Analysis

  • max time kernel
    120s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 14:40

General

  • Target

    BlitzedGrabberV12-main/BlitzedGrabberV12.exe.xml

  • Size

    319B

  • MD5

    a92db228102d690d07828f71a4171b70

  • SHA1

    e7ff5e84a7932456df217e4775ad2c4b54f95521

  • SHA256

    d4ff8811d9ca86df9fdc62cc0d5395947683456997a0599dedd3606f9eda3d44

  • SHA512

    0018e4c3d88a74a35682a5c46bff4bd8887d717fad464adfc31eaf8e69859b4406b1488e2e483b41c72195b00580e9b0b6b1eb3495004542ff728b54a64e7472

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1890e16af21266d37e0226defea57ebd

    SHA1

    7c3dad37b31914922dfa420d51a671cec325ece8

    SHA256

    3c1914a21065cab42f397a6410a23d41a5434576b0c1fbab4c089b7ecb4fb0a0

    SHA512

    910c68981b445ee55476f96ca0cc2cc23a7d460754b83d7ba35534e25b2d289bf6918c5f211b27eb8f72b7d6be68715e3cf3e0f2c3b5519e720e28fe29e89d0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4181b8b1de5d15de27e0b57eb0a8e957

    SHA1

    28f0f55d49dcb4e5584ad87f7bab4ebf9fca4341

    SHA256

    d3c288c6a8da5b82891ad0d6900b3bcd4640c076a57124db3896837dd4cd53f3

    SHA512

    8bf981af23f8e26294a9b1595ae22314e73f79f3af1b5f0b4199a9e4afef81a2ed3769af12ad21e032cc20a1d1eff2c30ed0b9e3b60391ed5280b87991066c5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86a967362d91431f67dd22f481e8270a

    SHA1

    db6800074e2f6d498f6ff9ace7240c6e53e54f48

    SHA256

    3b44c6d6f0ff6b027d23cefea81d5660eae66c27c75ec3247a821db1390aa60e

    SHA512

    1b6ceb38bade764a70eb1db67d3e2eb4e84ec9b50997182a4cf08ff79c9e2261255e8b776a82cf9793a00e44377d0791141bdd72e2fb659bce10f12959f3fd19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c3fdb5844db4c1df8f43be587f37a7a

    SHA1

    9f556bb30d98522ac49696e3222489aca100c87a

    SHA256

    d78b9de1cc04edcc92d30e3e74d61fe500ff64155cf399e67ecd58d58749d716

    SHA512

    212ae1fe7e82982a240861feb5d4bf996eb14c5f8f95a7cbf13e9b04d40f7ada44307c8b36de1e3470daffb1ae5e954bd1ae649dde6e8cdc17ce72ef1a47ef78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5bcbf0ecffc19b46ecdea99d6ddf3b9

    SHA1

    87d96628e08a70aeb404b0f4cdb27eb722dd4e82

    SHA256

    733c2dd625a18e963e6273f673229f8d85c3a23db68c63202af2fada4eb95667

    SHA512

    b63ad331ad3b2aba63f8641eb393157e15100c0a682f0d9b110a4c3d1c04c616ba6e97fe21ff6722a546aab5c80e9dedd8c7e9b22f09503b44b5aaf661704329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3078fa793d68b89ada61ec9416db528b

    SHA1

    fc43d435e915c5e7a9740b0e9d2b4f136a775132

    SHA256

    5167fe83b5ba191eb8b6e26ee1d66ef69d747aa7ec262c22f5c79b5d7e1257b6

    SHA512

    98d311f03fda0bea71584e42abfa4d070783c2e09ce2720df77d9a9f9225112a78bf9d66ebac9b791f3f5ccfe0783c7096f6e08f66b780f8c61caadd98c447fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb2a9f54cebfb06e2871f368ac7200ba

    SHA1

    022f3a899087cbd8b20adb0cb9df53ef2759efe2

    SHA256

    effd8bf3924e57bc1595db3a37a5ab6596a705229502824932dce42061ba1da8

    SHA512

    f20e0bd4bb61720e012d47f9da1882d24ee86a783b696e23357935d53c53bf6585fa90faad272720d1ccc9748b603e34e450ecb104696324e2cc22010b36baef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d12097ef1c9c71dd1f75e9e9abfeb2f7

    SHA1

    fef05db77584ad46337fd4611f7e37eaddad199e

    SHA256

    04e4265f5fb88e62b6563f580f30b2c7afc87e7d241a584b15622b44936a5607

    SHA512

    d3cade97ef1c0e5f95c2244299840354ec19727d17c44cc24328a53a1054162e599b702c3ce1776687fc3cc7929bda85ed5a657a588e797ca425d9f8fd1d8ead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39a840faf41c1b777b5b7ce6cb8497c4

