Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 05:07

General

  • Target

    b5fde99f658f251dd589dc48c1ac04e2d3c2809bced2c157cff13ae3ca259b41.xml

  • Size

    303B

  • MD5

    bce8481d189ee5043cd5c44357ff5be9

  • SHA1

    0f2db9d0e4e21de252d3c2f5d3ff9d256c6ad2d5

  • SHA256

    b5fde99f658f251dd589dc48c1ac04e2d3c2809bced2c157cff13ae3ca259b41

  • SHA512

    4cef4eea5dae7e25efa3dc08386037436acd2422eea3ce3feb9ff649411114bd60e57e959a4ac732bef19af50dd41c55e137c9bcf0bcfea0b184f09fe8b129d8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\b5fde99f658f251dd589dc48c1ac04e2d3c2809bced2c157cff13ae3ca259b41.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4d1353f18d995dab9ad0a8813641cca

    SHA1

    d8e40f957c0f0588dd60b2597866cacfc5389e72

    SHA256

    5d91e2f02e9816182289fd73f7ee7393a28244554bb757a5a5c1ee0c42e3a525

    SHA512

    385abeffdae46c4483f007191c7f5417c195f586de376ef3e74e7983a1c9b0c0addfa76c051da9990915c7f2b1bb7ab6ab71f21022316b58ea8d3f4edf5e3840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5aa7826d68fb6c66237e988954203a4c

    SHA1

    c48e0a86684fe771265b99921e4e422aebd0ec56

    SHA256

    10ac51a86219b7cbaa423a148d2f89fd0a0e9a69ddf8da25c33b8553de08b0d7

    SHA512

    cc61a3dcf987484f171c86c25fa2731d53696a580c4cdf4e3523f2db974ebdba1f833423995baae57f83739acd36381b94d221fd072205a39ea8637ef0552c96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56aa1a4bb8e9d0cbdaabe5d0b1a316df

    SHA1

    b80d79363b0c0145763af2f1075a2267bb093029

    SHA256

    8e6e64dce98351ea7d4695273fc78686beda4102da427242374aa54f2d8c95a1

    SHA512

    b777cdeb43692ee7b82f7dcfa05b35e96f620d9540aab82dad7fa2772a40d1ad0223de7c7022bf42b38b2e68c0a33178312bb4bc9f090bfa78666ea5b1b916f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aec0d1865c1cf9c49e497ed1a254b053

    SHA1

    1773a9782318417f9e8ebc3d4c8934f2a0efba5c

    SHA256

    c4a7ccbcf69adfaf4c358290b4e5c39d978dae0190c2cc7b2c24eeb04fdf9a79

    SHA512

    d3d130cc8c079d1c940442234fb8bab6d2af4feb0429c82d1bc042f6b031179a7f9041e761e88fe411c26b94ca5419948e360eb78305d6305110f7abd2471bb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f054f9cddc8b7329cf0fd2034387aae3

    SHA1

    f49fc57d1ae847c9cbee368d8cbefbfa79a87045

    SHA256

    994e6ebc476f69535940594036d8981c7fe7f806ac91eb1e31507083559db4e6

    SHA512

    c3fda11288b45e1edee60c6e0e1fdb265ef403df73dbfc63eea6e98069737f21cdad199f378b9bcf427400f960982c8fe5b70ea5224ed2ec61615258d624a57e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f6c24e680c099736bfdc177449de6ac

    SHA1

    7a50d3b92f21437b772f24d498846c0059a88542

    SHA256

    c5a4f52762787e4a05aff881a5cae7cd8e7d9d8c928e149a6c57ec33b30df7cc

    SHA512

    25340f1c0b62549c2b0970d5706a9c65590c71362b98199f4742d776e2393a8675caa9d67c4eb323a70e03615f65f9ee6133d2ff361d6c5f89f9961a603f89d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2118d848e1d3b550cef1e0d69fbb2c7

    SHA1

    677b1fb449862ad885c66d8bae940188b48aae57

    SHA256

    29aff1dc0031a3781ec494ced644c8a293dfb3df760219d0ce89e68b3ee1d919

    SHA512

    954e8677838619847fdab9df49cacd7fff364c28460cc3dabb9b8285fb081c4e9f58c9d55389443ab5eabdbf3bc156f59e162e537d5a6f101fdb8941f212357d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13e1227c8d39d49dce2f82668e7733e7

    SHA1

    e28d5a43726883c4378974eedd7aa202e030941e

    SHA256

    8ab6b1f446a03ed22709f471bc9df75507d1041a9be6f6e00936c5134dea2178

    SHA512

    b3fea123a25b177d51c6b10833b02bbfe62bfb73772a118789c188c10bd487528c4ba1585bed340a0ca9c028071b2faa80a9ecd14ccbfd0bd26ff5b618815114

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69adae99bdb75223508d98284868ea08

    SHA1

    ca9bfa0b489e26935e80d4064e2b31836729421a

    SHA256

    6ca9aeb79fce941ce331cb384431f5fc2e9b65f067d5e49a11dd457805b8d752

    SHA512

    cd2515b77577187f3f53b5854987804ecc639e51946eba20d05a18b4724b5e4e4cd6f921fba4bf281a1af59f84e4e0537d51eaf0252c19359241a09fcdf6c5ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0946b7d29a2123c310f04599d90c735e

