Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 12:05

General

  • Target

    Rebel/System.CodeDom.xml

  • Size

    366KB

  • MD5

    91af6294c77371e6773c35cfa7edd068

  • SHA1

    0c24bfafb91ab69a3a7a4bfbd15a9c346341c487

  • SHA256

    92287105a0987fc6ea2404e799da13f2d57b228a1fa3039a6d0cded00d4344c5

  • SHA512

    bdfb5c13ee54b88d029bae6a65f932bcf27b1d71a5c373325b2e7484d21d49745c2f3983da85d50aeb6e31febbf0bfcb3cbe46415bae15877c20d54522b65904

  • SSDEEP

    1536:l2e3vRrYxV4Tm0/Y/LFC9YmXVT2Y3mBhuzRKqn/gCOIFnffP6Ks5ATTglg2PLaAR:lK+c9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Rebel\System.CodeDom.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18b590ae3a0db755f175711384e552cc

    SHA1

    e56a4fb04a783e29fa9a83ef8e6e6dd8bb6dbb03

    SHA256

    235cf286f5223caa6035aa1f6b174730435c74de3883499012cc31225f3075d3

    SHA512

    c5d7f1a05eaaac5d95efa7bbd8c570a21e33c6e7bb01d3748f629f99ff6d21b13952c49f83ee16e19e7b6c1fab85494a01f70d10706e30bc0d512fa1444a8dbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e120d8ea4436101e08d2548ef4114fe6

    SHA1

    704fb8f031d5b9868c950cf2a646cd474d652674

    SHA256

    faa5a5b53ca5b8ce669c0f51ec958aae3e6a06a6715580e32f6f996aebfa5f21

    SHA512

    b93d337bf5377c3958cffd2961436c6c34ebf649d6a73af3613ce383d1432a2d19fd373f0902308ecf6f64899d9f5725c727a1d8100389e71aa0187840c48a9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d578b406264c38351af95566aa8cb4c7

    SHA1

    8a3808fb97fb5564a238b7cfd7e3bd2e2627ae79

    SHA256

    77ed251c3c28754240b827991c4694f1bf14ee0b22d6c7e92a938ed490f7f470

    SHA512

    2a9ab65a90b729e28a07b324699e24b2c586bb71ca8da9b9d4ee60b464f2661e69b628ef5875c9227ae531fe9289030176c8d2d15cfab51b1c0b1f9750ce340b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f22122daf4c228e84b50ace80b13530f

    SHA1

    58a250218202fcb82e7f10e7e3b7b77a47134bf5

    SHA256

    a827c2f60c947b815aed9073c2ab9b4a098d10e10071f35a0c2e836dea3e51c8

    SHA512

    f224cf50b055f0d0098a4f4e5be06dca12dead74efbdf3e0f5418e7e6b6bcda02c26e8c081b78670b79bb63e45bf0873f294cb6b9f48970b0e7750ef9470d290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a47648031444f2eea5646d90f449ddc7

    SHA1

    3e1ae9daa55a0d94132c6213a0c2d7b338a71f38

    SHA256

    a82c53a3ad0fed29ffef4749caf34bf4db507cef540f16058f264f6433fdad1a

    SHA512

    ad4699aaddbdef8c177865f2e7d6c58975098625af26163ecf7af2c11ec8be304e1f7c0d9c8c8ea8b337031099e96878c2dfbb27a462328cd7cfc5520dd4efd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96b903b2b2252ce064f44897849b137f

    SHA1

    03681335f44db41f03a08ca40d6a6bbdec30c332

    SHA256

    f247c69e3f0e6f4f7f88b01ce6616faf18572190cc01342b284877f01160e991

    SHA512

    9c134d8239a04125d9c771d64ad75640424a67e21133584f88deff1ef0cbf1184a272f778d51758ae9d13bb3157481106000e5b2a93e14671341cf0ce3be3402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7480d270ae8ab0fa2f2db501f2fde31d

    SHA1

    d4a82c1148b5f4312db755e827c23f240efd1e44

    SHA256

    9cca992777780c1575c26f5128fa23f81237d30eb1d027cc41ed0345f2213ed3

    SHA512

    f0572fe09bc441b4fedaa1d6b0bf7875a65c5d637654b06427c8521743062250c38dd83548325b975026ff72b33273098c9ac05c143a6d0595b975b8d27259c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e7ef33419f24b349bc6536e9745d723

    SHA1

    8a1e480772084b46d6fdbf5a2d9fe716a20a7f7f

    SHA256

    30b93d2e45e48eeb6ce6cdeb3deef4c9ca5d4746d7caf9c5fadc00fb4936b8f6

    SHA512

    90c073df07cc65089ee950e0e7c9150fd877e587df0c868af10065c5a914e9388f720f00a525fe6782ac63404aca9a70f44d0b0800127241ccad94c2643a1e55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b48ec077760fa42e28b4fa590a9ee0e7

    SHA1

    bbdc5c90780dc2a1822ab39f1301be43e1e3bd15

    SHA256

    ad91cc19e2fae52bf0e936c49f6c7d0a8cc036604b0b5fdc347613ec3f0067e0

    SHA512

    fad9eafccf2f8f3276bb3f6e4684ef94c159d90dd7d44452683f8a8cc3e526547dc3f4bbb6625ee6afb56c10cfbe215f270645ea4ff0f1baed1b6a42e21b3e6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b9fd141df8c22209322edfde56bacc0

