Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 11:06

General

  • Target

    My.Summer.Car.v2023.12.10/My.Summer.Car.v2023.12.10/mysummercar_Data/Mono/etc/mono/2.0/web.xml

  • Size

    11KB

  • MD5

    2b6303c4f12762b71051db6e947f90a4

  • SHA1

    a4d7e05516f63d6ab67327b299d4fb2852cb840b

  • SHA256

    3c1a76a5849074b437d297656a208a3bef6d84b982153542b9c797046c601dfc

  • SHA512

    80f5da60654e1851ef21526e434b32d94e18883a08bacbbaa0e1f85b80469c46510b6ddb9b429f16cc4be89c6f2bb2627bbae9cb1d0c7e45b665efb7721c6d86

  • SSDEEP

    192:wcedeaZ0sEMYaWN5bs6yyzEVkEYEG/Z1f5v6CuCCrtQzPwkP/waeKjy:wj5YaWPs6/1zwya

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\My.Summer.Car.v2023.12.10\My.Summer.Car.v2023.12.10\mysummercar_Data\Mono\etc\mono\2.0\web.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42c83a2c54ba861add65851efb1ebd2c

    SHA1

    f2ec64dcd1af1d1e290c2b16c1117dc7c63d6bdf

    SHA256

    deb9501dc25e3eef6a550be5e335fbf8c8d6f478d8372030c163725bff6b0094

    SHA512

    76f851b79d405e25886634f2dccd673f8bbc61df695f402c1a42e52f5a0994f1c01b89ee4837b2a65bd883e41c9623ad28e692d5d8e2e48358123deb9a2c5327

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8748af5bbdfd245482f64be8d8dbe3b

    SHA1

    c1bd7222d551a2413e4f6dc32091c385ab7b3bc3

    SHA256

    1a5e6904aa971122550e1e3350afc04450d47d0ca553f8c808d5289b5ebcf144

    SHA512

    af731b6f68e06a3807895a3deabd3aaebf13a31f9a059e2d1a1415d73bbc5aaa7474ef7ba1215e4dddd8b9782d119e035a2fc302e02e56f5a47c02779c4cecf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    900a7628e0c69e0f4b7b81734ed72b14

    SHA1

    3488a7dcc0bf9c34d5bb6ab10e3e922d5a3cc841

    SHA256

    15a1c07b0fb9ef4d7f8d978d2933af1a2469a33997e5748089ecaa61bece61c7

    SHA512

    0ab33126ea3df338d7710cea94c867798415aae208bead4a7bed59768a040b580b0dd99884d07affefc2b1c03be3428088ba3eb06375d0bde32a8317d0f32544

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d20efc685f7dd5bf7872de83fcc65e1f

    SHA1

    c55d3876b909c1174b41db8f6f97231225783562

    SHA256

    3804d2c20befdb4ce76b046e1b70d2e3bb00d821d48d4eab6a0bafe7f2c77ed4

    SHA512

    5a4940dab15633d804ca6da2af25e06684b7067e17fdaaf598258a6cbfd68434b55966dfacdc01bcd25e3ecb735d5fcab365dd85d9d9067dd72796a8cefe5eb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0b86d1e7d9bf752a7987c6d67e7fd6f

    SHA1

    dad7e29e8b146d65596e36349339ace1225ffb1b

    SHA256

    d7c432a17d7a75775be8cfe85b94018b22fa76a1737a666c27ed28016a10f0f7

    SHA512

    d03b5e0d332b74181edbaa70ac511c1e8996f69cf4010c5076e6b19973749434973e6583704abaf6b38f4dbb8eb5ad97c6b0c02f56cb858befa54471e3007653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68bfe7eb92aabc4062eda87b2110814d

    SHA1

    a1668c95c851281cfdd0b9ef5048cbfa9809acaa

    SHA256

    822ef203ec9379a05c04ec5830591e8186ea70f19ce3ad93b0921b9f4f257337

    SHA512

    8e12dbe9456ebafab789c8b85b6eaeb84d1e39fb39105fa734dbce9fdf268feea15c61fdf098a011058a9380682e764db86c3c2be0a85a24cc840f8eb3754cbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42af21e48fa3b2f84cefc3c76ce1fe6d

    SHA1

    c7d3d02b4fbe2ddab92bb6b7def347e6cfdad320

    SHA256

    bd6d4e28d2635fe82d8d4ce97408252a6271a603d415a76bdd43c82f659bc098

    SHA512

    907816943fe844afe738c19590a59c7e0b0f74b0ff7fbc388cecec2003caed536b4096815bd349f5a809dc46db694942cf1f00b4c0e28b88c735f7a5cb1ef25c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8065ac619314dcf117b0c9b1ef3b129a

    SHA1

    4ac2bdc43220499f097cb216db735d481ccf8859

    SHA256

    05e301ec987de836b64dd5a92f6d4aeb757ca5440c7e59c8455583b5aa9cc977

    SHA512

    e0d13305dcb963abd87c6cb677bef927b9c57b0e15b1a2bc9f9c1e1e8fa82141c2427c3b21c960230fb81e86e89058e8a05bae1f90495ace9a59907bce1b5250

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9634cbeab1e2067901402231e994726

    SHA1

    ad212afa2a1fa18e3d4bbac9e2a3bef298c52a6a

    SHA256

    25b8d98a8291006eb5d4d80abfa2cf33511ff3ff91e0b59073ffbbac840fe9e0

    SHA512

    a815cbcc0858be52e199349cc79301e2e56b987ed9719f778843fbccd971456fd447a1660960cb23a254507bf4fa93a40c34e12a13da0f20066f195508b4b44a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cae5ee381c9bc32a03bd32b7fd3d3f5

