Resubmissions

10-11-2024 17:20

241110-vwe3wavjhk 10

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 17:20

General

  • Target

    locales/resources/Data/Managed/UnityEngine.ParticlesLegacyModule.xml

  • Size

    1KB

  • MD5

    3831b41487474f47bc35614470de3f1d

  • SHA1

    673cb82b24ff8ac55a7e2bc108237a8a25e11e1e

  • SHA256

    67cc1be67cbea337ff2ac68e2accb14fe6c38a463c2d8480c300597cd3eadcc0

  • SHA512

    005172c244213b915852af638211d5e6866dcfeb7af3e15a896c00856495b6caae41533ef49b31896544ae6139eed1a80238fb8f61efbb26ce862937edbf4961

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\locales\resources\Data\Managed\UnityEngine.ParticlesLegacyModule.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c59ac72d02a6fc7c47c032135f840cfe

    SHA1

    58de3a553d8c380d1d355cbc98f80f65371e9d00

    SHA256

    42ed8c82ee431d6f2f6fcda67604497327cd7da39d4ac3a716ef9a59d8bd2ab6

    SHA512

    51a7437597a97b74e5a2b7bb0e1b916807bdee5bb503788e3740d1d8d8c907ac7a2dcf39a4464cc6c2c34e5df741045775f8e7760176f8a9230fb46f587722ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    479d323fcc1a43024c8a545647999898

    SHA1

    fc08d9793ebdb4798dc3a31f29ba9b04371f7557

    SHA256

    1a11fe881ce1787d59c4d98edde69961e5c5cd4c9059ae3b80694f2a777508e5

    SHA512

    9f60c858111d17b8d5c373cec27f53e5412c5161e7dbfdada40b16926027cae7115cdb038809e7d472fb2447f1c24266ecba45545b8c49638defd55127a58cfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    315d74ed0d323fc80d66a960ee2c9c44

    SHA1

    2c7893652a3b58c9f5611925264651810ef0288c

    SHA256

    e3d7ff55fcce66b4269b05d251a14af415cb71cc38d9f627d45dacec5ba71184

    SHA512

    c279fe8e03e83bf8fed3087e63e82372302dd752cce0a96842edf8b03367c539192306a7c7c6ebdb4046789497092a2131456b83cebfa50737a505886496b6ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff0319fb9c0f347dec05a07330ba693c

    SHA1

    d3dff0b5979a96f37c0a27658d06d8a1394f1821

    SHA256

    59871c2e912ed1931314885457049d0123da91de4de8457e19ae73fa7c77c5af

    SHA512

    8aa338d36c0b76756d9e413b8ee4686b69651bc5c3b40bdef0e0848d46f5175c5ebc55d70a5591f476f192020f0dc4601a15944c799aed2ceb0f6fcaa2737e30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    067e99ac732abbfe66d4efcaaa221c94

    SHA1

    b3e7a19db1c73df0da820c6b08678ad621c7444c

    SHA256

    4d638af24a3b865e05b57c22626e20bc59f8837c3728b7e5e376b60a60673d48

    SHA512

    6288196d98767a43600d353802adf4e22f69de437563ca3f7e8b4566699516e7a3069d514836d3a7e295c8863b0f18d13d2b45f38bf18ba7bc7a3d0d324a5f74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    888671c2a3c5d792b8cd282dc0cd6b88

    SHA1

    1b20f5c2475b88703a0cb910511289c538765bea

    SHA256

    092f4832be9132ec43fa05b3e362cad718e559b45973b9f080d1e11a2b300b50

    SHA512

    ceeef0897164c733ec4055d5bc53fbecca32ede30a2660f9ae18295ad252876a90f1c01d7b0d036feee857734201afed59b204ea2aa559fc170f63926c0d9948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    368e6b2e43dbe01226f49b17f52c92ef

    SHA1

    fa52f1b8368d14965223f9d50e7959c0d563076e

    SHA256

    6452da001471afc5da594b33274ba136b2e8b0c6d9b894b872ea90a35671a983

    SHA512

    13b9280d63f03cd92a39e6d19d3e1a5fc09e1e6696d794f981d9d959b2c5e0022a99c9456f52f858e727f98f216ecc200ad6bb2b9c63ff7c9c3049871ee8d2ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fa1de721e14c5da5ad068265e226c06

    SHA1

    1060ec72ea09c5a638728ab9beb79286f1c7458f

    SHA256

    c68080fea7b93c36a6106d590962ad12bafec4436867f1067a88634b7ec42bfe

    SHA512

    caff4496c62dbfe280aab538e253ef64015c16e978ab38037fa078233cc7fab86a06948e3187d6e3f803c9fe6a5b5a4fc608f174be58fe79fc54d068c1a9ee75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3b65eb5330ffd352720b39455292634

    SHA1

    81571bff1f3a4d92ad144c6f1e964fa530ece683

    SHA256

    3d1a60d8acc7e7cecc1336d1c4428ff44ed9561e101beef8c343a3f221602457

    SHA512

    362e6501455205750f4e1adef98070bef21bd6f8f5422c24f13f91e070551836721af5baa8aa094acc063b363fd8c9cdffe43a11a99ae4663777a2ed8a8d3043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ff90a02725431252a1d57025c70b3d5

