Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 19:40

General

  • Target

    Rebel/FastColoredTextBox.xml

  • Size

    132KB

  • MD5

    70d49dec6a333f1d94fb1e77c663525c

  • SHA1

    184b544e672f4c4cb9ed9cf010da568eed16623d

  • SHA256

    f3f2e537065317b6ce66dac64042e925bbcea65f00561f9860b7172c9ca07027

  • SHA512

    b78a3c4418a7c5014eb16e72f2113f00353e9e566942f7160067c826c47f1ec2752ae7ede796fc159fb9bae499d347f822401fbc4446e2556cbd680cd595c2e2

  • SSDEEP

    1536:45SVw7sekyF7o//t3zEzacGE5xa5lIV1/P5:45Sm7sekyxo//xzEz3GlM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Rebel\FastColoredTextBox.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee4cd72eb09329f88268249f2298eaf2

    SHA1

    5433a313247197648de8d32125eca7fa8601780d

    SHA256

    fc6088b3d4e39c69a8c001dc9849a25d4e906364a0168cfc251f4295edca9110

    SHA512

    ae96d9a34ddd0e84d8acdcf7f0038cc212f87e6cb69dacc642789cee1f34d7aba37f11bd0b4a7b84be3524e1f7242893ae1e9ede8fb28d6b710e99b58b782bb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53d2a7bf190087bd9bf4c4be811f12fb

    SHA1

    97a5a85920c5a30dcb84c3f259609ca5b5e6d297

    SHA256

    f4b65b1c3bb295b549328c4578afc12d69eedd33255ca9c923f279e3033d9154

    SHA512

    19fe5d0a8e45a56fe61a13de5d2e56533d1a93f4dd3db9ea9c1f12828271bf1fb6c47baa939b8f393acffc1f914e73f60a5afcaaa67aff94aed522ecc2b38fd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfcf557994c04ba5c445f6220c2e3f4c

    SHA1

    1ad8628de342d694e7db23f675caf47ece44ee0b

    SHA256

    1dfa11561357d07802096aade192765c2b392d34673c46558c712d62f8943852

    SHA512

    4ebfc4bcec743fd1af775d5ab073b483b48d18075591e3683ec93282f45045f015caef4fa949f0d1bbc673164d2867e3b99716d53b5e3a5a57551472d34a338b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c3f703e48bb2cdde96efc3ac60298e3

    SHA1

    5a7e5916ff43a8d07db94d36f8bcda06776de7f4

    SHA256

    146538a32d0dc8893754479814879ed7fdefa4afd282659ae1a43de43895efd2

    SHA512

    584210a7f60bbd2b8b28f986269989d40bbbe009f13bbaa1e6bea1a7d8cd8a32cbad8d8cda08d115e2b18b86c07db26f8fcc768243c4a3954287f9cf08be0f9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    198d5a09a6f0e1a44467e3f1c0cdbb68

    SHA1

    9565edfe63a49ab9620ce7e381c8908343e0965c

    SHA256

    c30151369b65422e42dae06ea01e84aa148bb35a3a3b558c9a17df424eabc900

    SHA512

    6f8ecd8d2b82c6aaff2372fb5cd117dbbeaf30297dc0515add7c6093f5291b17f427dcaa248fa0bb3dad75be7d858c06f11921fbd9e0ed8875f87f76747e6d27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69179f3d84624258ece571bafe739d48

    SHA1

    525e69615d20477a3d80f0ca8b58774f907ac9c4

    SHA256

    5723f7c1be6cc4a479117f022f99e0d9ca7c6ce107337956253f7827a65bd3dd

    SHA512

    f8d1b5f454183ee611a3683c85a4ac2f340de0c769c7989edfa01ebbd4f600271cc98994106feb80843432ae318a539877a3d6d41dafb6cfb1db820cbe9eedd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    567f78677d6abbce592c2374f856a917

    SHA1

    31e26c891b859d027b17224cd7f54da932ca1450

    SHA256

    a4f1c58901d4778bbbc558e0679875c3845346d96447935acb72a4ffda76bbc2

    SHA512

    1fbbe5da28680e6fd904928ea0f145b438c555f653ba526a2bafa9fa45e7948faeff00e2ddce43a21bb4e0651741c1c3be36bfc5633eb66e54442303921cce05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35e9205e1e9e19b03dab26b91b0aa847

    SHA1

    e4f17ece330c9302bab876ac0f525eb209554a33

    SHA256

    1e952e2340d0f12c34fc1ea0fd7743e6832b027d462fa1f53d8b3ef6d69c71ed

    SHA512

    79c1995ded69fb4bc9b1a07048795055ab3d78a9a16e7866c7d045376ed84aaca4e0e1c81deb37b1306a824772d7f525cfb389ec7a2c4e8f14455037c39c452b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38988348f49f2d48d94a830949f6dd77

    SHA1

    8614a8f916715004e0490d05260fee1f5c5fd3fd

    SHA256

    a0bb31e3cbeb820fb5ad880dff560588f9a4976c31e29dadc587c1cc8322eb9e

    SHA512

    594fccde4ad89161487e4fb8a02921b85bfb71a13cd198aee8ea1a528ca9990d5596a1e7fe530f7b0ac7aaa02ee818c3eaad757c213f9c0c05e15b2e608c2881