    SHA1

    3f71507b90bb838b36e3e381b1c9314a78fcf236

    SHA256

    e78c07e1b37b02eabd89ff97c3cd31f1cfab5528d4577c7ae2d37732074940b4

    SHA512

    8a25d20e2ed6c078c27cfb10dea636bb0715d631d24c8c0b5538b8ea28629b15212d6d950f3dbffe431b2c24fa3e750f9303200ad32494862870e012d2256e06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f252719490b09071c95b048d642d7ac3

    SHA1

    e5585897ff3defb5af2ebdee74a2309a5964dd7d

    SHA256

    5584eccee792fc09996d07d70cfae716b7ee77a67ae2bf55374b4cdeff0e06c9

    SHA512

    c8371f74592c82c2508a9fccb3e753e9f189aa5c80bb363e7b0e0458494508eb71fa78a05a8d61d1f034483f2de02a3724be5f517bf5507d5122e333e813862d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df452e964970e0181f29b9e3d80b69b2

    SHA1

    1629b273c0fa87eaedd0bda95ef4de77bd9102c2

    SHA256

    6f5da6c117526b7b728bdb4283145717685182dec4886dae715cac67329dd783

    SHA512

    6bd2c8c05074a5bf4527ad5373b17f533973f5898eb90ced8899b64d1a3973d1c6a15d25f4caa2bf7641cf35c17a02174e8b6b27b9acc1d2df17a9c9fa69b75e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad71cce64154388dbde98f4431af2767

    SHA1

    b7847c0f026af69b4d1bf65f85465cef601ec480

    SHA256

    9f3ef5ea51b812b06cfd880c554aa2d3c51f9d4459c0958ee6c666771d929aba

    SHA512

    0488450cef9b18b34ae4dfae1b9fdd13c71d39803ef94a7190b1cd3c629b1e9ff963c90c2c3c69acbe64cfb2c8490d0e33d952f53bb533e72be04add0836c837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    472ab85e7bfaf61639500bd169d4a81d

    SHA1

    87d22ecb9556fe0a08374f88e193a8b62f69a31b

    SHA256

    bcc17b85464ca408b1f51e2173a29ea4b8a5e411923c15de279955c86acf1fea

    SHA512

    afaa716ad15e10a5af1969263de9277a1cf08ee20c7d2e04a33bf9c327e2082f58405e55128ec7dafbca1f0d0d1c8547b5a8d964e46f314bad5b67f9a1c579a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cde528fbc19272778647d67725da059

    SHA1

    742e6ee09c90f0375684be093d7db99cc4179356

    SHA256

    ccf18b7f4dc9d4f119febf37c3c1c2c1f0cfcab2b9ecefd788e4378dfe309b4e

    SHA512

    3060f28c2dbbe50f098a96bd4dd3fffd3e40c5347c12fa574e153d414e2c67fdceffbb2ba11c08c4e225d58a07c85f99fd765916de0055fd33ebd41623029235

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58246291b432e9dbc317a0077c988e03

    SHA1

    2bacb6747b9f1a355d78cf0662329ede9a333624

    SHA256

    64f07da5c3e8fc3b162a62bfdcb9cf051e7faeea435e03d578e630b9b4fe82ca

    SHA512

    d1b4e763e619c5966c8f30b49736450c43d191c2872de11f790bfce666d2ab6c9e1d8040755530d6a27cb263ad4b1a9d87f5cca6cdcd8f0956d925a6b695ff81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7d0cf2232343ae32e51bcfad8c759d6

    SHA1

    d276a1b7a965f5e7d826c9e95ae1e411e7a3cc13

    SHA256

    7f991c0ad33e3f15fad2110efc1f856826aca695f7d581ee42acfa6130bf9ed2

    SHA512

    6faf36bf9fff4a9d37883a0f637050de532035ec2e6f504d0ad173e7f6f389cdbb9c6e86a1aaff8a37f9a4ca4e3691121ed6e88c7b807a29b5d0e6ab715d6e68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0297dc4325cf836148dee85ecbd9afef

    SHA1

    25108dd51572b3ddb57ffee58d5dcde7f96e4f5a

    SHA256

    5c5c26d4708bd05c22d2b6d8c52b04f5ca0ff4affb1359a1bf75dbb698c23463

    SHA512

    c070e4eb2874e8170349cee04545b4aa7d8b5eb5284279d99b9533b04a51fd5f8f8a2e664efaa43e3f2ec6d4155699f79c4ab0b7d0f5e6b10e3cc011dcba4519

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f48f11f9f6514f1cb6f5b705e7ad1a1a

    SHA1

    2bff445eada3e1f6fb55bd7dc08243c823bf6384

    SHA256

    6a825ccfff4cc7b08503f85dedeb23116d4600dbb7e807466d9e249b52f0fe6c

    SHA512

    1055012d24fa379074c92276abfd4abe8d2df1951fba9279c0166d53cec7514a07b7be609e5dcc47fa11a556188599d05586a6c0c1670e10a35e5a3e11c31db6

  • C:\Users\Admin\AppData\Local\Temp\Cab3C58.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3CC8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b