Analysis

  • max time kernel
    121s
  • max time network
    159s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-09-2024 03:27

General

  • Target

    Salad RELEASE/Microsoft.Bcl.AsyncInterfaces.xml

  • Size

    30KB

  • MD5

    1fc4bc74b30d484c24b04de5c0a38f5e

  • SHA1

    aa0f9f8db757d37f1f92473a57ad53f20615460a

  • SHA256

    3d06c35d7b0eca37abe2d135cfe12d1012816a99e5e92e0cf4e8501e1b540aae

  • SHA512

    6ba26c5d6edf273cfae5e637ef1623fa37b171d8927bfd9fa8c85dcc27eb6a4fbbf8427e08cc61746604dd0e75e4ba31fcfc661349966fc5aa48da8d5b5f6045

  • SSDEEP

    384:XgOpngSae6jWuTPP/xM2fB8qnmltJ5XZzRzgqW81Fu3DRmfCh7sE+siDBQsFJIss:0FQJNTR7TIcXI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Salad RELEASE\Microsoft.Bcl.AsyncInterfaces.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Salad RELEASE\Microsoft.Bcl.AsyncInterfaces.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4860 CREDAT:82945 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    48291c0d253961e62f01d3dc9b199465

    SHA1

    15cea8092bc3cc2b9e74c1b6a67ce6e0288b3f17

    SHA256

    555224aba07474f9decff68e4c8118d8ed0d835c3db3794cd78a02246893d626

    SHA512

    f081b5e0e55ae279c68bed2207fdceec9deff925f58deed38e43687ef68647272c1f7be52a80335c3af5f3a2c38ef38216081629b62e47081ef7c1fecc7eb078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    fad7b89ea9344ca2c82b0dafe8e130f7

    SHA1

    fc154d6f9e7fb5e2082074a1ccaab400be4cf3d5

    SHA256

    c7a3b7b7d49e6f478df6ed9f4ca0ef45ffe02d68ff45129150da5c462b7fa7ac

    SHA512

    4beb1d1a251d24fc2cb83d5c99d42bdb5996e86c365df8c6590ce4e29e0046785693a45aea9febeb5fd45243a56e49a760aadcf9ad4b7af23185995719bf939d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M9YJQOR2\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7IOJEK8M.cookie

    Filesize

    543B

    MD5

    3d3cd40984fa14ff42272000895f4b44

    SHA1

    6650ba4eb31d3a8be61d8649176cc92fa073d189

    SHA256

    03671f5e51c22d2c5ef31d45a25b557fefb296cf2a076ca46efc8ad8cb526b79

    SHA512

    6a309f313c25b0292c5ba900ed3529950d2103d94baf68c50b9b3d1206031d2b3b668705ab8a0294ced7687749cca4b2463670f486981320077174f21f6f39d6

  • memory/4844-11-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-15-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-6-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-7-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-9-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-8-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-13-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-12-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-1-0x00007FFB51485000-0x00007FFB51486000-memory.dmp

    Filesize

    4KB

  • memory/4844-14-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-10-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-5-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-16-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-17-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-19-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-21-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-22-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-20-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-18-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-4-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-3-0x00007FFB513E0000-0x00007FFB515BB000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-2-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB

  • memory/4844-0-0x00007FFB11470000-0x00007FFB11480000-memory.dmp

    Filesize

    64KB