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74ef18d4cca24e2f8613e0893f5cf946

    SHA1

    8fc0476acc20d9edb7bb308588975469bd93666f

    SHA256

    cab7f30edcab6fb8d3f2c9c04cf117c00b43c5bfef3443a5eb1ae7b26534832c

    SHA512

    74939b2fe5859d60a7e3329762283ae0b3e16890f2930a288fed94149cfce280589e8b178896ffd6e7f8a5ee30ec276dfa75fa6ccb5a2d444a4bda38d72d584a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26d3fcd764b927d78734be19a7bd8fc2

    SHA1

    29935d6dc31a6d303ad61a3a77ed4eb4bf78da80

    SHA256

    97faa661c429349e2d636c0750d3b0b4bae96038024040b6557faa4532e553fb

    SHA512

    687ac0212565cfbabcba527b0ea1c04c03f5c431df473a38e3c3730b2ba4978dd22804c9fcc9953c879d9f3b260c514403d2d734fd760abade3b45356ac4c7c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    402cb67e8adc10ce378195ec5c3dda8c

    SHA1

    bc0fa3c97fc2995ebba0a8724166f42e7d2c798a

    SHA256

    66b9bc0d365e4c1d645072b8b1771c5b74536e236733d61cb4afb54e85182314

    SHA512

    b09a075c6f9b5039c5d89563308e539b90fc890b4405884567ccab1a218a0115440f16b82d42a53a17748bc86e7df43fecf63d49882a6e40090d5c521dcf36a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a28dcbc2811e30f329851a7d53f5b138

    SHA1

    4ae11eaffefb3082ef02a5c67e82ba83876f2112

    SHA256

    b61d3b92b208735b7b1777aaec6437f427d252d3aedbac8f5081d810ba12d748

    SHA512

    fa1e4775774f80cb681c5b830a405ba4565920e7afbebf58cdee74f7a689df31f675a7549c756b47f196071a2678d3fa9d4d55f4ed0661ed6eaa09bd4d9a1df4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10ecf243f5f95178fed48a0c4dd9ff69

    SHA1

    a6907c8839a9bbbdff6159558818ee058c07995d

    SHA256

    80a7cb191d68dbc345a36c9fd095751dec321d0298e212df128551ef6316c803

    SHA512

    1868e41219dfd9faddd7913bbd0cb8010b0d741143610ac30f47089cd532b144342e2e2674fe2bfb1f19265bff8c271f1d56fbef50255c3ea47c29a429d48913

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5623dbf1dcc5cc246fdb4b51fa7615e1

    SHA1

    71cbcbdba8edb8518516cf299b289ce770dfa639

    SHA256

    1b95b20c71f01576761aceb520b3a50edf8478ae3e017f274ac4aabca2070d60

    SHA512

    2ea40d09266625f83a8ddb9cdf38d4e963e37b570b51a8e67eeace6823e4625912b8eb639a2addc5bb4637b48049b84a06670b94689e8b2bca351b1153f0cfc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06b780924233e70f9261bc6b2c2ab347

    SHA1

    8f53d1b42b22443796952012143b62cdaf3f7750

    SHA256

    7e5f7da2f0b40fb5d85643922a528d1ef244885eae6925ff01a6356361ebb71e

    SHA512

    ee72fd078c9a58d2f70aa0652d5815ac7689841d4992bb883b357943f0d471d9ded80471210d2f4d69850a45ed2abc6e9daab7f86f77400ab3d65e9ed86df1b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14b6f5c47c6b5661c658d25b63a012fc

    SHA1

    12708ef05f2f1a1da372b43d0a395b00db999ac2

    SHA256

    8080fcc368ce15386a7cc575ce7f03406d3626dde2f28a4c5a0277c39f1bb23a

    SHA512

    e33132911eda9ac8a68f9a6eef3b919db101c87505338b75b284e0763edad0ddcf670cdf6e0822aa8d24e0f2775fabd82c6db3250161b2d51d08b6c8d6f2bc1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cb966ae46cd73a3883bd7dd6716a075

    SHA1

    86a91d5e8bbbc80c5aeee907bef6e6c957352cce

    SHA256

    d6f3bf8493e22c2a92829cf513203559c03a5850dbd9fc815d2d2854a554b245

    SHA512

    5f2b5b8d1787d9f14ccfff6199070780f7acb816b961aafe82f57950db1d7323afdc9c519209970161276e57bc98b7e12d6a86527f2bf77b8a7b737706521334

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d05e002faaf653bc123d4bf8224070cb

    SHA1

    e5c99cb09c3cc694f77cd2777b0b9eeb533f9844

    SHA256

    6623234d672bdada8e792ed37936f90c2f4e689cc411253add22735593db46c4

    SHA512

    d669daaf45070499b39225d98340e71b7047ec1e5b8eb0f43b4e9f306492a0ba1e934c0ccc2c0fbe7b7112ca1ce37de9b8a66f4f102c009cc02908f6a0d58d32

  • C:\Users\Admin\AppData\Local\Temp\CabC1EA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC26B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b