Analysis

  • max time kernel
    137s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 11:06

General

  • Target

    My.Summer.Car.v2023.12.10/My.Summer.Car.v2023.12.10/mysummercar_Data/Mono/etc/mono/2.0/settings.xml

  • Size

    2KB

  • MD5

    55dac562878b7dd98ee8a7ad203a26e6

  • SHA1

    d16baa15e7d3042bcf9d7318209c696f4daf2cb0

  • SHA256

    ca89036b7d7f1ae9311a6a2fbcf05fc5b997bd43fd21dd54e11c18018ef65f08

  • SHA512

    987c5cd86a9825953de670e5c15404694feb15cd5fa9afa8af4c2d5bda9d805839c9695d44122b32e0ffafe08d720c3df58000e89c8822fd9a5eb28eaf2ad478

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\My.Summer.Car.v2023.12.10\My.Summer.Car.v2023.12.10\mysummercar_Data\Mono\etc\mono\2.0\settings.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b30f7665280ec1dcb833b629282f7d23

    SHA1

    f3dbb16c36da1c3cba25345c64ca7bc9d1a8e010

    SHA256

    32c0a8386c9353e725cd8263b1690d30639284555e9f7f8dc5855e6630921b10

    SHA512

    8109720fc5b744ff7af6f3563f3fa64e17f12329c14790a6ccb65aab2d9f880c8e1b9d1e7478b2316b0537d51eb319c4bc907cad302e0655694b3463edff40f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5b8ba0545761e61f8fb81ddebce96da

    SHA1

    7b172110000481e614a21d31e4b886a2ed9c50d9

    SHA256

    57a6af4220bdcece809e2542c04e3a3c5b573445920b6b6faec785c0a916473e

    SHA512

    0fb2f24fc259ec7a663fbf963723cda647e4866da8ef3a7be67389daf0d742a7450ad867cf000506d42786a00446be21f95750cc98a94df0fa6af04df5d831b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9857fcec9ea3cb3a07cb0f96fb22e301

    SHA1

    7109d16c1a6fcc75b6372065d19db23d4e9360ab

    SHA256

    fd21a28a9585c32184148330e51fec801f3ec4394610fbf34a9292c4e45d9e6f

    SHA512

    a0fc80a254481f8aa18408f46b8fa31aaee8e86b8c1af050c9cee8bf40f15d2f03f80daa0063a55924ba4c4ec7026e759439990c27dc1363d264626fed0a1f16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0817d15c2ae1f621baae3802dccebe5

    SHA1

    825aeed095812a0d7e1686fe4fc2152c7810c7e1

    SHA256

    1a3ee851513767fa10f9e3a15cc7742693580f773e10c902dd2451d097b1db30

    SHA512

    f790145ea117404a8f40eb1d692f7a22f7f16a4a7284fadf201f459119b8865d397e0026a6692b0156e10bfcfa0c08255d4536dcf6e2729ac68ad4a4bd687f97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f135be4a1e3a329627eb218a0d829b54

    SHA1

    1988f6fcdc873aa5177c6fd7d0006fd24b88222c

    SHA256

    093ab6c6e066bea420d203afc1dd4d8e2644c68bcd46c299ea1e4c5cab1dbde0

    SHA512

    e9b3a76fcb83bfbdcb3f36b1c27a019747f02b50285ef38b17d03d56b7883d5e3e7dea77624b2f5d99a7af47ab9850faad80a0c119a1417de2c2ad777a31a452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2f0aa271c56c0360f850658e696c008

    SHA1

    0b8e59e8bbde3476ecbf08a3897fec8d6492cdeb

    SHA256

    7a8e9848061d8db41a7bc44fb381733f1aad50121e01f757ef8deda583c93247

    SHA512

    192ad0accea6adb1dfb095b1227892c44573f6af40a351fb74b9069c54c1e8c57b26f5d548b7288fd724c4a1138ad637ed0500814fcda42ffc63163c3a318719

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea37bc47b6e2b5ac73b9f535bdbfab47

    SHA1

    e27f277e3b9ac6c9c27652b3c1ef5cdc2fbb30a9

    SHA256

    047bd6d6fce4beade474aa97b6d21c554c7aff1f16664dbefd4402b67c887a45

    SHA512

    64d0819971dd41e2cde749e06c4358d9bd57fffc0bd96060c77a3b7e880978b423ecbb8372e9f9e965c7162070adf830ac7a7223fbd131e0c7a26c65882983f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1b1f4127bd7ea2f5dafc97f6992f733

    SHA1

    a2c3c017acacda2bc7427b21cbd977d1f49b005d

    SHA256

    693877c961b724c54f7b1643f2c3ca70a5a4399699930102ebed1c347f947dd3

    SHA512

    2ebbb18f610bca961e18fc04dd1e1d992fa9ca4a27f932045127b4f62e57abf10e54eca3495ec21dd5ff359553eb825259149eb312b4040a17d88a7dadfabbd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27d4a27fd56597ca0daf59e858e382f6

    SHA1

    90618582947be54eab80a8cfc962d47e518c424a

    SHA256

    7147e7eda4b6b4d08f467c198c5ab9ce901acc0d12394661375bc61ec86ca280

    SHA512

    1d2da4fca000ba20b33009d651e92348668b47bebf7337b35949f7f9105481bf3c46a6dac92cd3e663d1852231db7142c5835a42a9b4bc16bc328540f82c60c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9370276d0a33ba891cd58139b52b12c

    SHA1

    bf76eb25e4d0d1eb4e09b5e55a00c40db30be270

    SHA256

    7401434a6448de38c2bfc17f76879534a37794c6beaf8ef80ef9415bb89e88f5

    SHA512

    0992602892e64dcfa325c84df902b08e272bc6c45c8405bfca0e66bb584f7fc58e6b1b74b7ac7cb8798e5b5ab85f146c84087ee6f716b5b9f323538fd05de911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b255721823e479defda77c5130f3fd6

