Analysis

  • max time kernel
    314s
  • max time network
    317s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 00:14

General

  • Target

    Resource/AppXRuntime.xml

  • Size

    3KB

  • MD5

    88d794ea092ef395433cfa321d06e5e4

  • SHA1

    f1f7c7dfbd04ac5a92cbde88bd4f087781d63c40

  • SHA256

    5afc969e4212a6511f307385c99b8868e8c873183dc271bbb95ba571b24eb53e

  • SHA512

    ebb770102b8202de4bb7319cbc2cda860e4de5d1e95f0fbef4d4890aa2b22cd48cf73909d028a37b507926b4fad573716fba16e50b8f9eca8d5feab00ac17cca

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Resource\AppXRuntime.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb59d0e42ec32d873ecb92190580e7d7

    SHA1

    e5fb63b1058b514fb79a9619a9c7a83ab1aea45d

    SHA256

    7b6d3f2ffd0b6c11f98eb2af7b6fa0a7c7bfd9325a60e063f88b283fcaa10edb

    SHA512

    b7e6069d9bcb4ab229dceb1d294b99bf34f5e83bed7cd578420b7628c88772617067b1d98c5540084a56e939ab72326c1a59ce827bf3a5cb3e3888be914f340f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8254fb4de483450a50f2a1a4d6b09578

    SHA1

    ed956b9cdb85d63390f6f57f65f983c6c2f6c6c6

    SHA256

    2dc9ff714d7d8278bd4e5756860614e1b7981aa7591a3e15a786155c0b8cf89d

    SHA512

    023d0c4b9a3a650056174e01b7e5b503478ba13f2d8dda36f4d08cee0efa4d16f612cc9fc3a07c8a1f20356e1b5f186909bb1fc08c3eacf37251c39bbfe3357f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f1ad988a3c5fdf6df2617d01248962a

    SHA1

    7e2128a1f821568c9319cfa78f6b2d3cfcf57fb5

    SHA256

    c43c53035fe27ea127dc6702bea300715fbe469716da8662b48ac3bbd9b2d5e5

    SHA512

    dc5bb87a2f58968f0b20cb5060b17469e55f27e520b768041c7e3f9aefd321ef051d33443ce2a9f0f74d244d36c132d3e8a06fd15e390a526a00a2a3b9e9577f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a02d63d516f162cbab69281a6286334a

    SHA1

    bfa9bc2165debd9026c9870e5672bd39eab47703

    SHA256

    92e6d8a96c9361ef75fdcd22b18c320485e7ae05c90998bb2f9bab6324ef84fc

    SHA512

    edc562ad6f00cbff0623118afd0406eb2820e31eb86eb1bea2a4bf2fd87160a14556b1ed7cb9ba1bc12bee90f057cd5b4aac9d3615a4afd06accd9fe53596df7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de47d57caadb06930df5ea249027efe7

    SHA1

    551b835ccb288d49162a4fcb2eddc2da4ea5f94a

    SHA256

    d3c3ce3587122615612398925e197ea401733abb716d746019e41e0e486daca1

    SHA512

    0875649130a21c12898844a89720e6fe611753daff658f997a0a38be96ed07f21a983b080953a95f5c2aceb8c6404e124cfda3cf7a147931c7daa2c075f363b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdda999ffac95a083c75949e64a1ab1c

    SHA1

    a595101ed27d8cdd40c975c19da30f48e8764fa5

    SHA256

    2b694459a17566d243593302cdfc29f00f7754ac54e52bcb0aec0000e0753624

    SHA512

    0106341dca6e9a7c3b41f1ef8687825a2c2bf2e878a78f9cb750ec6e74ff7331775c982848092ffede98d1b6c084165f2323a57574af636b0cb81b7d7539c519

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be776c46846e3f44fa70874d32ee69ae

    SHA1

    609c7e2b1e99fbfc2f047a5864cf040cd2de7dbf

    SHA256

    fb4af80b48709c52c71dfad145afe5b95e9d4e2a7237f5e929507fab7b967e90

    SHA512

    88a84895dc0d4f96b24ccb8e208478fafaf18479be08ffa8cff8f9cb4a532fbf3f7aa171ca87922f7900c761ebbdb857ac96ab9974a95ec5001671dff5f21c0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ff0048b6f2ceb1ed8c617331a80a6ff

    SHA1

    98c2cccdf5c95d99581e9f508707a85fcea16316

    SHA256

    1587cad3680b1d3462f540517278b39b8eb23632a53386432bc93ca6a23a2522

    SHA512

    669db92830b18a00aa49e9e9a08e2a9a0519eb0db7984dc1fa2f83d52f88df9dd8edb5697a8107db94cd24f8e949b0dd6eca32060210673b693cb068d02d3188

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e144fc7b04ffe4949c397daef6d93ff2

    SHA1

    1b10947c4d7606daa3540ff3121c60fdec35b62f

    SHA256

    b148a12280f44cfd5162853abe4d329559684bd5f6511c72260a87d055182023

    SHA512

    a3b6acc6857314847da1f3bf782a71cf9e42b2ebcca5e00d871e105011d2fc3449f3964357bec2908f12cfaebfac8674bed5f9054d5fbbe30cb3fef2490fdda3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71e509c585043448b03747d1be4abdf5

