Resubmissions

27-11-2024 20:39

241127-zfpdtszjes 6

27-11-2024 20:33

241127-zbwbksvqhl 6

25-11-2024 22:14

241125-15w1mswlcp 6

25-11-2024 20:57

241125-zryrmswke1 6

28-09-2024 18:21

240928-wzje5ssdlc 10

Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 18:21

General

  • Target

    AppProperty.xml

  • Size

    50B

  • MD5

    38a35ee4ef24896d4450825d30da2d84

  • SHA1

    934a8104483de39185efae62e7b473380e32cfcc

  • SHA256

    843a030382ce12299411cf34be5d9fb0dedf97775782386bde41e0f62b36b06a

  • SHA512

    131089a9303458d5ba935eb39d6fad75e5f77cc210cef2eb4ca7b55cb457b00b60edd64ac629d72fdad9fc794125a664ed3865a563a1d90154b8d3f981e3f3bf

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\AppProperty.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28b5db637af74409e71e26f5c9d4b643

    SHA1

    2196be19c97f5ceb5e493476762b29ea0f9a194c

    SHA256

    ca5465c0d9e690b49c75069a2a7e4bfc6608f458540e69b58ff796f9b339b10a

    SHA512

    1ea132d2358c9414cc3630b2e8e70dd82cdf6717f1be699f6c8cfe2b7567a5247314727927332c86e6f7374c2c33b5dd0ac85809a24dda5117314683009b755a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5118faf8cdb7491e840a9b0186d3fbf

    SHA1

    55f8e3255a9128f4100129582bcaa005e64d52e2

    SHA256

    cac2eb125f10dba71b24545e0090fb673f023f9f69c79210bf5a23845d608224

    SHA512

    9a1fedf09a858082d3efb6689bb47d5cf60d5a1faf4b057374f28b0c0d45c1f36098196723cf180f64dad7a4b2d23f5ddcefa4d635528da4563efe49560617f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c6356399cb2b2c12fa5f164383e5f79

    SHA1

    3a54f2654a54f3751306f871db584235a0078a1f

    SHA256

    0f8e4804bfe08f6ff6184044085e320ad2b9613b5034ac21e1a18886886b28d3

    SHA512

    3c2e88377ec789e256ddaeb72f96f1413636a028588ffad755a6cca19a327f0b73ee8f606b2d611a7a97d5c7945ab9fb850f263f63946e455f5dafa630044b4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad47b196491548f28f9d1dd1868adeff

    SHA1

    cb8c9d8458bf58cefb6f1938e06141bdfc6a6771

    SHA256

    0305be62fd6b0a7c0c44760d7972e7346fa532d39f31309674548b3c461e88d2

    SHA512

    8fa2096578a537c7bbc459c9d840b3816b544f27728be4f84ae04f57c82f6f2ef3114ce14aeda49e91d6ee622e650f2ee6375422fa9d13af29e008024fda0cc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da19138d28ad03e2922737f306430aba

    SHA1

    1ec09184e7be7d38c9e91b9c0f57afebdcb8e831

    SHA256

    9886065758fdaa4d1facfb1af5087b3552aac07a207e55b3feffcc6f9eef72de

    SHA512

    7bbd7c4b291162a77c55669f21b5679b06e842acbe45b464019cfe6cf6fec30d18859e8be253ce58f4dadb9e3791b8524be81e9762de187f6605884921c25cac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18c6bdfb7e279be8a9640d2227f4babe

    SHA1

    7b750b813ed2c06a5adc69b4dcb23ad7857a3e32

    SHA256

    2807abb8fae140f1f9b40edcc256d924f37b2eea8e1bcbc10fe98b78a7f2f610

    SHA512

    a77f669a049fabff90d7e0183fff173c88861a0a2419178f4562090d062105b6db67d4afeaf7d1441081625b4a7808b5124149409176e9a53f15188650e52a5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb743da36e7949eb0d962e5082a62bff

    SHA1

    54b77662429d4ec3c89f0a7d3a4020f43dbb72f3

    SHA256

    5d942fdb3b980036c51c767e5d612163a49b7a68d9c62e9ef6c3681a415d2864

    SHA512

    54656db7b97210a34a0898717ffcf447fab0544e7671556d18b11c5305b492553433441cc5eb411e1ca638b30bc943aa28d76334777e4be79eb5a320010bb8d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b7869b44579986d2cd5c7e9d22b6eeb

    SHA1

    f3a5bcd780fb804f6292b3c3ee08d3597e46511a

    SHA256

    1b0f1e63ccf381502155037433d9a04d6bb3056fa1bdff821c93a448f89eee0e

    SHA512

    505aa4f66debccef4d8f573b29b788f331ea4a2025eeec70262e3e22a43b7321f51785e0212a724fb3b163f251fad97d80e8abf306e951316b9521b63dba77c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72829b56ea28875a699f32c283fad258

    SHA1

    ceda4e0c9b7810368d2ba3ae01cb4802d00b7465

    SHA256

    3999c2da2b9283927382765476a12b5693f2c4336a0b4014c11446ba808e7d38

    SHA512

    289dce8519d911aebe40e4b898afc4964e20e78ddd66f1ab2f593fd036bc43f5601cb3f5b8eaaaaa1806cf655360fcababa30ae1168f6d596bafdb2be183f52b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14bd88e56d4b43b1283c593bc9be9fb0

