Resubmissions

19/11/2024, 15:13

241119-slznesybpk 3

19/11/2024, 15:10

241119-ska9faxelg 3

19/11/2024, 15:07

241119-shdxjsxeke 3

Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 15:07

General

  • Target

    Yeis 1.5/Newtonsoft.Json.xml

  • Size

    696KB

  • MD5

    d398ffe9fdac6a53a8d8bb26f29bbb3c

  • SHA1

    bffceebb85ca40809e8bcf5941571858e0e0cb31

  • SHA256

    79ee87d4ede8783461de05b93379d576f6e8575d4ab49359f15897a854b643c4

  • SHA512

    7db8aac5ff9b7a202a00d8acebce85df14a7af76b72480921c96b6e01707416596721afa1fa1a9a0563bf528df3436155abc15687b1fee282f30ddcc0ddb9db7

  • SSDEEP

    6144:XqqU+k/Rik5aG0rH3jGHdl0/IdHXpgVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QA:DU1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Yeis 1.5\Newtonsoft.Json.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe750d6012058f00407101cf547efa17

    SHA1

    cfb8a1dc265dbcaa7f8979ebbf49d71a789847fd

    SHA256

    382d2fc73dbb087251d35430d5e528ca6d744c9cb7d5de894e7c28dace551150

    SHA512

    6c6cabef0454efeb50a786abeaf37c1c3de10ae4b48182c659c84e2d526b46e43d4554ba593a3ef2ab2879bcbbe677888f747a09066309a1e2f97341a044da3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30c7ada92d28ad46d3c0a423ae0e04b5

    SHA1

    0cf89ad677a621ec2129784b125e611a9d99cf87

    SHA256

    f6ffaf05b02a5b379edc07100cf5036de4c99a3484a79108bc3aaff21df52f16

    SHA512

    89bc82a4c840fbfa2bcfe11cb2a2c1c70a587353b5519f05f0e601f55a40706eade679b91acd7a2d34ccb53d63cb4cc670d0c53cc2c460cb70a11b7633afee2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d8a9ecc4b8854899edf9423c190b3e5

    SHA1

    593186e77718343bcaacbffdc9acab9f3da4308c

    SHA256

    e3990c23a17f146414998511456561f5c2621d79672616f6bb6ad6b2239f5c50

    SHA512

    1fcc2569834d30cc6bec091267c7aeaf4878368448ec42d992c4b007c75c5b9898235afe841367d262747a3c37025e374651e9c1a14fb1b3771c7a2a98be819f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12a079fef9981ad490690fd792aee663

    SHA1

    1680a0247f4d32ec87b6844693ee938ce4943ac1

    SHA256

    4c1e175f41e1715effbe4b088f8b6da4f456f1d03be7ea97bd4d5873934e2a59

    SHA512

    2b8d93d82082cdeec4835a881b26f690c2ce6cdad57380e7839f292366bbb3b92c7e6fd07dd1697b315da33ab83d36bdca5c9957657a04c32cdc047bc554f1a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ceaf57a03884a3077714bcb437c53d00

    SHA1

    91957f673ff73ddc013091ca5a39e7e96254f834

    SHA256

    8ca82d9ccef98f126f2c69b8fae87eaae6e4f3104bc41c79197a2c198990ccd2

    SHA512

    726070faa604272b35053be6a338cbf0990cb30f4ebb8e8ce38b82008c9d880bd526961ade43c06bdc65a07af9455df0910db08ef33443617206d6fb6c8ad38e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    314b71fc10ed96e8c641249b53cd9c24

    SHA1

    8cea9a6a80826fb3f79473aa3296e101455c5cd2

    SHA256

    4107658415dbbfdd1f016852a200e2025faf0912ef4f378a84ece86b98a28481

    SHA512

    07569d8f8e81160d606722dd1c033763b2cd94a90ea7d410c6bbc1ffd3144c2db0b4df30d3a7fda0368de8fe69b365e77fe43ee4e989e16bdb464c24e12f4177

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e94bcd0e99937ca1332232afaa57bf64

    SHA1

    8cbfbea67be93a8c828c768d5641e9e57c752d1b

    SHA256

    00f58e8f90c8c887d25eafb8620c278fc9d75821dae9b64c9331acd9cd9a9ddc

    SHA512

    7c96148f5e5894a52e22dcdcc42415cdf63c5d6ae65b47f645fb01c92e0b258df04f8c788e3a1a6167049413ffc75c180c573beea29bac089231d77e1e45e1a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50dd8410dc47a14f879185487ca93076

    SHA1

    a812870dda399e60d36e108a4a4087667aa38202

    SHA256

    6f0a13e0c885b73b7955fedc13648a427b99174610d08c8b4df5a90a3268a19e

    SHA512

    4d28c240613d43bbf95278734a24ede325cbe7b17d00169ead9dd84dc898cdb749af2fb4057a1e0cb4dcf989a3ea633c448d177d1109e96dc01a3629d557be25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    731b5722550b0b41a93c63b95fc36afd

