Analysis

  • max time kernel
    137s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 06:32

General

  • Target

    project.xml

  • Size

    1.9MB

  • MD5

    6c4df76b5f142db11e536d096c2097d9

  • SHA1

    044a3b0112c0eb52e035a405992f39a98d34cb87

  • SHA256

    e0edfb920ea6365eab889b68b9e016f46179f36081270ed84dc52488e7cae52f

  • SHA512

    def9ad3517da6d20bc78b326b2cf626acb3e9c0b869cc7db581d88fe0a5c709e8add4215f81056fc48ea11dd8510a6a2eaf8772ec150c3d78740a361cb27651b

  • SSDEEP

    1536:Jl+yPpM09f2K0gye4CmYD0Xlj/hSi4NftF:Nf2sWBx/+F

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\project.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42eae7d165b18136a2c5db3ff8a1f4b3

    SHA1

    c8e89cfaa58c8e6d7f1f9e12dca50513cb3c8cda

    SHA256

    526e0222620a1db9fdd41985a47e69988b1b63db6ba0ed32f92ecb579f6c4971

    SHA512

    ebaab2bdd42a2456a2077179cac45612db5461c7071bb045fc870052457a54f72694d0d1aa83811ce8ef69f0814a786ca3169116c378ec93e358540f0144adce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20186e9129bfea39d555b8777d96c518

    SHA1

    7b6a34e65d3b2b65effae16128403a4b3f5e8047

    SHA256

    f94cd10f198e01315a69d451c19937d6f20dcf02870f5c30c6ac90d039151b52

    SHA512

    c756487a27195051bdf4f6dc0830123ec1d7b26dcf5e25ed732c747156f67db847cdb494382889e29366aa5bf7b8639a5dce84f11dd2d6a08e440d70e12729cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3128052dc13d9143450a5ca90d77f4b4

    SHA1

    16d18cd769624c441062d34594d2f0f39fb9116d

    SHA256

    0bb772f33dbbb514846bc97a29d421ffcc68fa392fe64ff8d909e9ff31c439e7

    SHA512

    4e6f5b82d4e2d78b1ce96476caf89593a91c661d0430a3dd6ec062e12e195b9243f09373a500ff117e7dbbef471b5e9b52babc3c9128d2ea9e6030a7a37f0b87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17f87172bab6b7a571c6fa598956ec65

    SHA1

    769fae45321396276527805a8313b1f45e6b3ae0

    SHA256

    e69daf3d4231a2593c70a78b5bccce17c70805ac3136f60f21f4dc0a3d1cd987

    SHA512

    5956e698a42f1eaac7f147ea43928e70d8f2a49987189ee06bc7d97f46e9f85f10c44c9b0a406fe58c4c67ce8865adadad1b1b408bd3b92cf3b9af666bfdafa5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11469900da03e8265245d5f09e4e001a

    SHA1

    81ebdc65a21a94878c0a6da90355207e2275f602

    SHA256

    8485d3bc1270d756bc12e9f6e2b5227d328fd835ba71029eb1a6eabd9a78cb03

    SHA512

    3a6293e0ce50fe52b55edd6eda56ce53f06626ba32c0a5eee0d2a4738f61f249d6f216742287ebdb712e38e601c5ec79e97b2c8ae0aba3d1378b0254a29b9198

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48f3d038e6dc525c87e55f248e91bb0a

    SHA1

    07aa7ded06cdfd5b8f506398f4d264327f4b1f1c

    SHA256

    d3f98ea25a253206e0fa75b0ee09e6a5544aba4ca37df6060c3ccfaa9fd7f606

    SHA512

    abd2759b58d7483ea45bf6b9e0c9d3fcde7202b4ccd473aa5f47b3dc1f38b1890683863e74451b44cf74b124e38e991947f9f4a5b4a9c8b55624c8fbb9673005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bca59370e4bcd372dc0985f3bea1eb46

    SHA1

    89e2e6f524c20dcd132c53f26e09fe93274acf87

    SHA256

    359192897cfe136cc9544f7205b8bc8b18bdc3f2b635aa1c31bad13acc5055ba

    SHA512

    cf238611b74eb7128a563d85304913a02d131a19a19a3462daf55cf57c798605b657715840be4f6dbd496855eef1751cad12c2d9683d8aa93d9b08508cab8519

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06ae195290853ee090f03177ea1f96d3

    SHA1

    f6a8019ca8355ebc26dcf4a60b306a6629ca41de

    SHA256

    cdc920c960c84585e79e63c344f4eb6b496a2e192e1d2ae4fd17a53ba1daa5ef

    SHA512

    b0c7342d726bcb3c375b1b706364015596b1e00e50770adf000bd93566c8e800cbb7206d4436049d230d66940ec4f3fb77556b70b29696d32a66eff0cd8e1b2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    407af2dae79590568b1ee503ce56d0a4

    SHA1

    19410e9f9dda18c8e739d35614c0d1c912016e1d

    SHA256

    c88bb285ca3d48a77df1510d69a89c80274e1aaaab6d5fd5bda2f66b36119336

    SHA512

    de38606545b528651392b536775a74fbc077e5a080cd81df82bad0289c4ef260fcd0f445fd5a36e80ea32cbea0da5a6afc78210f05d72858cbf6f0f427cbcb86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caeb54524fae5cc4654ecde37b296d1c

