE05.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBEA4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b