    SHA1

    d3f9e4d0dace2708373f1372cb254a6262f0eda0

    SHA256

    f5da15b984b3f22add54c1f79e4ca5ed4cc5acfa32f7d5e87f6b293879b6c83d

    SHA512

    96347b92073287bb5b35d4c524e4bf7617fded725e5fe86d2eafcad69e7bb7d6203fe48988ee4f36cfa13c02b0f88413bf4070c140445337ffcbf484030a5540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3844770f5a092378a60362a9e54f214

    SHA1

    17d0ff114b7d355c82f4d21b9c02d9e0ffe03fdd

    SHA256

    f17c03bb12249c2600c7ff8a6212e630240bd4145ce098e71f3af8402e974ece

    SHA512

    03d2a53654b6ed3461d5c82e821c9882b7811931f9fa27bb48275f62802af0056f09b6ba74ba354ebf32ecff5c30a432770d3d28126172be145c25e6233285d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b44322a573d0651ef888fb0109a03be

    SHA1

    048d9d8b158f8a40829d1d158d974d6948e9d692

    SHA256

    416126d9a3f22a4fa2304b4267dfa213e92bd521385d05f6a5bb36c9e2ab0474

    SHA512

    626b2bcc8fa46b9dc46800fd9a544b946af4b10a46ce84a2381986db91c4fcfc6a269ff8cf8f4e8202beac260ac531db65481895ff6cc26d0c653403554f6960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8dfb4ab28b8b16b75eaab5a6410c2037

    SHA1

    beb308c7be7f7872e12bddd3e4673acd9df5c745

    SHA256

    286beff31e7031a37073d04b0e9e8439c65ad0ce2705f7e74565ebbc64666b84

    SHA512

    b0d42d6316d16c7f95b3d2dd9597ad8979efe64835f2bbbdba1b112aead903144d76a4fab43153406e37aba833a83bfd690edeb72dad53300514e08b51464e78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e61b0eeb7a59a19cd8159ce2ba7c630a

    SHA1

    6c7f8ab4e380929dc98f647ea8516a8adbfe068f

    SHA256

    9c028fee4968ff774f2d910d20f4759eb637ccf3ced331aa0ca8d3836e502da1

    SHA512

    566e41f889f61ef7ffccbb5222352527ef257f05612699f98465b6216ad5c1d61674da569465eb8220f7dc6f7bc06c340526419a71283cbed794ab1f6d1d20c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51e485b43a3f776e1895a05928ed8aa7

    SHA1

    459b09859c8c92ce28b11cff8f0c67e8d8bfcf4c

    SHA256

    2edbba9a77e26fab5664f4ff96626c31542f736a5b557944c60ff4c71c50a922

    SHA512

    e94a455131afad129993d57ba64fc13b63b0414c7c5e99a3362bd86f7c5c48ad2dc348273254d1201234d126d8f70290f4c6a3e304d7a43651e3fb64406470ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b627f704315e5eac2fdda7f2f8f278e

    SHA1

    aecef65c6e11bb632e439a64da0fa9a9286c6f3a

    SHA256

    90027370f7c37a36cd07cd56a17a04c5c5a02d957fab28d0219bb8186c110902

    SHA512

    ff587643f561dcca90bc58e1b7c2228c660e52e17a294b55ccbf0410b75da04b824ad7ae606f41eaed290fa2b928d91edd3db8ab93020b58138cb3703e913770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27424f4961ab3320c7af45348569458d

    SHA1

    ca1242f15a4e1f141837e11150431fcf855f6483

    SHA256

    e0160f7620be54517c6d4afd2cedc00a543192a24f5e9490f814b82253d3a506

    SHA512

    52f50e3814af4788affb9be9be513da3cd874f295bb1f28d63a270c61c6a2152bed72780abddc8264746c6749d0ccb50309ec4891570883cc102b2b2f4b727bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    298c41778d3c005dea2a1b8433b00ab5

    SHA1

    f15aeae5296eaed336629bf0b826b735da7aba2d

    SHA256

    c5bd1efcfb1ef236d31528953c9f6523cbcfd1f869c369571bc5d932d64d80cc

    SHA512

    28a66b0b6ac3bf46667f03ebd1d194822f2efde44e21171043bfa9bfa3257898c4b79b5c441988621bc4b789ff3a749e85c3143a70c9d0cd07aa8d0ff2df491d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad07ac11aa3d8e7d24c82cd3c93b62ca

    SHA1

    c7c61d816c0c5449d0a849b5b8de63233e28a8be

    SHA256

    a939558476301b76174315fdfef0a753364a1297d3bf1608e97e0aec7c8cfd33

    SHA512

    195f4b7cc3dd7dd2331fed74a073b69bbe434449bf282f7791f1410fd01b7fb55fb5e4ecd0b75c666795c6c12f901a121ca88eea7d5656500a736f0a56ed73a6

  • C:\Users\Admin\AppData\Local\Temp\CabBEA1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBEF2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b