Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 19:40

General

  • Target

    Rebel/System.CodeDom.xml

  • Size

    366KB

  • MD5

    91af6294c77371e6773c35cfa7edd068

  • SHA1

    0c24bfafb91ab69a3a7a4bfbd15a9c346341c487

  • SHA256

    92287105a0987fc6ea2404e799da13f2d57b228a1fa3039a6d0cded00d4344c5

  • SHA512

    bdfb5c13ee54b88d029bae6a65f932bcf27b1d71a5c373325b2e7484d21d49745c2f3983da85d50aeb6e31febbf0bfcb3cbe46415bae15877c20d54522b65904

  • SSDEEP

    1536:l2e3vRrYxV4Tm0/Y/LFC9YmXVT2Y3mBhuzRKqn/gCOIFnffP6Ks5ATTglg2PLaAR:lK+c9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Rebel\System.CodeDom.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    335144693a465bd84a1a70e36b1b207a

    SHA1

    a85d5e49445ffa38d5691336287baf643d006345

    SHA256

    2847ce53c06ab3c9a7bbe401f1478c3a6ed8d4aefd0127f3453db4db9333d735

    SHA512

    73f936adf92b44be6c190364d90f5d6b3c5ab3f368d67d796c5900e6ca5c5bf6d5a4ff9ad0641d3e8c4d8688715686d96a9c4c6668b21d31e88e93184a699949

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f2ef8c0bd41396e623592aaa7f3927c

    SHA1

    45b7a6460837ad1b10b4caa45b5a42363b9a53a9

    SHA256

    be0761ec444f79f80854c8ef48d5b79eeefc98f7fde87c8704d2711c6a3ececf

    SHA512

    72fe6fee6ac84b766a179f0b7f9bad6d906fce5bb0cc378338cac0864cb7184de3eca91badb6abd492d609045a2d457d41d98781bc78ff5b03950a1d3f9efd4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6f6b77a56b786c287e3b58730026b3e

    SHA1

    8c8fcaac698b0efdef2302bd209c511872a84809

    SHA256

    1635510f11c4529376a39e2350b426a201363234295aa29b45a5bef111c1b473

    SHA512

    606b5b3542a1c81a06267b31d7fe921e010277a98728d43adc9d8729f005919b2c391773c9908c5ddee5a6f86bc87b7a1b8aa889ceb1f58d76b0dc9de107dc57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b53a8e627d97fc2e3e8c44e4f340bc77

    SHA1

    6ea1e2a5980c96ce8d798f43832c93294ee98aef

    SHA256

    4a018536ba2c7fbe2f013d15c886d636fceb56bec465a00491f2848365af0819

    SHA512

    d29460ee36f5061a6bbdd056a765bfedaf4b5cbc26df0928a5f0f993484279d8cd0b7f9ff0d95a2d448ad0c2da2ed9390119b70667c77a101170cb0a90a09baf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e60f828483b6e7206a498eb00549958

    SHA1

    9fb0ba647b689668141584917e6ac7d77b0be4ee

    SHA256

    eb8cc0aeb28591b8d2a11e416164ac0d10754a74a573348833b7f4289792fedf

    SHA512

    d8197c3fa7a57a32f87fae104042c5d5dfcf309f5a6fdbc8217a5f99d357c6c1bb04db9bd84e89f67c337299c1f562227a870e0ed596bd5c59204b7383de5877

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    824b4bd10e3d09f7205cf9c75c8e9757

    SHA1

    26cc1a2ecb5001eb51ffff2ffde458a34972df46

    SHA256

    368c6686b53477ca4f90008596bc1ccda817d536b2ddd240150351abbea89193

    SHA512

    dea606481d9ce368388db667cf2ec9a5d7e68f9bd92835df8e8e67c5e185d5417115e356da2728e4e57fae4a712818cbde252e6b3f94121572ba467fa0633315

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eecd1e700db57cb336641d0925b7f732

    SHA1

    3ea6e6ec74ba6ac2bfa0996c40f5b5267d09ad5a

    SHA256

    83e466465dc656bbec3125edb02f215237794db93f18fafdf107cc287b843c8b

    SHA512

    bc300723e4aed29af676014e77d7d064b8fa4963cb0e57649b071e1c50b2964abc095705b2328d6becd2182b18397e4ad90eea4767ca07ac8baf75811ff30431

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    649625034f3d9f87c23b79ba1fc559b0

    SHA1

    ec726dc1b14cd86a18f86daf6840f1407ba7526f

    SHA256

    754ce1a0edd7f5976cd9112660d1b5c1b4a8b56454c0940e74f95c1eca854aa7

    SHA512

    21a204525cc5dafe6c6385b2d4cad773add8804deee7a5fcc6e7a58e02ca46ef837baff5b768e1b37efd789210a3e8eb5d5baa7850614c4824e43ca3ae735d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    813f4921343f89814c21b71b82c224bf

    SHA1

    81b1831b15f97594eb93d1ad052878ccf9eec973

    SHA256

    907fcbe8cce15af7a70b33f32d7f6502c3843bcdfc0d31a32ebcd3a022ae6304

    SHA512

    5aac318f3eeb11afea3c38450b02fa962b788235404e04217055920069c1453d004a0f0a866b53779cd54565c993a0cb8a313db03b9c741367f84f23f33a4102