    SHA1

    2f49b286e76af9a807557b8c73c7cd45781ab229

    SHA256

    9738a4dc9b8c9745cab7a81350ae4b57544a17e5993a739bf4ab7ae8814fc2cc

    SHA512

    6f73d930d838d74acaa9730aac23b498af773719c6459e3ad56a5e7da522763f4b0a08d4a56f54de5f36e34ca20ea6ff46a8ffac62e0cff7403eb9b97fa942ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b639ac9ce6c4f12dd5bb7dd07f769e7c

    SHA1

    fd1944ce637de55ca4f2b6d433e43cc803b1aa01

    SHA256

    a99b0564170cf2de4706bdfad994802cf54134b435a14e2a3b7198d999e64a93

    SHA512

    265fe88f7a8225aead8ee9b357cbf6906ae9e5727a56a9cfb50d9191e0f7f682c96e7e4042512270773e6a28ce1477968dcc18853c7170f1852e66ddd2cd875e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03933fa1a8684d9b0551873d1738c18b

    SHA1

    444a18c834406cd11c719ed96f07c31acbb532ee

    SHA256

    e306435da0e682a7142bb637caf50fc3157df80e67c4fd4dd24073b625ced81f

    SHA512

    0f4eced4f8898070106286f7476616455cc3910f00f1a625c09e1b30cab4032e5ae4cfd5d05e719e1e3003994781a71c68a78b6e09cdf2d73702fd821206f64c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8124e30b26828723dbfa089902906347

    SHA1

    f4d135bf91de1888e087a404575c29b9f3e84848

    SHA256

    d4c51e713bdb362bac0f85a0e6253abfafd4d04cc8ead3d23637840ff08001c3

    SHA512

    22a1d027e5ffb501906400ba2b76a46ca3a2e87d9be4200c3f700964929d97ad3ae6273b88c9bb32f832651765031e29cfe48f3873c5719c75ecb85ebd2415ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ed26a604c5a5310652b0485408b70c2

    SHA1

    c027df6f589f12955e1e900dfc8e59b45ec66562

    SHA256

    cc8c14d7dd3f4879342d5bce31db5423e7c267a75ee3b666b4b02fde8a1880ea

    SHA512

    695c50be552e1edb6f77465a5c07b3c353c91f9e19d785e0e27f33df6ac197f3409be8634daa142a0cab981de98dfdcff3eadf82700e7b3e7a52d90bfeccf0b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad75bc53569a49dd18efca8f9687d66e

    SHA1

    9de2090c9943869375bf38f25d1ffb2cab697f42

    SHA256

    b88d2c1c6390cd63d16d04253003fc22419ba049ea7ab093db776c3de8911daf

    SHA512

    43342bd7d6c83b1ad220cfa2303784779c17c0e60c97ab765a14456b1adc252e7dea82578e320197ee8d6d507dcd8865524ddaff24afc7003fde6d6e75954c2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59a98571723e9d9d5bf960c7be5177f7

    SHA1

    48a866c9a818b58393b76427715d2c3b69af80e8

    SHA256

    753f3d3acc7bf16c251727d17f49e61bd9e7e285c9a37bba0624587d454692da

    SHA512

    ae714283d5189b22c93d8448f87d744b234e07ee4c9e7b85086af9ed56511103ad39dd79d7733ed1456fc741157a877f4199ba3e850ee4434305e7b6ed2c0e55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    232d9345ce88122ebe3c72462addb21d

    SHA1

    2bfbb677b6faab25cbf400c2ced790e4314a8c09

    SHA256

    f87bc0d2beff161867b583f7029eea8f2a1e9c7f8dfc6473e8cead7dd46b6de5

    SHA512

    aafb42f745960e3feab230f92938c9c026711c8532872a20b8f5373b9350392c8ad8431089326e33bb93e375ecf0e0165907648ad971c9c0309c1e5a48c40308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c6c1e6aa8418d5dea9131e173bcb91e

    SHA1

    1109a06fa420b65a5b81fa3602cc92c86b330837

    SHA256

    287fe87ef208699bbf07cbc240e18b142ef17f15d61d1ed35e9318d75951c034

    SHA512

    501872db64f10aec3e90563280e25eddc7c340fab1cd4c0a54fb90a379f665ce1808e4776adf5024aac450d8c7e65b72eeb278c9ffa31b5e000097210c2f6dc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cd4af0dec0f88e37a9925f7d67cb2de

    SHA1

    855d1af78211741caabd47e98cc1320611da6a3f

    SHA256

    d2e563947ddd2c94de4ac7c70c42772b8f9ac42a9db810ec0f966ea7056903bb

    SHA512

    7a96a3a81683d73a2a060f5d6b1fb3c6a39dccc0523fd27574954d88f0ed13f6616364b8dd5076c3e2dee6d18e6e8f4e80c0f1074b6d58637e36501a030284a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d280d53435f789a2cb4ac67327009262

    SHA1

    a26bcd3c9effa3fda5e60971f82529b32c4d87be

    SHA256

    017dfc0f99c3ab7c0838d8449be76ab878427077d9e034a6272ad8acddf9566c

    SHA512

    d60d0d9cf365ebf758b37427cdd527b66c76f6848dfae01cfa6b7b34da3e9df57aaf71ae8985870f76a5783173f7a0bae2e8034eb8d97d3f35a280da994d3bb6

  • C:\Users\Admin\AppData\Local\Temp\Cab5870.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar58E0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b