    SHA1

    3bdf54dadff0dd28ddd4ef8e181a556da7e0801d

    SHA256

    503b6dbb3e5172e35b1a2d86e9497de74e92ac49230fcf8155080a8bf74c187d

    SHA512

    80b1661771eef75c68f0a7c23fcac180e26a5a8ac4fab4bea84f68526f6020dd13bd67f4e52843afa0c5a851d7ecbf0a9e32dba67214b6c4a1c3d0cf72d99536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f4a8bddb7a11cf47dd9e5adeec8a422

    SHA1

    abf269fa93529c00a1bab936dd8037b5305a09d2

    SHA256

    78b5c135e0264b0b445babb6f60d021b1d326834800a2a7f6f05ee348672ad00

    SHA512

    859fa76154254a1c0a78848392518e8b0a476640ec0d6fbb6a2b3eefd41a46a06d696516d5e4c38af8a573e9ffbeae9386cfb11a293e65323cbd4d18a95daad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0465d83acbde2637b8bfdcb3036a0b17

    SHA1

    0396512aafc5be9233c2e90c7a71634301c8776f

    SHA256

    82977877d4d98c1f7236a01b3501593b5d47666d30771c69283aa6f1c8e9272c

    SHA512

    e46f2c5a1593de324617879246a08c6e67ce595dcc9b2d4c3f1e6d4eaeb554e2ca5c24997667639ffa9d2df51e25bfed7362ae5f58ba1db44a9f4c5471e0d917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28727a4113c9e50e8e03ed341539583c

    SHA1

    91d4febea424cc39116e5ce40271f7b9de2b4afb

    SHA256

    41e982562d90b853c8298fb0e93acbcda4fa769dc2ae7189a96d2f1897707b97

    SHA512

    9a439398435ccec829aeabb0493b3609d4f247486ff0d1cd1653d1d3f908cd856b0bd35e79462cd621af7ad4e6e36fff67bd975d12135d01d7ad20da28dec2fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    389dd4aefc71648119fe877c85cb6227

    SHA1

    b3ee69a8a99463fd07fefe2e2affe6babab0dac9

    SHA256

    739375be29a5ce736fd5635886f5ba61238e6a77d0e47de5dc0868c7c87715d8

    SHA512

    e586d327b39a9532aba76053590538c39a16c8e002685571d07c15bad8ad8663da1f3e3339d8130a590db07b5c6b905fb145b7262a2124c9e2f3ba89970e5a5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f15effac744f596414ec21e1f1f18569

    SHA1

    2e17ff252835e54819691120ad6981c0dcb89405

    SHA256

    2801a9b41b173fb14669d7719ac98d084bbd5e38bb515b3a4845a96711ccec38

    SHA512

    4b22b96fe4b209c99ac6c640e415cb9cc759ff4866e349d747521616dc2f879dd131db992d022e4aeb8dd9dbb1ca73d4654df6da46886f219ec05afc28a6d49b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43b801ac04b11febd6ca764caaea33a1

    SHA1

    08a11ef88671dc5a7a94e25c332560f80542c533

    SHA256

    e0d946c167b876f5c55fd83cb1261775ee1707436fccd3cffc511ce036d83f26

    SHA512

    a9038f50430e1590d85a223f07b132479e4fa8f97c354dc5eae8daa06d6960515cace84f45f8ec6b256ee4399649e851bdaff3024ebeb48bc353c48f93dfc4b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb87fbf184ae39c4fce4ca345512ab80

    SHA1

    4bc7fff9a0e8b68a085c50232b32c1c64e6eccab

    SHA256

    3997939d58740eaf8d1c10719b3e6b9db326c397ff8dbd9209e7bf6479d531fa

    SHA512

    849d969a8acd494aba14835f44554f913c08a532b45ee54708f806c660b682d2e46d4cf3050d89ba0b927d231eb1ea10a9e4f5518b09bb228390ae9d8d500682

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c58a9ca398055e42ca5e8a191cc7fc2

    SHA1

    d613556c4763149a502634f1feccb505c91317f6

    SHA256

    5f405fd7575260c597bc1fe2721c5dbd386d5e5710ffbe97042012983068b17b

    SHA512

    85787bb6f1d6dfa2a5c57dab8c7eb06c17a3ee6923dfaced9b8811ad70316a5e30768d56d68af246b431325e87ef852681d4fa0acd982537e3f3c8d88999484b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cb09bc88d7ce731b8caea825b8a7797

    SHA1

    2d2439b12d87a36c085c28cddfab3d1081be6d07

    SHA256

    6017c7703f1cf78076a6299f2750565d1b9c775380704ef8d714f014f117f416

    SHA512

    f326ed5a2fbcc0c2d7c2fb9e84c946f64fb9af982ba0eabd9d7b4a1fcd0ddb1d0e65db4b0b42cd83f95bcff174a16a9cc9b20a3318b9a8d1bc9e958405206984

  • C:\Users\Admin\AppData\Local\Temp\CabDB83.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDC51.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b