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59dba0ec6648b9127f717f5b7d4e12c5

    SHA1

    23a078a1910aadfc7805a78ae406efdb74d4203c

    SHA256

    13e691d409bca8d521263074fdc18750d21c2140d713f142180ac623663ee92a

    SHA512

    b66c2671bad3e67d3aee608401f911de7b051a8e2b8a22e6b44c82478f90b2b9a0fea55fa8a53d05c843f57dc97a74d4ffe4198ade507232629ea520b47879ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66a1de512f19214bac1d69f17428dcc0

    SHA1

    11ef948db5587b2222b71b1a7bef3bda43e729f1

    SHA256

    599916df7d9c4128211a75920fb03d9bd25e6bbd97f34d1bf6b76c6c39e623fb

    SHA512

    aa58b5f037a46c29d15c7f76a2a692a11d3d770c1edd881b8494bcf0ae9fbd39911b4b1fef71dfeff52fbbbd0c959d3ca33ce0fa306c2a96ad0010891a8bc6e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8742e0143758abf51f071a237bf11533

    SHA1

    30e3462054db2f767375d7fa78f8e92388635428

    SHA256

    a62ae9c51c95274d180f7c73b0163c1efcdbe70b57fdab3c6775f56be32f51c2

    SHA512

    d6a28525b2802e967588e7275cc9ac3de5da12db513b0a080bbea65a756c864da81c4726e609302b3d0ceb239d04b0c1403e586106ef8c58127419890b8b5fc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2d276e6dc02d52422a2766d391e5d7e

    SHA1

    47ccc49eae277dde7ab1147dc59e0794d02d97ee

    SHA256

    8cb2ec5801b1eaf3a1986229fca5cb601be195310976209af560eb3ee10ea64e

    SHA512

    659718efadab9e7567e3362e38da7761edf2ed937bcee006fbb32eebb551c15860b252f186d94d526b1f3a8fb6ce49368e82bf3b76f5d4498750e79f151a5d27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c00a1ef0dc961b909acda5fbbfc0510

    SHA1

    9f5f93ccfc59910ad0bb5591a35d8f28c0ee8bbe

    SHA256

    3ff02bde89101aacc9b80ec1cb4ce3a7cdf55a5034bafb561d39819a401b1761

    SHA512

    f10f25a45142863522d1bfc07af6a2ada5ff27630d5ea4d85fb4e3e8f1b17863f001e0c142f01837a9661f77922490df783f103e750f4afd3aaa4e81fe0bb807

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eb64e518c40b658f638f0e2e9a1c941

    SHA1

    28db63fdac33240c6868387af3decf70dcf9979e

    SHA256

    e6bcb1c63aaad65b8cbf2d9aee167aff5b2dd60b2d5d292e959ce580273cd055

    SHA512

    ca163dd6206dfb9bd6eed6f7cff389c3555bd228c455ab36c93aaee8252ac1598363e95d52ca8ee7d0a48a8733f0e95bc0ca34ca30c5b3442785290c87f49a9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cdde9632348f8f963acd7f08b5da22b

    SHA1

    cca01b68f5c40af122f0f001c1ec7f6a85124887

    SHA256

    e5a49fa2c6bb29f79adcc6cd312f2e3826e13c6e3e9ad14d57648421d6affc9e

    SHA512

    81c5ad6a635536742a88926ad937a95b929ce3243a19df03b812ab716f063bea6972bb7da3fa7f91462030b08c19d9c8e4ae040c2602885bbfe5dc0c56e89168

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d81276ea3647843c14aa86e6ce7d4070

    SHA1

    aa83bf48e234208af87cb4dab3d7812571843e24

    SHA256

    7e2e75e691ac046ea3a57ffa1a7bf4ccebea4fe74f970f0d59fa6e56a3cab653

    SHA512

    6be41ddb2ddfa90330c72cd53f6d71ec222cca9d5a2381b340e694810263c418cacaab88bf8bd045627505f8d67c56ddeea9e61b00185e7f29d9b555347f9bb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9538b8f22f0f1fbe269b6691bc11e7a3

    SHA1

    bde576cae3a006fd67bd1d8f86a7ff0b3b4f96b1

    SHA256

    b54a5bf56b6bd97a7a04c046f4e0bf6cf965ba5840dbd64bbea8e230a395a979

    SHA512

    0ea08e6f19678d9ef2877c047015ce70325b1e4012e4921491742c731ad2a20cdaced196d36fcfdd88c9fdd9f2e3a22a662c5ea53be890a784782c78ff5c6cd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74b1094d78df6a5d969615e5fb6e2223

    SHA1

    38e168aa797e37a3d15a69caf6b5b5e5c92fea65

    SHA256

    c0d4e321c45bad8cb958572628416b68cc232cfc2368ac2881a43b532ea81ba7

    SHA512

    cfc6ea6da6b2f33df87741341a3f58f3212d41359ea7cf47cb165451f9bb2465d6959b677575edf8badae5ab2b396dd2bff93d5f01f9c167773ddeb3810ccedd

  • C:\Users\Admin\AppData\Local\Temp\Cab9530.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar95EF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b