Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2024 10:02

General

  • Target

    Kraxx-Builder/Kraxx-OS-Builder/Settings/AssemblyList_4_client.xml

  • Size

    15KB

  • MD5

    4a24bad44bce8e1f086da0e75d15b7c7

  • SHA1

    0c7c45e72c9d2696ee25fbbca726099c041ca455

  • SHA256

    5e0a298d6a3304f4d6ee2f2c845aa89bd223fc9c7735d58c46362cb4625f85cc

  • SHA512

    2bc19cc437d4cc3346c4b35e766b0c83e3820c82f1b8a782503eb2f58b54094af15f126c7aeda3b856d317837c76b913679776f600bca721c84b1a20907b402b

  • SSDEEP

    96:D7J93M9SC/rtM82BWyt3BPGzzj63xzYTDsmRo50:WScpM8X/3smO50

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Kraxx-Builder\Kraxx-OS-Builder\Settings\AssemblyList_4_client.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c35441b0f74c968fa64b7b5e817d0c6

    SHA1

    2216fa89d4fd072a390f8aef6621f65f97da01a6

    SHA256

    d842601e2ea14f06ac4d95a07610a84e4156efd2908b1411ea427a6412570f05

    SHA512

    f53bc9bc8c735d4af89a4cf6a448b0ff1ebe49170fb6644af941b5b5f2879698232f246c143845dc88825d0325ab6768871e3645e1073b93c258261fca47fef5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75e84c93b4b920a426771c9a859a274b

    SHA1

    33c9bfcf1203b06e8cec33084b28efcecaecc94a

    SHA256

    4ce34b6dc4f2e3c198e8f42037fc9e6eb5319f65ca2bd563454ffc04c08d10fa

    SHA512

    bd9bc0075f3ed49abd538e459b46d3eda4929661352ccc00532656d58eb5f2bfb5a322c7a3aac65349105bef33d8b3f2a35bd95884c0dbbebf5a444b7dcc7aa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb46ba9bb429c58082e648a1042a3c72

    SHA1

    ad9a9abfca579ad204f0d7e36f8618b6e2b945d9

    SHA256

    fa1689ee34c8428933e08d2ef18ee65bd18b75172ed9375c9c6cb61e7db9fa3f

    SHA512

    eef1fe4db9e18d57298d28b8bddcba7f30b8cca1d4f3e0bee1b90204aff878e2831f5e1a61b322d264a87d9261680cfd87730fad141640eebcb4bf4c9f6d1aaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba05ea11bda17e2c07254d199c2454a7

    SHA1

    f012d3f9b10812b68ad88ae861ad22ee2c805943

    SHA256

    5488787c8bf6bfddd8e70dc8dcafe92c91af3c43ae7d5af4f809ff28d278714c

    SHA512

    5e230e0e9bd3e11c6d564f88f4d0b55f9abf41bbe9876f7ad6acfd91f826112791a66e3ec7f619054ae61c46c10aeb24f3584c458d202ab45d93cce319b3d272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e270bc1ac47dd97a20b3714cb4ba5873

    SHA1

    c851747422611b007d0b2f65e00100e77141fe4d

    SHA256

    1fbc4d62e74aebeb0f5100a90f101929751bb6ad05a1788c5ad35bf6c69a4ba9

    SHA512

    4dbbf517beaae3f9eb59820a46b07f1bbe37570ad4d7285ad0c56a45195270c4115a2a48aeaa157aa2a40ec7d7375503bff0d469583e845f4ca870d7c3dcea55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7d5bba22c899ea6758acae6a82daac5

    SHA1

    edb1e91c3801a23172a82fb08db1b059589c512e

    SHA256

    6c83a7c7edfbd7c5802368d2645f54b8c939f18faac91ac9b440786a6cf16c03

    SHA512

    7af86b92e08484adc53f34b348fa0626f43f3c30011897e079bb831fea2c031b1d0907f815b455db7b0f2ea9b6bd2122d7e0fc5c2838331485ffb98ff593d6dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec357b86f61b7099898023c336926a63

    SHA1

    5997644ba28dde3188882840aa1a61ade2921eca

    SHA256

    b1e14b2c6011068e65107cc8f69ab9f504233c08a63ba50586287aa1bff9c998

    SHA512

    fbea9b38d0d9a8957f8b79b10b3ad41447d0c9b170bb51dd53c1130e39f502d992fd3c705a8d00e4598591fe7a321f476f95f4a9028721be7e7a10ab7debab43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68e00cd4dbb8e320008822713de47c95

    SHA1

    88a7148f4e17bda8bf57ed62a602b834d34927dd

    SHA256

    983ac19d195d08703336bb5772149e3c71f9cb40dd05f700a7cf531083a987dd

    SHA512

    4bf5583dce65363ef5b491f708c9e2fac30a4ced36d9b54552be8c7cb4ba2667b50169cdff9b9274a062d2b6540d1c8254649e39ec4793d774f5576e4adf43c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa410c2f94159aced2d1bfd91ee5e70d