    SHA1

    8eff07dfecaf31c428a9f7f926866261fb70dfc5

    SHA256

    16000483641542b61b76fcb4f5660caee9870c2ed488f2aaae315c4fd9f7500f

    SHA512

    c1fcee6fb3b31a1f5b6d7223dcbbb04c5b27dfc70e58275d7e5bc68c84842fe78349a3a562b5632147846da4433dba12801d042710808f1e861339d1018440be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f6544e94c2cabba91cf1526fa810004

    SHA1

    97583c6bb9c10d1f9652381fdce42b6572a5a4ff

    SHA256

    70907b4f4f06483bd97e3b5f6a3239a1157965330c8537d95629b4f1893ed4c2

    SHA512

    e689ecd3fbf4e1c01045d4906aa0f18dd8c4900e48cd5e8eaea4bcc6a9d95bc3bdf939713ab5db90296b7728c87274fabca8c2e5a9db258d81225e2eff753244

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b893e81b636f2a0a506ea50627f32795

    SHA1

    0fdc421783e37eab2d7e31369faa9f42bae673d0

    SHA256

    2b2fca9012ec7c1d5d81fa7a6d60a1610212df482979a63531dcecb1241eeaa4

    SHA512

    ad141c0276661354c2a0283069e389497996857f5ff22e8b1c4e36b34824b95f74a844790e219da30cde60e07c43907fd86ef06ce4d01622796d879835d5effb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bc67cd9cece730667ea674531217b9e

    SHA1

    48411050afe5e5c360310c1240e4c6d4fa70ad97

    SHA256

    5ccd84afdbd9a2cbbe334089961c47eb9a39e2b2b6c98a24aa3103bfe7ed35e5

    SHA512

    5707aad25729b5b7308a91f403c972b230aa1aebb028fd740f64a0054de44f5591ee7f94c57506af5e184fbdfb0f2f59f7704a690b6d15480c90c9edd2b40c57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e363e8180f5fd3329fd64e6a13371e7e

    SHA1

    c6f49f1ec357e5ecabe98d9d6d99cb9a60874a3f

    SHA256

    65ac1a9d18247bd8f9946f6b6ffe6046267b46a8ec12a58b4a78342509f2d9e6

    SHA512

    e5b9c1784741e5fa418c10322e18928749056bd4ebb56c3cd8c1f2f45e4bc2a5b1ef1c1637f8e36cb6fb0f274987438afb691b5b62e0cdae98bcd23f5b34dd63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d72f0b887e96a319971fde8df5f297d

    SHA1

    c30e136ef20836d628feff3f603e182050c92370

    SHA256

    fd3354b558f040571a16adcd3781fea077a242d8d855fb6db17bbb04c7d355b6

    SHA512

    987c0954cf44785b81e51aae3beb6a5e5abd54e61effad2de6256197074e30b54367d9243a996b42098357a6e5d6aa02026adfc88b6a4e54d8296834cab3dc2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dfac24661dd0b93266469f5d7e0d62e

    SHA1

    2455d6afcf9ed85a8386c5e8d32cb48ba92ad7f2

    SHA256

    ec2ee214117dd507c9bbe14a1ea71fbd5c6f9704369df1b1949ef372fd9076f5

    SHA512

    9b4c1dccd64265955aefa1be2e5b15c13d02e974d2fe56506cb69b4363981eb2404caa4cea2c767e51cab3cb2d9f7d5299b0e8dd7cb6a716959179c322aab6d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3be8d5315cbf90d8d16db622d57f16cd

    SHA1

    c364a16d82ca23bee606b50df8a3ae2d79f7245f

    SHA256

    eb521c57da2fbcb2979652c8b24eb8c063c2db6fbda078bf825e962034933e94

    SHA512

    a17c756c154309b204da031204b0661ff63ce702698a2a1d512be62fa29182b9c1f7d2c6aab0ca255a083bfc42ba863ee574d8616f9015d95d97c5d764a9ff74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb8365b85c089cb6629e58bdc2a46ff0

    SHA1

    609d158fee01797125a6d15ff69ba9d93d98af9b

    SHA256

    509fd7dfc98ba83f8f4c9516208e6861d9ad25b7c690300a5a3472f0d55cc31b

    SHA512

    fcf30bf4242c605f3b9c3380c632a59ee891fad6e962db16509dc40fa530aca72549bca87aa82912093d2ccaad843dde29f384c8ddecc5a20d557bbd889b0cd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ebeed1913d0fe782c595c0fb62be00f

    SHA1

    3433c53deb3831ee727465c0293370dade135f48

    SHA256

    954a22c4c85edc975b8a36309b658b6a18be8c4b4af3970b64507b5b18c99815

    SHA512

    6b4e8f4185b3fb1f6ee2cda6b40917d770b8542d2aa1a6d9fd1c74388f10f935ef3187de30f86790b0fa7b5e4a79ff90290e5fdbcb2299702fa394f8ec30fa64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    983a6507cc88949827c03aefdaa8f45b

    SHA1

    60413bef6f4f60870a1b9fd401bcf85f747b0346

    SHA256

    ee52a5a84ad6abd2ccb5f71b0aa4befe65f5bf9f7a5b40b2bbee30f6da15194c

    SHA512

    0fd5208c05889375a92d07c605411420886920e4ef6afce5ade46c16400eb69014da91a9716b1cc779b1562452ea6794e0e3e828bfaea95782af2ebb1079e7de

  • C:\Users\Admin\AppData\Local\Temp\Cab3C94.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3D16.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b