    SHA1

    e44890cb8f1d3497b9f2245c7baed8d45ff4c95e

    SHA256

    dc3d3910ee21521c220f6cdff0fae6670ced0888cc5f3b69af4213f5cb7f7337

    SHA512

    d7b0c9931ac4b5f3cbaf85b701c14e5bf928c4d69662e8d3043b58d16f2d9fc49b6f1229c2d544b891933b4e49cf52f2981a73138fea372afe1af6f5df238948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    834dbf150d43b356ee4197d52e6317c9

    SHA1

    a573e05eb30fbbaf1762441b120c4e437e839240

    SHA256

    d918a4ebf56a875df9e3c5f4fe11a1359b4e9d1af94f6b855d4a4c547d3d272f

    SHA512

    3b61164e74e26dc03675c6b5567f06077904ba5d798d8332fce0b32a6893f25aad74632049f09f5f91057f53f7d367ae6bdc43d27e70262b5b4464eeed3356b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bc99433652a415a0fa32ae1c579c127

    SHA1

    ed7078ba2af135c32b8cff1359286f060424e654

    SHA256

    babd0e71d5360040ec0db24d425b50065ad5772a61ebb64eef735f6438d7bb67

    SHA512

    c4a9571f59010455e4a9c37a6c2b35579cc1ba63870ce5e2078e5079e9dcbccdffe59895778e5c7d89a6616d7c9f2726300f960b065e9b78a29ac7dee94b4390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8785f1100f7cf2e1637507f0fd4e7341

    SHA1

    3ccac687b97417b48890953e061256cd50cdc7e1

    SHA256

    143c8f06d302b65cbdbee1cf25bc83b5eafbc111487ba5a6ca6e1cbdf2a84396

    SHA512

    a39b6e9b6aee8fcb605627aa84a10f56dc9c5026667b7342ff4803d96f3d2e4791f4509e008ef36eae6bc40a0f97323daee0a356424b9600e1831bf5eee7ae87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74933b859f8924a8bea01685c483b186

    SHA1

    71c6bf82766f11c2375970655fda0c401faec1a6

    SHA256

    b10e5cb51cf2ce3896761e2eee0fe76c7818aee9883f8b607380589ef1ec642c

    SHA512

    de82adbb0817cffc246494fd0be36c5d9420ac3ab9ee0919283b4494f5d5616f77e68ff2c0cb3126e31209c2d0eb8d0d5395bd6800d86073370ff56f95ec965d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13203682914ec34feb8af73a54fa6685

    SHA1

    54621404c24875792b77633599bd0de0008ed5ac

    SHA256

    b00245b66a7a3692ebb70eddc4fd6edbb439cec1f2574a5d45589d5832b05a31

    SHA512

    8b0867436713497f6c6d1e1b5e8e723b7560eb5c2532191cc12a276ba4c8efeebd079f1c0de65195767902482d6c7e71b2ce0d0cebef812cd453841971dd2e7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5efd5fd3b1bf01db9f1cb076bbd014e8

    SHA1

    8cb7661173aa9b78c8f69068898607aeb8038f05

    SHA256

    b0d12c015b647aad59cd1e707ba1f0531d966a367d54e2b764ba5b7d4a0e4d0d

    SHA512

    7ca3ae52e3bcc01c3693d1eab30c7c7f1d0a62ca7ac6ea7ccb2384abfa430b0f2e0450bf33238d14e1f91713065c8b1484a7f21386ab8b7212ef1b00ba14746c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22c2595ec242077d687a6e7a8f9463ac

    SHA1

    26c93d1538dbcce1c3028a38234b416e0b2ad197

    SHA256

    5ab7f2c198c2ef74848b5ba10ea339a843ee07a453cc03d49089791eb5202405

    SHA512

    f4d255b3128d4df7769cbc7c0d3ff2706b589789008e8a72a1af11079223f5c413f1d5cff1c5cf16ff47f7ce35d6f49f38911fa6080d44e62d1c51e6c10879de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dc4dedeecb073a5eb16938a00655183

    SHA1

    bfa40682813ccfcdbb211538b1b700dc30cbfb88

    SHA256

    d3663be0798b9b562fcad834c765bdd5626ae003813a1605ea989effa0238eb4

    SHA512

    260ac691627bcb9cf17a954510f9f62148f051995b11bc1a2172e4b464ce3e74721de9d6addc229e774cbd06f795e83a509bdabbc4003dce73da914c49c5a7f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af5e1b54cd92d13d2362751d1eae9880

    SHA1

    f975bc5bed78e464a8bd252997d8903a4066f5eb

    SHA256

    0fddd5949cbf6fd07a32fa0a4d18c6241f346149e757c72a6b8879e77c0e89d1

    SHA512

    e3f655ede9c3bbd8014ddb5e15465bb4d715c94a10136a85c384c229a4f7490937b7e250cedaed1a69a7476ceff15afb7c13ccc7f7984978696936e709fca4b7

  • C:\Users\Admin\AppData\Local\Temp\CabE562.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE602.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b