Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-09-2024 03:27

General

  • Target

    Salad RELEASE/Microsoft.Web.WebView2.WinForms.xml

  • Size

    40KB

  • MD5

    c09409aac254f17c1c648e6f0464b035

  • SHA1

    22acb08e12e6ccbc4005c393e78d78be4f64b28e

  • SHA256

    4b40e49aec5dbda597224f997d57a16645ddc2eb00f31a6329204d1853a2245a

  • SHA512

    53c46df0f24cafcd81ddedd195bae8dbedef7dd1387691a3ebf856b4dd239c3859fb58a1eaa9a31baa1fbb6e1986270ce567f3e70d110d1d88817f27c8a0dd5a

  • SSDEEP

    768:3OsdyK4aSPgPxW3uyCG4yCGdryCG/L+GZiyCGRL+P1xb9zU4QPgcRJFXCfPgKehG:3OsdyTaSPg5W3uyf4yfdryf/LzZiyfRI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Salad RELEASE\Microsoft.Web.WebView2.WinForms.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Salad RELEASE\Microsoft.Web.WebView2.WinForms.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4888 CREDAT:82945 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    48291c0d253961e62f01d3dc9b199465

    SHA1

    15cea8092bc3cc2b9e74c1b6a67ce6e0288b3f17

    SHA256

    555224aba07474f9decff68e4c8118d8ed0d835c3db3794cd78a02246893d626

    SHA512

    f081b5e0e55ae279c68bed2207fdceec9deff925f58deed38e43687ef68647272c1f7be52a80335c3af5f3a2c38ef38216081629b62e47081ef7c1fecc7eb078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    db9097e3033a9c61f72388aabcce0036

    SHA1

    09897b3c3c657f6355dc1cb2b913dbf981a84cb5

    SHA256

    2e6abb38581eed040d750dc332675c4f2a3f27830a2bc33914e2dabf5699a7ab

    SHA512

    10086d8381494968ec531148fde9c5ed0cd4bef8599d7a3f4d4841f526907db431661edabb5021c1508da3e243344da970b7f33d02c1ecc4f192c366bf993ce7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verFC13.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7GTPFJEK\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3PKSGJML.cookie

    Filesize

    545B

    MD5

    ca2612cec259f4114796eb72db52215c

    SHA1

    b33acebf359403aa40dd1f2416a2c15a64f5f6c7

    SHA256

    7347c320423115fa5bf09fb7dcbb5c94e15ef02dbfe6d8ef223a4da86745887d

    SHA512

    6adb272238674f23bc84e4630054342e481558ecf6d519d3177c7905bc157b32e7f9d3ec19d9bf24ddd00833a27258116f36818c3643c7957804b2f5ad217ca0

  • memory/220-17-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-19-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-6-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-8-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-9-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-10-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-11-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-0-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-16-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-7-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-18-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-15-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-14-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-13-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-12-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-5-0x00007FF87CAB0000-0x00007FF87CC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/220-4-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-3-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB

  • memory/220-1-0x00007FF87CB55000-0x00007FF87CB56000-memory.dmp

    Filesize

    4KB

  • memory/220-2-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

    Filesize

    64KB