Resubmissions

15/10/2024, 23:54

241015-3x4fvsxemq 8

15/10/2024, 23:51

241015-3v719sxdrl 7

Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 23:54

General

  • Target

    Payload/Mabz.app/_CodeSignature/CodeResources.xml

  • Size

    11KB

  • MD5

    a2a62b525d590df0152aa8daaea33766

  • SHA1

    ffbc98739fab40b71b8bd50793f22fe2bcde75e8

  • SHA256

    d55aad32de5aadff881b11b331b9c9e00e27d1eb83db10228c2cc669e51ae7c3

  • SHA512

    42fbf0a552a78892c74443c64c45232e5d9d98ba3e06cb554f462151635ff2f2087f938a37c678ab058032e622bcb52c684f000550a4e2677dd11e7a48df21f1

  • SSDEEP

    192:XYo5fKKQ06VB02MZHDr2W4H0MFVvT533hLG56:oAA08BrAPOVvV33hC56

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\_CodeSignature\CodeResources.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32d9ec2d32ef60f553bb06d92e8ebd31

    SHA1

    7e396aef2cebf9c452a384790a0baa5060c7c57d

    SHA256

    3d4a4b38ec8defffe61b81d7b0e08f1178d8c646281c4a9a91f4a6443d5d8f84

    SHA512

    21c3f26d8af249277c9205f54dfcebc70f817dbd6a5014b4a791fa23c6a704959b46375f25f316e83ef276fe46c0b092beafe78a7131d6c93171fa27c5ae6575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c2421c9e7cbff31a3323e5ac4f5ae62

    SHA1

    7784335d553526d81f0bc67f6a0af776a9ffcaba

    SHA256

    41eaaea346719e8aa1003de3d3d1ad5db23f782137ff29771f62e1496f34cecb

    SHA512

    5a63aa65f8b845af334ae83081bed40c5bbcbd2d269b7de1f8091ee9e9fe58b420ea10fef772f75df9a856f743d050e342e1871d05603933e09dc4ce3fa86859

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9893ed827e2cbeec0e2a6f54787154a0

    SHA1

    d5cc2e241fab96c83cc51ed9466d3a78bc976768

    SHA256

    76471e1c9b9e9049a7477a2f57f11a3e2630702f9c69927593ea0f7d800f171d

    SHA512

    2aca69c8cb5d50c9a55fa32f9577aaaa45621c0a8d64d66f7c2eb36640eec3fc07293b489df85ffbf3094d63de280c4a2cf8b91a838d2917eb79fcd0c19137d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c1c5d3d709c339c5b8c869f51293beb

    SHA1

    9673219492b0a770999f424c9274173d3a00cf7d

    SHA256

    e8d67745888264346ac3920b2b60864bdaa9c615c2d0294468d030abc3cd4327

    SHA512

    309d66d4b43a1c7b5a93f3fce3216275b25c255d2f55accc9fc57e7cdef03ab9ad5b479eda3e360a2c82cfadd10eba267d3309cda6d5f513200c287ac04060d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    633cc7ab0579c5275f6231e32eec738e

    SHA1

    fee6b7de3b1e51a7479f5d4aeea31e1f74075874

    SHA256

    73de7c9e8b852a3c3b1458b0c94dbcfe2339912a5f53720303cfe48cc337be4f

    SHA512

    7c8324eb02d4d83ae9253a427a62283bb546fec4d384805797e27595708c63ecd978d7ec2ba3490f2cfe9ab5403037e8f37d69f6940c29b40f0ada32edf8f8c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03ed643b26cf1215e8016e331bbf6348

    SHA1

    4b3ec6d167274db442b602a62672ab969887f2d8

    SHA256

    efff2907c3eec1eba093075c9187ea505920b78194e38e17b8f33aef83268504

    SHA512

    37cad67bf081b0c8c2333ce37bccabb18f36df787b2f7792668e88b33480c1c99117eb39f146a25f388d17887abcdda0d430ea520c8c3ddc1567809e862644ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84028c1142a7e795da8aef505d8b816c

    SHA1

    94e052d118e80864d5d6b3984bc8de924df21caa

    SHA256

    a24101e53d43ec1d9a9143ab46353247172c39619116629dd764cb873aec52c4

    SHA512

    0bda6f117c62d9871540c4a406fe4276b22559ac6f66ae2b68dcf9c1dbb6323d692bf488f0a465bddaba89346dda621554489b4a2ac07026b4d6898927870a90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    080d1a1b5d5565d9a418e43111cbf3a5

    SHA1

    92140331af3a2cf1c6167ea6d03d3077b3436b4c

    SHA256

    89917b4eea2bb06df2c8e5c40a9eb5f99c15ea08d17cec1bb9fb7637cecc4d2b

    SHA512

    3eec7bdb15b79ca419d7a77a927f2ebe9cb0e74a24cda0e95e858bd0f6b64e7a516bf9f94d1d4b9f85b9506203a3c6b8dcbb4c24d26c8544c9b043fb5a02495c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    771f929f21c0ceb58323b8d08a130967

