Analysis

  • max time kernel
    119s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 11:06

General

  • Target

    My.Summer.Car.v2023.12.10/My.Summer.Car.v2023.12.10/mysummercar_Data/Mono/etc/mono/2.0/machine.xml

  • Size

    26KB

  • MD5

    603173d56ace47a2d90b87ffbc3bfa91

  • SHA1

    889d20428d2f8a60f7aeead5d0da4009200e5365

  • SHA256

    2d2fccb3f1afe931f7f4df289caf9fcfa31578b4fb4e1f610d3530832848e70a

  • SHA512

    7b8b8073ebae8a31605ab127e2549a013f59da5d4de0fba933aeca7119cfc937111e48a2354e41c794dc0082b6c08ad50724ae806fde8f95a946d55d2ebdb7f5

  • SSDEEP

    384:PbBtBtWR5RwRqrR2RN3RPfRaRvRyRaRIKbX/yeRpQXWBnj3g:DuU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\My.Summer.Car.v2023.12.10\My.Summer.Car.v2023.12.10\mysummercar_Data\Mono\etc\mono\2.0\machine.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2a9eb7121a3e7cf8e5374f4357252ac

    SHA1

    f9a54a681071af9121a5f381f83e23a05d232ad0

    SHA256

    ba5735b10e53339e3994d3698cb59a261b306bd981a9bd6d4be86d665582312a

    SHA512

    ee555baeee0ea7067a2d86f197b4421f3a284e76f14773e155d101a7e2813317f14ed7cd27defe57203f672275afc2b41c222a17b13f19fcf01d10f8904e142d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e429a3828f170f2a9119ecfc8b0e4b8

    SHA1

    d7e033b18e81614f2f0774bc245c530ec19bde60

    SHA256

    cf002bc3dd6d3c76038868032c9824be8d316e523a00c5767fe52b10f45ef6ba

    SHA512

    7ff039ab90e88ad3273d3e92d954487e293df4c32178c3dbaf03f73c406fe7824aa3b693c252f178d0f34d04a36c1c8afa8f51dae74dbaf7da7878010acfa261

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    991ed14bc320358dc44cf514986a0f9b

    SHA1

    6729850e0bc32fff164d6b485787c492b1f28a6a

    SHA256

    8781d3fe8a8d48672cb6e4f7ef73e3ab4298609a89da1d24264c94d8777e096b

    SHA512

    9e0212d1f5ff49b531c5bbef460321322f5b4779204a889aa672cea756ce3ddd75deaa4580233bd64428664895bac6fff05613b7e9f01ed65b730190cddb0b86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dcd5131db573df9cc66052457ee4743

    SHA1

    b4d005ced0bf9862f0c3e6368f67d4044f71f5a4

    SHA256

    80675ad7a5a32896c0aca2ed8a7b9e713009c310f401ef6ce0c156dfb275d12c

    SHA512

    8902942e4a7931b8193c80f1c2a9f861685978ca22bd8b2c97de15448cddd04fa664a5b88c60646f1680d415d85009bac227914d6425c8de33362362e379f6a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4db97eca1357d46efae14472648e8a

    SHA1

    2acbc1560e1eabae77b509db033b9e97a21bd3ea

    SHA256

    771dd57ca4f0e8326f1ed04c15684dd69e1c2c28ecf0a61f2452604c83e8979b

    SHA512

    940c408065a23fe727733113b0a455852ae2e1cfa891d846a8784b197b5e72e49341e396bad36394b88ba31db339659cdcd79d45b07bf9740cf998c614a63221

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9636264aa703343055bab2b5784e8ab3

    SHA1

    00c5eed40e268a9cbd891319ecc6ace741a426f0

    SHA256

    700d3e8af612ac1551e7f754dd6088c6abeb92e93e2ed40a200d780d5b07ac4d

    SHA512

    ddccc20e26751c5515fa4e20e6d8a1b511ad67b84e98109e210d657fb57131f1745e1405072be74d7b6863cf7e68256add3ce06f39625964332a97bbb83749db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34535a02e7410bd2ede758a1f95fd8bb

    SHA1

    868bbac007e912478d3fbfce2a80e3ee4dedb730

    SHA256

    56e03a5238a95e418271543d8cc7d616b3a87493f4dab620318b73328cfdef2d

    SHA512

    421736bcfdaf0ff348b99af00b5951ea0c06ce6b901cf3bf1875a091424b9ebc72865692114bd9a56768c55b5cb899a517eb562fd027992692b7e6e22fc16cc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c86c1cd724b34332561656213671eb63

    SHA1

    b9fe029f93ab5c52a2bb7627ed16f25c5fe3fe7f

    SHA256

    bb37733f0cfdb0717454ffcca8002c3303ebc9b49520c022074a07b73fb2adfb

    SHA512

    fe3e9dddf782cce5ff09ea3e906bcae62509d6be21b8bc56b56462db5722cbd8c0268adb1d2f29e06262e4dfa042b531d33ef70b79ac11700c5a9e8e64f536ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a366f8f72f43373707215630aa17460

    SHA1

    e2d5e6b57965c1c8b326371f8a6883b31d67bb58

    SHA256

    e25579535069c757ba95a115920763a845d4ee2659b16f4449030e48cf41d286

    SHA512

    419f84a895d83da03e78f86899292299d6b46e2bd6ec35d640b4d30348e02b9e13904adabf70a1e526acfb9a0ac09798104fbb0872a709da1438abd26ec35ebc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6799297675d956ed1e96bdb7be9e2629