    SHA1

    f1414c484243991f52383c61d0ce5a8ce6349b37

    SHA256

    e5fb5bad7b35254f29f8702c6b339b58817e3c333e88186a0e06d7fd0c4aad88

    SHA512

    7bce30e6205ac979f7a55caf96bc23c7c71c0fe9b675d6d916a8617a60f1216718c53cd3f55c48ae0d6c259ace12559749e126be32141ac39a3c047e1a8b2e27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8af05131c5641ddb9aadc805b269d9d6

    SHA1

    612d0efe222fd07927fbc86b41310ffffc208452

    SHA256

    34946fde428494302862db8d651fb59438ea2a51e00d6a6a24fe3b71e74ca8e6

    SHA512

    d1d9e7bee79f7d65a917db483d66799bf650fdc98a29f845abbe8d15e511cc156a981b9bb2e3d8b94ddc3ec95dea81b45dc9cee3d0ea495fb40962f182aa695d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c29e373d1ffce141054c060a15f96e8

    SHA1

    e4b42d2d78eb21149d779de4ce173075d80e0e46

    SHA256

    44b83b124982d29c79dc96027a43a36d09fc600c56c0fbbf0f02a83d0bc3e7ed

    SHA512

    b7990c5be89466f584b5e01c214469c92e61bbf8cc8e26456e56ba7649fc2dec9cf144f1bc7b32a48cd09008097924f54f3398efd27f7b3935d322f9b0bac836

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d9ac0eb1cf95ca438f465514a79711c

    SHA1

    46f094edbec5a61be20367b68d75b2372269ce01

    SHA256

    fbb16239923c4bf73fad34c8382cf2188a31506143e0e0110e20c0823cc371a4

    SHA512

    07ca38a60755508b69b8377915e83d9b19b1a8cf4360cdc1b0ecd56f46decde6f49a6e593a6330ae8eb7f8cf0931c0322527503fad1ae76df20605b0beb11a51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71e0d581742ed838d38f85b50cdab22b

    SHA1

    8229670ae1d385116a6f1d62c44c514abdba2c96

    SHA256

    d444753cd2d5539979b2f750ab2c43bab18767b9af48fbc1e17f221f23c7c88d

    SHA512

    65bde3640aa21a1f3d91ad7e452ec546af88239d6e3ae3e36a79047f0da12b5660dbf4083740f2f4e2a685900e36686aaf73f01cb492bf77ee0c77c74d615d7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    460c6636ee45399afc1de6f353fee45e

    SHA1

    bd225645e444ad7ff9f9598bebc10cf7008492fa

    SHA256

    a0861bb0583fa0c387c4afdc7b4701c17a052308793abd37236701968e7f0233

    SHA512

    b830116cacd34ad929544281df4e172370f9bdb4a49ca1f53d922aa7966746150cba6229ed341241ceade0d51201408c064a68a4b05f4f4aba13c5d145e44eee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4145ad006c168d5752f194888d8c607

    SHA1

    0f4c3d21215a941432280e26b1eca047a9d05ca4

    SHA256

    f8bb19f78b3ca186952f42a3b0d38e2be639c76ea170f1a96dec906294a2d296

    SHA512

    bde051cbfc59b25611e19e57f0a335e6c7df4e63d77b4e4f1f2c492d61ea57b85d295694cb3d1abfb0eff7028f6f6ed5336d355107eb0eb36b502b12a2467cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b173acd8c112507954dd373023d7069

    SHA1

    8c8e9a1df50189683683422c6696bf11be0ab58c

    SHA256

    4964e4dd82e668922b8e327e385d4dcf525115beeecffe5ce66bf4502fb05155

    SHA512

    2c4ca94fdeecb339916c017847f6b293eb25d7d7be15a4033648a2c0490c3dc6f6fe6b6358a0a26aad93ddd9767ac0f89fd452675a35052048965094d3fafb74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1135e21cf30aa26fe210b8298ec5474

    SHA1

    202174f67c7e8bc21e964ee04db2660a256277f1

    SHA256

    6de78f263c8e1d5f32005e9c4d01827f4b8a50d70130f9336dd7f22dead34faf

    SHA512

    86a2e08926866bef46d00f7a14d2b6ea81e48a5972fbd14037954e74c78a26ed5ced84e694de39d970e79edc30b65051113536b00f31a607ce1849f66dc8f1ae

  • C:\Users\Admin\AppData\Local\Temp\CabC997.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCA09.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b