    SHA1

    7d349e6a14c94d5e7b95acb2807bb7e4214e2d88

    SHA256

    cbde5168b9ebccb09342b43f4d07c6538c2821dab0bf5458b2283bf648738f67

    SHA512

    b683eb9a6c9e907a6c0b3725bc853bdb2d904f0f486f2d95e9157d89b91ef30c1a51adb7805e96556ea0626cbebc818b6704d1dfe6d898745fdcfebc085dd6ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1158ec45c0cd738c9c680848106cf7ab

    SHA1

    1328ce20368077521e76d7deb04375a9e1736ae7

    SHA256

    f63b06c90839728dc5f1f0127d6d00d96ea0c4e545ae2ee1cb73c42f87b216fb

    SHA512

    ddac2ebf175b8440aa015183a5089010262ca5c2581176c0f99d937ba9cf96cab2665c013f588335bedaaa558ffd33a1a25a024b43eeb5c827114e18499d61e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1c2a425b32baa06dd4d134127eea11b

    SHA1

    6f9291bc07b4243a10a4785e8c6ae98d3d298296

    SHA256

    5c0deb5c83150789381ad3de1854625063e8752384c703582dd032c74e3e8123

    SHA512

    d6d1841dacfd62a460e7357cd704fc84e21c5461da448c0b598cf57c34594e10d8f09c42467dd3e69905de9e17877cdca9daf341d51f66f8928ab1e88d6fbb8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6530da193a0914fe366d2b4f9f9a0bb

    SHA1

    5fc9722d5a3a4537837b397f8e9ac3c94d5cd634

    SHA256

    c9f9eff8e3078ea91850ee0ff6cea3a58130a4579622b84d0c34bdf939ed62e1

    SHA512

    4b8fd02defec74aedd144d45115441a898d2a39edcdeb7818258b09e1918baef60aa51e321a5016e52d22fcebe3e585bf3132bab29abc0b6d408f256bcfff3ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0356913b7fdab651d2160884d3b6b285

    SHA1

    504e11c089ce290b6789eb1480d8592f755b465d

    SHA256

    cff84e596cb252e7e1aa3283d38488fe596a67f2c1baf895b1b75a3860b071d6

    SHA512

    532c69c98bbe3bca32e3c64aa13100b5b7b6295956517ea325e0cb4c12f11abf10fbda168f343e8587264980a830e9deb18193aa3fe25d38ec3f5ba87389a264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd3454af4a6c62ec67edadfb206ab31e

    SHA1

    4673b2294b116d54f3e5b15e0e9f38b18b36f3c6

    SHA256

    809499637aafb4ea4eae4e623f7326b25c64b14d6ee5459bfc2711145f36e5ba

    SHA512

    64978346fc56075349936d36a8f517a742b3dda41c2d8d9b976f61e272abe9ee398061806050fd185f1367e813240328271d12b19956690bc37cb38f30e739fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dc7672bddbc67ce5b68f1ce5046530b

    SHA1

    22b49180c4db67ac7c3ac67c9e67f0e41a19d4d1

    SHA256

    bf2f0b877d85e2c3daf743e0e6553ee035fe5b0ef55b02a904ab384d9d425d6d

    SHA512

    dce3d52672649031438bdbd5ed720d0ff0322d68b79dd9d11813e04aa646f48c776cdf682267f085465102e4577c6ec2d2f06d0ffd7964bda6f1a71842a07a29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa6711242179d680da191e95699993d1

    SHA1

    fc61ac936547469f1ba33f35a10920b0aa7b6c03

    SHA256

    cc80796492205e2e40d6c42eafe71d7a6919537a5b7f72727185f022e3f1e8f4

    SHA512

    de91d1ef342cbdd2af631909e9cedb9b6542a883842913d8c81f19e3cda2cd27efcf53d697fb1e623701a29243184c3bd2fe3edfcaa8f1ef78bad9d292d3b5e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4624d32e05ede8027de26af8470154f

    SHA1

    4ae095bf07233e0c75a1fe8b7352261de8d31816

    SHA256

    d9c5fd8df3c8ce9b7404641351c8e0b7afe0c53fe3025acc5305119421395958

    SHA512

    1ccd3f5b30f5a8ad59b84e3830163e491d83648f9f95ecee23a9dc9dc30e00ebb28c21f8ce6a276bea2d3a4702202ec564d10089348cd6e475a22ac561b4f729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2083d255c34db30ab2e774e88b7c1a75

    SHA1

    da60dbc0def1fa94bc3e39fad2af99df0bba577f

    SHA256

    5d6952625287494fb6be791d305d2c6f6c1eb0461306d6cddd78e7e265f641cd

    SHA512

    453713029264598ca6f323a4b265a85c88c50047c6def58d6bf66fb84777921104a0207f49400f24743645d663584573a09fffe995429bbf6a893b46e9a67528

  • C:\Users\Admin\AppData\Local\Temp\CabD877.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD994.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b