    SHA1

    43002ac136a2b1040f0ccd753b2dacc799567692

    SHA256

    7c25ad9f9923b3e9aabb97d1df1cbcd189151bd75a054db5989825a14827c5d8

    SHA512

    d16ffb7a2e55dc9dbb02709d370de17ceede4724b9e1b6e6e14d3fa5286856b1d6b3c72aece19132adb02eb06ac58bccc37ce237485ee497c319e0266440feb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa95b3d6fbb34e7aea55cb8add982687

    SHA1

    dd42a9dacdee13502ad407b21dcdca0a76a8adbf

    SHA256

    496fd76563a1c5aa4fcc0cf335db82fb601abd5eaf1be19a7f223ea654afae8e

    SHA512

    70a045f6e0936b000ef903e8aae85e4966ab4857abd7017b72c1e7483f458e0d43a295dc5bd395f069c248e6aa64aa7724f2db22bc45acfc8077b3d3fc0b465b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72e6e94b32c29f359c4b548c1d2bd43f

    SHA1

    ff718f63ca889662ffdedb0d0c9ca12618823f28

    SHA256

    c321270e4fb824c31b9b79b85ed2054e0b782791583e78343a1f2e55e7cf6386

    SHA512

    c8df71abd9ba4ce1ea0566556a2b686333c404b01ffe7a35d7fac7c8555b03462e5b98a9e5a0ac4a3e548eadfe91b6e8203a8a8b664f97a0462c8bc340c5dec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15d0127302a0e0017537d1c22618b297

    SHA1

    b1ae56ec2201a2bee1a4e40f840bb67197dcdd6d

    SHA256

    60ff07aac65db14408e213e9473a41a1a28c279bc1baa4aa8e962a24aa46942f

    SHA512

    5b6d0dfefdb7f551570df399aa0e57ae806a372370a3fc73c0d20efb5d400125d7e855e469b2ac18fc15269a2e9c008fa270f31c814c242533462827069a2369

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cd7201e84283a1ea6e79f6e8e6d57c5

    SHA1

    0ef6b2d10d93c81bd9aebc402d1708464894420a

    SHA256

    2c00729baae594f6e8510192c81c365245348183075c447d8145ab834f62ec32

    SHA512

    a63abe13f132cf86938be832ac7a9d29770dc92e67ed60137eace9f50219c9cc9a44b10f3ee2fefe4462b1da4367736111984c11edcfab1aa8e735777d8b3e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10d1ec4b3f0f3e24ec60adad370d7208

    SHA1

    0144c611acce0240817e2511cfc91df397244f61

    SHA256

    7e2e10e597677783bd3d0c658132ae5899c8c434503c29ac0aa753b51d7275f5

    SHA512

    986764a9d486d39768c924a372eb2c918d6d337359e8523921faeb4ac770f8165749d4772b5fc79cab7792cdd44950c0be6f67db91d31f49fb1b9718cbe5e3cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df2e4a78454920ea312752b1a6a376bf

    SHA1

    0a295d7ef281f6e0ad64b27f524c5e8b39e1a92f

    SHA256

    e2ea4de2c0d1e5a8f802428e7c76a177dae6ac5308b8843cf1a6b8210291141c

    SHA512

    f8d82083f7c11024dc28be75d73bbdd325e9fa95af0b5e2ebf9910aeb150650341b4226a3550b60b6b854dfd4aad3bfaa0f0aa5ec35abc4fa61c9749a5ecb11c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcff70cde30899dea7abf49453dc7434

    SHA1

    cf587a5bce97a71d9933eab7a84ed00bdde4fc15

    SHA256

    a3668453187ad7a07f1efed9d4d3ad901d74a9b039ed9e8038429f2555e1bfbc

    SHA512

    591a4a9c85cd05a2c3d26490ecbd4f84a4c72e8e3816450a50262edddc48388f9adeb6f94d062d74c77a5f91769bf9ada68eaa3cff0626b37a0b07211c564876

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    627425ed530d5a0bba86d94decda67e2

    SHA1

    cd1ba3863ce9ff1a2fa054685f4210afd3e2b1c3

    SHA256

    da11b57439a41a7ba1812d0fd134012be15b45a734aade273d3148fe95bf0212

    SHA512

    17236bdd8365a4c234aea11f6de43d616f31b61003c3c94fcd5488b80b651ea9654c1cc7b1482f8a656ab7a5c67d8975c35b5b3d2f4418bd45a2c299ece84cca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    447a9ddbffc1d3c2e6aa5c457fef7d71

    SHA1

    158147c6864c0c4f6660a985f9fb662bdcdd0790

    SHA256

    c457e8dc772f9c24195a7e67d27384874ca43c847bb832086f6aae894c7cb6be

    SHA512

    70c77bc79c748db257fc9fb17880fc87d68c34102448098312d8d83bf25ca31943be2ae29f8fe99009a65d892a939fcfc93ed881728c159831926404cd2e94d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    909b7596426f9b2edfb0dfe878883fd8

    SHA1

    36375ceba6b903d7fdd8161657d7582890bf682b

    SHA256

    c6da8fd5a6e19fbad2b319c9fb297504f762b2b20d5978e2f2f30b5cf9db31cf

    SHA512

    146814ddb3ae144317b6c999cf63a6142e00f8d5234cd6b39f9fdaf46cdeed7c70447b4441badb367c85b11051da03863662be3c5cb8e726e112bcbd1ba7388d

  • C:\Users\Admin\AppData\Local\Temp\CabA5E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB3D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b