Resubmissions

27-11-2024 20:39

241127-zfpdtszjes 6

27-11-2024 20:33

241127-zbwbksvqhl 6

25-11-2024 22:14

241125-15w1mswlcp 6

25-11-2024 20:57

241125-zryrmswke1 6

28-09-2024 18:21

240928-wzje5ssdlc 10

Analysis

  • max time kernel
    133s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 18:21

General

  • Target

    $PLUGINSDIR/VersionInfo.xml

  • Size

    90B

  • MD5

    be7de86dd8caf740f5f2d748762fac4c

  • SHA1

    b39726f6160ebd84f74ac977b2ac6a15643e84fe

  • SHA256

    db29f712197b209c5118c680d1ed5e007eb24ca0a97d688fc895d3adaf423e48

  • SHA512

    78c34cf38ee46a8a026a957f7720c2c1010f3885f807dbea00e28d3ea6e108283c1b84f6ba76885c868db41066ac5d90a4d62415f7f3524c2f74bbc0bdc59e28

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\VersionInfo.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb08f4bae2f2cb35660c39a8cc0da53e

    SHA1

    3ddb03a82ffa7e681cb089198a36e4f64f89095b

    SHA256

    359010aef62bfc6385bd090e6ded3a9b0747537fc7b3bbb83db76ef6ccfe2729

    SHA512

    33523eb99c2e9f9d7d051d0936b3dd0120720d341ed651f9d21ea1d396f6cd84746f951ba9d72206017beecff26d00629eb3e25d15ba660210ec015128982fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c485bd03c1f2b7c30e510743dca4d436

    SHA1

    e16a4955d334e03bf7839910592c36f0a4ca2285

    SHA256

    9745c837b754b6876786f464dbb46f235e126bfc65bed331b3ea1481d9124acb

    SHA512

    5ab559ba360734d0ba5bae94f522f9ae0e59812383fb06ea3ddb4ad23589ebdcb84e919890c72eeb8dc5b8f8265b1a290e9a6f83ed70fe42f0d0e10eaedbcdd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beb6d7271d6b1ad7c6cc4644ae8f277f

    SHA1

    c90955a222fc0305892f6d3839bc8cd7e29c6f3d

    SHA256

    95214a0cc2d5f4a9eb51cb811f23475cfbc5f657e8c026d4a1948dc3b0e845c5

    SHA512

    590f85e44bde70f15a3a73118e2bcf8abf9ce7531b66df45cbb170235b03c4293a02b70bd03cbcd8f1a092d362a9bea53bda729270cde08d18b46a2cafaa745a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95e43c0d074953b9715dd7a2de1b527a

    SHA1

    204ccf3e4b3f9bf6ff6addf978f376eb82cef96e

    SHA256

    082566a7ef2ed3ea3dac65ff3d0b1edaaab4c0e438bfe5f6402c335ce36aaf3d

    SHA512

    acf1e99f2be3041f645d5e5dadfc65aa3058454dc9fd25b5e6050dc3a2a09883e33d5308d4422d5626d1161294a00f4bdee3a7fbc62594b11bcca0779d8f1b73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f058970b2b41481d03187ca4e4a5d669

    SHA1

    ab15b3ef10e899ff9f4ffbddef1e07b278cb7c6f

    SHA256

    10f99fd20062f48bace1f23d0854aa993e43a9c6da4c422ab7ffcda4eb6f77ab

    SHA512

    94199e22643afaef8c5db24d8ab4947bd8c3391757a85609fe67b8688c6b0c94fc0778e079d3aecccbd8069e981e4370b7050dc5adf49c270b2c11d824bcdd75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3cbd8f096e008cf45ef8ae11724ec4e

    SHA1

    a9c91066c6590349fdf2ba6c63c75027135e2f58

    SHA256

    abaa0678eaaebfeaa92678a3dbbb6327390aa6339a00443a1d231a658192f82d

    SHA512

    90a38629df0cad0dfa9b510ea625edfc54202984caf3ab6670ae9dd126042ba8a3abe59ff4df158d1aa83c739141a663b70d1b9850a0867a2bfa3d8da5aaab40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50bb11e85e7478904a7be26770fc573c

    SHA1

    2b68174e08f4ef801d6be7732d6ce21aaac3bc1d

    SHA256

    f5fdcbc37b092e6334a3006cfae89417154f6a29e0608a9b35f2ba71db477279

    SHA512

    186110b320fd9bee3e6bab9b6165a316d5691ec8d8188c4d048d7c15829d65036b71b8793d390df4f788b5c0cce201d9fc072b5f00c1eb43ec55146807903a27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    627a1811c2e1c87b577dc0a53a65755d

    SHA1

    1dc220a40a5d2bbf682def181f4e6d77662f8633

    SHA256

    884e698f8a579e68a6078a46bcf57e7148077095b56d50b00ceeb3b9f852bf5a

    SHA512

    c71400cbe1458bdd2efd1f161d6a10483049c7e3d42eeb9c3b715fa517b441bcd42dd830c93839af412da79a31d188f77e39b17aea45149367739fd4e3f01057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1b50750b6c75296f50d3ad66ea8c760

