Resubmissions

27-11-2024 20:39

241127-zfpdtszjes 6

27-11-2024 20:33

241127-zbwbksvqhl 6

25-11-2024 22:14

241125-15w1mswlcp 6

25-11-2024 20:57

241125-zryrmswke1 6

28-09-2024 18:21

240928-wzje5ssdlc 10

Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 18:21

General

  • Target

    AutoUpdate/VersionInfo.xml

  • Size

    91B

  • MD5

    ce123e07fb4922d383b316509fc42b0a

  • SHA1

    f14430f14931c28dc0603426664029380053b92c

  • SHA256

    41be369f328416e229a7f9bda1b9cadd2ee39392aacc6c33c1442559a738b4ef

  • SHA512

    71d2f37e8719e9ae15fc2604b5cccfe03034e2fc747740485f2640d5280a643ae97a1066150485f572ed7018323cbdb6ed3c72d70677e33f5fc711e6518833dc

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\AutoUpdate\VersionInfo.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baad7817d96234c871e8897d45cb872d

    SHA1

    756d173804127da05fd753d1954641bc86692286

    SHA256

    0b070cefd44c37b111c5da039a8907abf4fe251f1a30720dab6cf8b10adf341a

    SHA512

    168974819fa7cb7fb1b3943982900aaee51c497cb5c52b08e9246dc110f783e409bb8fe160703a75a63f7fd8cafe3d763c52b0d30ca56e2ae14e215a73841a89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae68e774a8be95835104d9bb47f1092a

    SHA1

    56e24e526228d7cfe69b307a52373e6220dab165

    SHA256

    3feca502faeae06aebb78f66a14194f28beec49bfa6f33f781b7c875b9959479

    SHA512

    7f75bb45c7232eaa22e143323d3bcf32dcbed351a0a569f1ddb068ecd69f019de5f92a40b459d832189c4cb624f93cacc704341f1ba0411fe20f6537571c207b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    defaedf26ef21a9aff0510b1ca4214fe

    SHA1

    937342ac878fbceede50f888d4d70ade1b846333

    SHA256

    9cd81dd3f1e659118ece3c4584ef32822fce28f51f4ef7e87115b68928274a3f

    SHA512

    2e7afe58e9ff052455c2e656e2094c7ee6e0ec4af1d159ef2b792c386fffbed37b48e17e2c2b8abd4b5f5afef42b74c88ec489a74ef968ac68c38040cc249fd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dff0b60bcd2721faa0ec4e3e6a2f69a

    SHA1

    87546ff029f36d52afe07bbd7ab1653ec5792878

    SHA256

    0c7bafca2af8a1892cb6eeeeb8ca82c5de8a0beb6773ddfd3ca166cc961460c7

    SHA512

    d1dde76a52f23ddc9d994286710e7e367ce07d027cdb5fddd9fbb1e9b5f5011b7c9b738c3bfbeb52e1dc5cab10a098f20a93b2bfdb76fb415f5bfa0e49cd44b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70f492e61c97cc600af6c04200b606ef

    SHA1

    32553f3748b679efb388b1a38360ddaccc33ac0e

    SHA256

    a5585369a6d4d9339ef04dad89c7c4900377ab739aa231fa524b799911b0ad44

    SHA512

    e99f9d137abe95c17b815385850cfb154f3a3cbf3c694a1a65a2ef0cc1b3ffad34ac193247180dc45bca36d57f59871c46c3a209300e573f3a1fb6131d743da3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cba8940cbc41052ffed6d4ac97289a9a

    SHA1

    58186863548363cd74dba381d297eaf23b4f4930

    SHA256

    ffe0e667b0f60042cf551abb813cd77cd126799bca231165d69ccd54fc573ea7

    SHA512

    a4e153ce581c1999aa9a3b2db84368064f105a1d82e3c2653d64d798ab0c7be7019d874b78a3659edbf457bd81c711553281430ebacb79e69fe5bd7b519a93f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c54c9494436687a5658f84c00cb254c

    SHA1

    edeb10bb072b997144b937d6da31dd08c6011647

    SHA256

    7a31ab9f5c2a88c7889d1eecb5e96a89e00047fd817fa35c92eca0bb1fd85d3c

    SHA512

    e9878f1017341c40f0320d26db481254fbd515a57cdea952e0dc3f6fbe5a3dd5e3d39d09dc59ea2d185e56e215e8f6d46d55272d457bf04fae93357dc84d6583

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba1af25ea1800f94b7b3dcfdcbb352e0

    SHA1

    956a5190552f82bc081b356aac38bd9c08fe89ff

    SHA256

    fd7ae46efb88d48cd8fe433c0e8652f3330ceb825415fa1ec34ae291a277e3b8

    SHA512

    a4bb0865f747bb5335c76ee8955b65d370a5464def32abf4522260cb9944b4e1254319258b19cfc1a6bf34f359a3bcac195d24bf819f4fef83e95a8d1505b6b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74cbb4df2e422ad48dfedccaed8ff954

    SHA1

    c93a91db3e766db528f500415ebbc59f66b2d8d4

    SHA256

    6bd3230d37c0b285b7cc2dc0b0fab0b5e36271598b78703d106170a79c20b7b0

    SHA512

    968522a11cf1097a2de3c62bc13cc27f03e2a9466aacc1af22099e4a61ee1d2888e507d6ee3259b0995150e8824d187e3fb31cfa6baba467a526a1524d1d4bc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0891c4d438b2852e95b19ce11750b711