    SHA1

    58a5fd75a35840fff41712168866ed7f5d3a1289

    SHA256

    129d05d9788571ba3e2e1413d5160886cbc25459d191fbed7a8dd5bdb26bb931

    SHA512

    2ab7b0839b45e3b2d88215335f9a8b4319e44bdb0fc43b607ccf2a10d805a3c8d134a804e902a8a7d8a2cfe61e769bc3575ef4b919ec75467362227b9ccf1eab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77a956fb64218e65c912e9409a877de9

    SHA1

    b943844a3be44acfe15f5616aff3b2e5ad9ed03b

    SHA256

    6574100a0e93baf31d014849d8ad5d330a7a49b17781d102e7f97963c2d3b541

    SHA512

    385051d61c360106b5f9c16d3fe98fcfa5ba25f61712842240cb624d19cebb3ee3e62006f50098d1023b6abd927b52694602b567e6d2c2766c70140e54aa42eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36f7d84c45374b4152148142ce76b863

    SHA1

    0a0490513e35a4ef6002caba4661cc43ab231dec

    SHA256

    1467ce1668b0f167f1911ebf14de41d44954b4a600f41b44613b366fbf0ffe96

    SHA512

    d3866f662cfbbcf8ef836bb83be17cea540844c9856b06669b7b79451eed9e6e934b2689b99a78a39bd37259ea87143cc5529d9aa9790b38fd3446e97995b8b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf7a48015180f01c092125010e251c93

    SHA1

    7c7fdd0403cd8a7918a5b3096a02074f644905e0

    SHA256

    92a79c9964049273ab5ef256e75c8ba3fa47a7649cea5b21168ede3d1bfba435

    SHA512

    01cf2698e079456ed300e94405cd230cdc7ba1128a24cc94e92187b0f7f5685b4cc3616af8e7f4058ff1a05bd6fd74effeb9d15773f0bd8e76ee75354ccca2ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7446467304debdde3babe7025cb0c4fe

    SHA1

    a429e82f60e927d986ce08901cadc70c3614105c

    SHA256

    7efec15ba05bbceac24237f714fb7c4c9fbf40718565055382d22c5e888680bd

    SHA512

    23d56381e0976cb42ff4ebccc009f41869823ba72b1c62d737a32f7e6e6adeb1ba7dddb2e28ec2f1c41d7c582b0338566a5d6c5c749c16d691c7a3cc44cee612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6254dd7a333072f4fb04cd8f5ceac6d0

    SHA1

    5753132eff3fcfe9e46c0dc73e9a190c34f3d119

    SHA256

    a1834274ac3fde936c7bc209489ef719d364b2e3e5079d3cf3e228d864046d09

    SHA512

    9f6287347b6e7219db22bc9e39ea95e2091b13a26b8f9048ac06e27e01aa133bfcd01599d518311fb1b8d398947a3db6ac0ba6ad1f71a52003a10d9a2202bd4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    836cd00224d6cb502df4c8dc95ab0b00

    SHA1

    8876a048982160838850f0df055d0a1c0ab34081

    SHA256

    33d55c0d9f58e1c82cad0e2a480280b3cd4ca7fc99208989cebf19ae7e258ed4

    SHA512

    42684f38d431e64dd5924000cf863dcc5e6bc8b2f0cb60072258c7ba43eee04386fd72dea51dd824586521f9a0cbf46749738b6547e35be54d4e0c53fa200221

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ecc8b5d85dd0c718eab1e44d4240ed3

    SHA1

    2a546394e6416ec181a8a3aabc294c7f316c5330

    SHA256

    bc7c7d91fdf8cdcf7310ccc3a27551c793b9bee37714b4cfb08a5f1ba2281ed7

    SHA512

    54846179f6821b14b834c7734a519912cdffb25fc592438fcad0d0b82c95f4b149cac65d837d3b83e6e3556b5587944bf6229f460559b0e0622c6a9f815c6e22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    277538790cbdfec3d2e67c27d3885633

    SHA1

    78376f339487a135b990520d5746dc563b75f5d6

    SHA256

    bb852ffa4cb39fb83968dd680dbbdb6ede735ffaf305eb8a04ec6a960b7cb71e

    SHA512

    447f471ba6b901b1c2aa3c6c6409db45af7d3e6067beaf31aab02e7f01c96441f09364d96c5d238c3cb6dfffa50933545a46fa05d0402295053cd8075e1d6338

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    728942b1e865c98437794dd919b8fc27

    SHA1

    ab34fe18a028d936048a6423b53d32b80d6c82b5

    SHA256

    7b52563164f4eb7036081f47c06b833498f63b5c74b46deec11bf085dfd8f599

    SHA512

    554c8cb6a202ccc981a8e8060ef648489edecd61d1729ec54369b11ae5d4356bfd0a47f2023f730325afdd874425f49d52c235e80dc25a36b9776368c90cd997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1371de068f1dd82156209bcbf33c9872

    SHA1

    db2530ce9075d9d539634a47482022c12a42f685

    SHA256

    ad1cb79365bde3bce1133bddb0bc4ce9ae6fbdebc10fde4fe907b4875c4707b0

    SHA512

    e60b72bef8f68ecff87b652739075e1650ef0cdf20fcdb3dfd45182030c4f253ef20e3582a852e489dfcf9879bedf450ac5c268f5b91dcb78cd437a10977f6c7

  • C:\Users\Admin\AppData\Local\Temp\CabF089.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF0EA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b