    SHA1

    e24cb15c64b73a9962460c99012dfc03fefb9614

    SHA256

    05a1999d82f0373c20db25895c611c829ac04608708976e425e85b8f415e1350

    SHA512

    6aef20630b9a3de42057c72f425d644a91ac555fee3a11d92bedff92c59dc7fb6dd8485f2afa029aecf248684426e3211b2be6cf2b30cd120eafaa32b4f7b074

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db08af0576b51fd00ccd916e742a896a

    SHA1

    d61bc77b34ae88b2ccd0120d4e8ab4b2b809d344

    SHA256

    6233e63bcd2c826bae17f6ab117f89dfc5a235df36d3aa1b2b613947bcdedb94

    SHA512

    8f78d4f9ac44a4bdfc6ff168199a419fa4f0ec57d028a5ad52f790b7e4760acc04b6120653da5466629b6bc4598df85afeaa70b20e06c15e15a68c1a4f6afe9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1f2c62cb8173801754f6c86acb12748

    SHA1

    2235a27e10d41dbc5e09a6ed6c22ca4ac6211de3

    SHA256

    d0405b5d405e3b18114e4cd465c843b8a59e7399495c27719229a7628e0979c6

    SHA512

    77f0d685e1831d07ecde4514944bfbd26adb394c020a7fd6304de4849706e4c4be5c531ef518de0379eb069d1601fa877b9509431be239568e3cff5feb7249c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    107d5281f7f0de4053f7dda501fc2813

    SHA1

    c9bcb9eebf679fa5731fe6dc493f8407d30dad68

    SHA256

    67a650b72191d8b38cc805c8149339bd2a46cb5a4b680e0a542b187b70c55c0a

    SHA512

    127a45825d63601cf45fa589806f02d33957f9b628319030e4d281e6b7bf8f40f6b44d009800923d0220a45141452e798db3aea7b6559eb430423eed75760168

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3e9645916310d09d8061631b586365a

    SHA1

    4c178f0fe18ddf2f78dfb8ba2b5663a8ca7c2220

    SHA256

    df714dbfe8574bf5f5ada3e2009f3b90bc691c9960d5ebfeb969b7c7ca3f0f86

    SHA512

    e8021b96787f2af298f87011fcc4695aa498b20084804fac7a0938523035a8d3ebe8329163751c7ae494030d937ad50d5fae8e460f767b3951a7c91809ba4c33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d91d63065ca03124a3a4f07e76e2b9e

    SHA1

    4e200b27d23d22fbaae21b4f746f075863ea0751

    SHA256

    a7d68fea3484d3c6039589a14ebabde5db2126900fe449049ce9d15cf4565003

    SHA512

    89cb1c189ed58e2060b33aa2bdb406f47ab77cb86b1d0e415a182451c42cbeb4032e50be253fb28b0b3e658fbbb8a52277970a37eecf8b4b5f57cef74b25ff81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69acc1183b427be6f8b4848a021363f7

    SHA1

    8ba1ea1910816564e864fc8f0ac5390ca11dc5c8

    SHA256

    04707a0dd5d40e0c089028944e9b4e4566f27fb924bef1e7ecea172569fc3a43

    SHA512

    43d840d5ba999871e6d4ab8a58350dc55aaa7b84bf1f2558c41b39cc9a1146379e01bdf4de49bc46c7353b788117692d0a165413fc07c3e88c1e7adc55a2f7ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4c213de7572434af26773ceeb1b1872

    SHA1

    96255436dfbeb61545bf1e3306ef364e4af43857

    SHA256

    6476b2ecf8ad591b46c98924093229ef770a076aa9e1dc523c4432f893788926

    SHA512

    9ae6171e055c8083a806a4d7307eaa7950b00d593773ec3c00bd1dcac0c0cc71a69e537ed42fa7220ca3719f3dee93edd7d1b6dfae3ea19387475c14a8e398cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2241b07d5915162eb9aa1bd9a22dba22

    SHA1

    3d7bef6055e2209a05e177e1a9c72211eadf486a

    SHA256

    3b45eed576cad504da2697be639087d6d402b461a7174ffaecc26a58a6b4d047

    SHA512

    211431423282cf174ae270de348b5440a23a401d12bfd126213fee407832cdc03f3e498042d5b543981d5b089f86edc6f2f5671dc8204dc1f771a67034aa9540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff402211c2a4fa47b84bbae40d2f6aee

    SHA1

    b97b3d7c49f1bf2db8b0fdb4372a28315c1bb84e

    SHA256

    bd0aabbf843b98513eb124a119c5d190de57a3d1392ec19811d5098139a27b4a

    SHA512

    f036f9c307b9b7e4b6c2e0124b128d3e08ae5332ecbf4e8ae882b416b60fadd3432f080fde4b4400a19a574021fdca859b2d8695d2927d5ad5048c41ea041032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0865601c22b8c2051764e6498799d43

    SHA1

    411e24977881cafc1f79d6086d36fa33887eba20

    SHA256

    4afa72e623c973f609e8c0a1104d3979b1b5874befb980e50f0e2d3004b85f31

    SHA512

    a78941ed5fee093b3b76f7afdc52252b748bc1c3336436e42ff6e7226d75a929d83e6c9145e20a5a411c4a1f3ab34cc348cd3f017ec9b8d691699af92eb060f2

  • C:\Users\Admin\AppData\Local\Temp\Cab9D99.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9E39.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b