    SHA1

    e04b1701f5e01f1448692710e813818d3c4381cb

    SHA256

    4ff2c51b715fc167f259d0ac3fea6a43b51eb041cf37607b8d89118605eada1e

    SHA512

    be8f98eedf95c8f101ada1c01df213b4566f12a573d36fa0f3911ba7a0d7dfd372b5730205839907bd4857729f3251523fee722f6c870c8841d654fd93071013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f046db9df0ee8bb4dc3ebf7febbc1e1

    SHA1

    7024abd9ba29a557df253a220b97b9974f5c0b97

    SHA256

    ad3bb946a2c21cfccd27b4b0026b597e55c4119ff122272f1df7e961e2232fa8

    SHA512

    683e5c26dce3c889f69e4c12417404a970aadf5fa18826d603ea8d68106239e7343d4f7105f3703f4a441c97b60e972bb2882d17f1918f4cdcf7ce9ebf4c8232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    582a9bb95beb5704e65bdefda711fdd2

    SHA1

    9771ab658078923afb95acf29546608fb92748c1

    SHA256

    92b82d9c45166343dd299e61454415df74d5a7f104257740777ff04786494318

    SHA512

    67d32691a6ae0b0994f99ba8a961f1a684cefa4268dd9e634567508ce7f2c5951e234024875ba7655362f8622164f80e02f2111fb949d60d417e80ad19c56bb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e19f10c8ea92bf5eb1b9e97e7e67449

    SHA1

    760d47e68ff6431106779e9a9d2663107d24bc08

    SHA256

    28527f60a724ba9ada8705586915b15526bee61e65395cef5e345108192191ac

    SHA512

    1dbd551691fda1086e12d0c1c99eea2ecfb47f86bcdf708849c2624f572f5b62a34f227fdd252f7776fecb5e4cef30c7bebf45ff729aaa8058788e9cad31cea3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50708b76312a5dbe8e6d65c6c64ee2c6

    SHA1

    d0e0e8ac15dd1104a0e64772fb3606afbdd5a807

    SHA256

    10c2700dc6cf5dff399ae6ff7b26bd6f1aa282c35f583b5fc96f8ee3a1ec639f

    SHA512

    d1e13864559b3f3859b9fe2f50c3f5d11e7be8c29a18fa0e651af8353ece918c7f9bb60445ac9ab80df537ddfbe93d197b84c67090c1e534068bb7bb9493bb03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b12409cb6c8949a4adcb479b9e8b47b

    SHA1

    1f35101ab35f2c3813a2f83657f12718e2f51fcc

    SHA256

    7f385e7fca5ca0145425c2758b561ce9d01b330cf1a305cfc42040f9e6e60b03

    SHA512

    380901828408ba99a6362fcacba9528d706b3e03ae20f20783c668a23bbd822752b336c5d568db18174983a3222c145ecc33d7c365159906d75622517d083ec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    949474185865edaec8392a211bd41097

    SHA1

    d74eba862815f705df335273cab603649831dc00

    SHA256

    76143ca2748e722b72633fbfec2539f9d5b8c17887e9df0fa1f44f084869538c

    SHA512

    f70fac4423d0aba465fd826e06202703a3bee4902f05cf4520a5b016f28196cdc9f92f5f698d6a93e003a11bfa749801375cc7c4aa7ef569e57329165e2646ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2c98ff2a5f809dcbc41d7fd6ce65275

    SHA1

    849981c17f2808d3feb046a572c0159e6f8fbd36

    SHA256

    3684cf47a0e6cec28ad0bfd7baf3b7d5c9f5aaef888b4959b57aa7b4f7002fa9

    SHA512

    be75959a935d5e035dce4fa2297efa93754eeb31e706078f558a505061069b57eb9e5b2567b34447d50bf8a5f8856f9bc94af1f9ebf5083059f2f0ad6247f605

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f520abb5d17bb1a76e4e3c05b85e925f

    SHA1

    b44cadad9b7656f319baf0904f11fddaeef681bc

    SHA256

    4990e741157acfb9926c0c4f2811786dc40938806a5ba0ba8149db449a67de30

    SHA512

    45902f87b3db8a1988c7c1cead5d1e036e5043935375f33d71444d96c5c236ec929759717f42f7cd8e3e633a87307df53535ac76e9c1474777700d1ad77d0cde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79687a5d5a0abb05e2ca55d6c019aad9

    SHA1

    e5329e6ce4c7f55858ef00f88115bafd2f6b2735

    SHA256

    bfb1ddcdc779f0cdc2be68f30519af088a7caec0c1bab63a492ec8f0a9a49fb6

    SHA512

    66b2b1aff4df08d79ad482bc300ba2824f49ed25d97c9d4c8542ba96d2cb6b66165e8bfd23fdfa5bb1c3f72d35804b867081be180d3a9fd517ed1807d3a4d833

  • C:\Users\Admin\AppData\Local\Temp\CabC610.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC6CE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b