    SHA1

    5255d0652c4a8913cb3cbf514b641a8cc7a31353

    SHA256

    a00ca2adb46891c5d0d7181f188fff42b95bdd36676aaf590bd2ef098abf1481

    SHA512

    e7c2346196c6f9f97d59c8464bba32f9a0e7c289a9a901fa89afc45cd1992eb1520ba4fcc911ff4765c0801dc25d92fce782b7a6b44ebf629d38217109ebaf7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08f43d2a1491196f688b41684379c663

    SHA1

    263f5e0bb19b0cb60f8fc670a66fa5f90359a90d

    SHA256

    ac6baf57632f66cea59a87e9f7bb3c40eed24852640103a3e5e1830e507b1039

    SHA512

    57d5aa4c1f486cee75bb7f8333dc4fb2f1fb575ebadabd41434c11bbea4ac85107eae38c70601d7ec81256c22a068d39abfed56ca0e7fa5271900c55da5ba7fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6a2d751e5e832162080742b1eeab634

    SHA1

    4846f9b15c01a390065b5d44255dbb7bfeb24ba8

    SHA256

    3d982b0003caa2f73e8c1afe8474410d322de920614b6a5d43754f50e42e25ab

    SHA512

    70d70e4a8dff84f2cf4fccaf5d1d9636cbb094b12e7e584e850313c5cba289eafd4afb9091478222aee8cee1adb4a7a8c4dfd5c92e40641f68cdc5c8e1f64cd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d01948891c53ee090ac94e1c35b7c6b5

    SHA1

    50268811eb9490cabbd54de826378a81c0f5e7f8

    SHA256

    91af8d936b5a6ba886c3bb1aba73ae069157a3e9bb011ba35cd5790740688a25

    SHA512

    261d04ad77bf575a5ed40bd654e7503e452a1ee1183a731e7d82f3949ebdc589ebcf45f7cba7a0e8a4884f3e5083c2d3fff9dd6dd86a9ac952540492e403d511

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dbdd377826cb4a2ebffde862a483ddd

    SHA1

    5f66310ad463247dadc377d632c0c6f157b9db91

    SHA256

    af20a2b2bb5c46b6586bdb2090ee965e190c4fd7f2e123147801f97225d90661

    SHA512

    c7decd02b66b55ee309424ad42c0dcfa3b9588c79e0f5033798e50b23271576fe8951474d6500033b549c3484f9153b6d54c44dfb3d54da25e2a2c6f6088b1b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    512589fa6ead06fa07b8462c836201ac

    SHA1

    9389d81e69e18b99fca839368a4cc5c78224426d

    SHA256

    dd874b8934cb1286920de42bae525ac71ccf8613705138d101319ec2d1c38a6a

    SHA512

    ed995efc53fc70de5a73fc3f7bc5248cf8316d66ca30354f232830eae9dca20da263fedabe31a37b6b7640891c03cc22d88769a392f1292e2b95ee7b8f93bee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c9f242d31ed3f07c2cc294aca083ec1

    SHA1

    66cc9fde34f13e89b22ea0c4e27166bf01f49296

    SHA256

    a2a1f229fd33b2c8709c3659725c8b8b90491e42e9e9801082906f1bf07a310c

    SHA512

    9b548bdfedbf4d4655d442f027c575c48560b606c99b252d2fcf48ca4e146cadb9d05bd0a6d06e8fdf07c4d835843caee2e159d16cf4acd986c4fd02f431ce0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c4810131cb1b63cdcc7f6e021bb20af

    SHA1

    5397fefb3485d9b24b24478429f30f04bf86443a

    SHA256

    39d463633d865a39cb1ed195894009a42719e813e0ebf15f63da6fe60517fef5

    SHA512

    878dcdd398abc7c70d3611b209592466cdb5a968ce18a91e19669731de600145c1a192efb98caedd53f2f5e0302d0ba16b8e884fc741c24521277a181ca8b30a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8878bb26873a331f4866dd62b5999db

    SHA1

    ab470d716d1702aa5412f583f3200fd3fa08c004

    SHA256

    99ac1fc2a759e9f9b66677be8f1d3a693eea163b50f08b13a2ae0c05a2066683

    SHA512

    a66c2d5e0091eaafae2f24beb42640cae648eba547ddc6ffda885996a03e5e755768983036885e5fe3fe8eceb8d17902e6138bc302eea67d0df72bd510dcbf37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f84d136b97ac115fdf8c6ea82cda2b4

    SHA1

    01445cf8c67ab73bd1fc1091b27970c43ac12fb2

    SHA256

    f33317cb35b626560578bfb9767a3b3cee2f9c436a9d76de7a7ff1ebec1f8f54

    SHA512

    643507f2f4b48cd1233e87415e5c904c5103ec6d1dbfdebe755e98db79b66fd9e995096c010d7d157b90548417743cd35f5d266cecc47f4735f8166ad7370c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b834679bb9a90ff8c19614f935f90483

    SHA1

    c4399209df90e4d237fa33fc716607a412f24cc3

    SHA256

    a1302fb18e19347caf7a25b069b9936661d2417e342534740001bc0ef3b6dc30

    SHA512

    089cf207b1040c120f32dfbae364bd7281599b587703a7bd7cc2397452bc40a363661d7464db353a71c125dbaceb3ede517a3c15811de2ff0c28d87889a6e4b4

  • C:\Users\Admin\AppData\Local\Temp\CabE784.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE7E5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b