    SHA1

    2bbbdc49763801e75fffef970acc8e8fa554fbf9

    SHA256

    70c90fc38af336b5deb5f662644e4839b769401b2257cd1c2f5fd8958d580e5d

    SHA512

    008d1d12cf3197fb5ace66a76c12af7494e579b5570e7c212831522c3e4a27a68a8dbced1a84f9a654477794a8bf2ecf5e8d005ef67724c0c968c28d07abc18d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7756bf9145d340f80619fd91e3401645

    SHA1

    199dc01ba35bf97e8323cf4e608355f54d3e8bbb

    SHA256

    a0d08de05664a35a14d5588f7e8f2a44417f747e2021247d418f1fdb63e62fd6

    SHA512

    1320388a362540eb2e8dd21c5a65d866335547bccfaed2bc581f1b66e52ab70003765b8f0bfb3c768039a73a2f338e30b0966c6e01ec2711043118684b911863

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8172528502cb01139509e7b6ef66ded2

    SHA1

    7ae355a5607a1682950d7b923b4ccb355fcc6139

    SHA256

    461e854ed9e932c35ce6a20d4e57891d12d46bb2cb1d5e6f74669fe935ccb022

    SHA512

    fa39e86c8a3ca4379abc28a28cd5c9d24229a8e7eaf18414d44579ef7cc57adeadc5a7804e0993166135d3c1b6246219d892cd57909ba85a4f81438603554917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d5304d550a3d541229d04edd9e3771f

    SHA1

    58ef38b25072d108b1eedaf788dcf8c08514a17a

    SHA256

    fcfd191463c6df326090b8db67f00d4008bf5be785d9df5651686d020b81c296

    SHA512

    df67b60b3803c7707c84c314390a312e8a93ad47be9aadea0771b6232f990a322d7295d50331e251b96c74ddf421e92a9337b0ad0145db87781e81a15323a7db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f9f2cb63e58dc29e0c58b0f536c90b2

    SHA1

    588f28227d0180728ecc01df2fb3d82d32e87c48

    SHA256

    ff2712c4ab7efb90e964747971a3910be9f3c67cf414a9dbff7c2f637514583a

    SHA512

    68e07d0adde98a3224ed5ba2d0c1b400918c2bcc768064229686492f7b76c5f6300b819cfa534a470dded3fe1ba0b3138f262ff2f300b94e78d34fda3a1a2a56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d30d6901c8f2df573aa8086a778aec43

    SHA1

    a53ffc33ea0207d4b30ce673e416fd5b74886c15

    SHA256

    d11d10012ffd458a5292b9c144121b81967a440501bbb64860a7107a083ce59c

    SHA512

    f2d3ef5556e2c3af38cfc805bf72fe673482495cca2996a9cdb84458f2667f4828857cf657d6b0f4a139681efb9023dd68450127136c537f7bb54f222274cdc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ac0c0aa6a8fa2137f98f79dd10af780

    SHA1

    c1d771c0997cb9498ef1136dec4a7e0a79a6e37b

    SHA256

    4f49f1fc45846d79ee31d20cfe56f624b6c3f7d99d53cfa8b6273fd46b13c1af

    SHA512

    587962e32f9bf0e556e9b580c1bfab2314198960b779dd2d006ce6aa9289cfd31bd01fc70ef3aac4ab786c0214f0163e9d91f81e8f8d36b9decfc461bb371a9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44bde973c36ace92dd9bdbb586f27af9

    SHA1

    e1dec8a30ed868a25fe9c38eb29209eec8f824c9

    SHA256

    55f8d30c66312e0465300e4ad392a5b15a76c8d052f8b104c0f02b8e24e1d62b

    SHA512

    37c99261fafea6805ce05c5be0f6034bf8d8ddba9d1fe5819b1ce1c3d273aa7f69fdd5375dc7fc50bd4cb9ab942d5a39f279fd33915cdc6a1ba8c16b063bccfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f81e279b4a7f8722261009e67be327b

    SHA1

    217513e89ecb8ffd67542dcf2ce75cda94ad39a3

    SHA256

    02c205adef66a834b8992303db8815911dcee13f1957de49baf15499ea1dc312

    SHA512

    4f96962bf457997d7cc881948c954950b755c4965e2eb75c24f40bf15b49d844c65025237c803e91855417f5c045557e062417cb6f13f23acd5720c08f65a493

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d098158af5a457c1c52c9236fc3708f

    SHA1

    2ffd4a7cc36ba51ccce7c091907c51d22f30861e

    SHA256

    8d980b7ee64ee623d18b89c703fe8da18f559af071b657e21612f3dd8f99eb9c

    SHA512

    9bd6097b0971349e1a70c1e45c5d1e82ee05276032781273d6939cc6eff592b345939fb1be311c58f9074316e566e7a21f3430303bdb8479f6cd8df4d1c143cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26964832e1e9db10a8a207a3dbafda6c

    SHA1

    963d9ad2fa2fa5cb92415c891f896d5f169fc3a3

    SHA256

    ff11e0049f1b33b420ce4b37725cc5553ccdc059920a2a595f8b9d5f2ed4bf4c

    SHA512

    c62d1317aed069c61dbc53bd8c5cc085911a7a6d4c6ed9cee3b20c3640cecebcfbc117facfd67adad5850190a826062762b3e9f979f4a199cf3422fe7ea1af90

  • C:\Users\Admin\AppData\Local\Temp\CabDE8E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDFDA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b