    SHA1

    576fccdaef576f698795b9393082da1907598c4c

    SHA256

    e01cf65bbe3c400e74b341c27105d9975d6e33e03b12bce30ae52572350893e0

    SHA512

    a6fa914bfef481f5961ee0f8921f47545ccf8c35dcf4283d3fccd5c27284bb2a6ff1c79fb528ac14bec748983693e9f5e3bfe7b0c4666feea291ed0ad305c2dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea974798fd807ccbeb42bdf75e366385

    SHA1

    ed295986e81bb8dc1f5737d7b93af9998936ab54

    SHA256

    72b2646f3d2a794de301fc3896d96afbaed6125796661954dc4291a5fefdf084

    SHA512

    37123fd986ff13ae06e6bc59fa773e95bafcb5a57a8a7f1d8c5e330ec2a208bc4de0b9ccc90c60c5836766d9028ce1f0d2d51d4e3b7b70a3257d49a6d39933fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a9f56ae439039cd0463ef074e80e498

    SHA1

    167c79a89f3ccd9bee9e3e58d0cb80f95f241ccb

    SHA256

    994bb7c42dbc554f50ecfed1e6e4abccd1dc6c6ca6258e2a927963ea8b990b62

    SHA512

    0682c7195f3009bda32a0e1d7ea4ae572f2ff32a1bb10b20c9046e4e9c0548d7a9adf5e5e24ccb49b0e60886d0f6b2823eef8f47b0f3d9e493503763080ec1a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cac132c383876af46184f7826543f1cc

    SHA1

    6580fd86b45d9eef62e5e60fed5c74a433f7b21b

    SHA256

    f63dff2c08a10cfbe5c40e34411eae0988519fbacc0bde9a9a84a75e1c97c4ab

    SHA512

    3e4c1ff8055d29566fbc6d309c928a138ecd4cf694b3eee0bc64b5baf0adcbaa82d255de058e1706381031e4d4d366f727840e6e06de251cd355aa02f8e0c5db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a6f9a3942cc756a3a6ae05df9461d21

    SHA1

    bfcd75988b5992c228918b74412dcaa5827df283

    SHA256

    731029fadc3c1348fd6e04e679aff16fc028e6a5c9802887b116c673492616d6

    SHA512

    c9594cd726dcd13a4c17b5e7b2787ddc31ac4916fb656c28163ff82954fcde0aa16162ec431e563558ad376b8bd0b09cb0f2c3125275d747aed7ecfb3e03765b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8db1c30ca1a4927411447fbc45a9fceb

    SHA1

    0756a31d982395401505877458bbbce9185b3439

    SHA256

    732b95ccc284007449f10125ef75c39f6d02c2219bba6182ec913f089e21ea34

    SHA512

    876e9dc048057a4ce8bdbb95f40b9f65a919fec1e6cc25467ad190fbd4aff51164d48d3872ee7ba38cfac8f9725a62febc558f0161cef5e4b2f6c58077b6ea9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6c9f313b883c6c51796ee095b896089

    SHA1

    de17a2edc1cfb2c0facf420b28e9756d20c70cf7

    SHA256

    e4ce737f9311a8ebbb4658014169a506d94dcae2b526fcca663fbee6d58c455f

    SHA512

    2bcd8e0afda4ba50c0e5b0d5fc1229fd76113bc235b06c60eaa5a52e015f218e1d1ae40d5dffc902494adacafb4bd7de2544b5f5e5cd683b43b74082c6a77415

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26751eebed79485f2486475a2abebf21

    SHA1

    025225076952663acb3dcd0acd1189068feaabc6

    SHA256

    4ea36a27a39352867d78647e2258c3fded45e727a4b3d1eedd3bcb5bb4a4da66

    SHA512

    2a258610f4ee7a99632cd93a6880b38ed1bc6f22e5a9c272eb87aa70fef4ec71577aae35dc30c0bda3293cd41e4b3fe641d8a495a0f17fa4a2678de65dad0d6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c73287b9cb9911c8f7311b737c5bd15

    SHA1

    000cbf4f9b51a429b2c5dbc60e77fcf7db58050f

    SHA256

    772287910cf7684e12de774e1a1658177a61bd24874c97dbc717884bff1f40cc

    SHA512

    1fd50047dbd437a6d93e2c2de5ec736fe53eadd9f01ac8796eeac25f4fe86d90d47b65c257a1650720b3e25809063949d81af85a6ccf28ea1f7d9e2d3f457490

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbb48957c6a596e37276fc2056d48504

    SHA1

    0f9a63695e0264b14a82bf50e127820e7f590343

    SHA256

    15db38d4445c225263c0d243340bc938a2d980b70c1cbe47fc5c33d5ce3a5040

    SHA512

    22d639a781abfc0df3e0e07a8e5d6901cd4479c7ea9c358894804728677b34401ca61f04f9dddf25d661786f106e7b7c365acdb37b6367a37fa1ec7f45f488c2

  • C:\Users\Admin\AppData\Local\Temp\Cab90FC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar919B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b