Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 10:29

General

  • Target

    MaterialDesignThemes.Wpf.xml

  • Size

    113KB

  • MD5

    1bb82bbb22468938d4b9d2d138c548fb

  • SHA1

    f68f221a82ba44a7b344a3004137b95b3af58c59

  • SHA256

    d016aa634c248f9f6d954c4e8836996637c8d2f2e01077e99f58d3d64daaddfd

  • SHA512

    8ec76c197397047fb22a364361beb9c3f323a636a394d50a63d342902c587c9c4ae9bfc5527fb4c0c549626eaf074d179f993c7382d92ed9757fc1a8e577a6f3

  • SSDEEP

    1536:fj4pgvgbnK9NeW6efGe3PeIlesVbnbKcUggHlwLKCf9xinnH85Kg1MlgkkQitawg:fbhUQHkkQZ75

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MaterialDesignThemes.Wpf.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:880
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0744ec1380c0edb8548a389c8b55932f

    SHA1

    66baee87c60db898265de2f2a0e42e0722cc4aaf

    SHA256

    e3a4aebfedc22f3780be4a22ca1632e957ff5212e99080d4f304847d1c83d3d8

    SHA512

    9282117ab0060d1c5f8388ef1ab70f42a39f7f091f708b3fbca73fb6addaeae7b3f8680555d4ceaf472530a59d16c8dccd8a7f763b102e40dd4438001b9eff99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12122881e8f38a0a6d9e2b60b0791150

    SHA1

    e04294b00c10fced6bdf4c693c959877ea8a3d46

    SHA256

    3736c5b34339b94077d38d1fcb7a0618f199b2124940f06aeb40640028768f79

    SHA512

    bc1cb0b0d0d245d2aee24902d16b6a53c59884ee7ef1e9fbe9dc2b0ea63276a377a4e2994de220883919a2cd1a5031c895acd9b984c03e340ed88e3b815ba8c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d609f0447f3761f486ec208a6d6a2c65

    SHA1

    12aadd38f616e664aad8f8349146b5bdc8b8fa1c

    SHA256

    1e2d1de5f925fff61bedae8c1effa7f89e6bca1b99c0fa18c0ca56d6936f27c0

    SHA512

    5dc65840ce6fce346bd65b9ecf8f3dabbc7362b34a59e51e7fa487974d9564f99b41666c75eb96be64bf8a01a2b3333d3ea712b340f993804bbc9cec1e2a0c68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00b48b742657eec92824c535a9f81e57

    SHA1

    c0066b02f4a6edebeff7554fe765e62d99e0aca3

    SHA256

    373aaa490e8b98b0496ba2d045590c888a0b04df851eda6caf76081e30866863

    SHA512

    250450356d98c35c4d4908d2958c2c947816a59917363e1a42f2467735b4bfe0b89c2aa50c4d07f98a1d8fcbc7ffc5cf76f2db8d5985eee9461b0b9c7bf0cfad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67ef8158619d9a0c0cdd98b9896bf44f

    SHA1

    1a060729da376b18a3e2f150a5c90a759cb9f0c5

    SHA256

    98518b1a4a1a3e270001cf51f69ac518fc19910a3e74fb36565ad35b9cae1fc8

    SHA512

    e71bb0cdba408ada8417a72cfb59b980ca7b5c892b3cff9c4f4550a3822b8639a2e1d136a26413a727211694d755a15177c8c092f1d6def537c08b361db4dcbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56b88201a780dfab8472ed1b3b0ce904

    SHA1

    cf992bc3580face18ea0ada83cae69498eedab2b

    SHA256

    e6307b877dd552b7ec481702943dd8e2d0ee4a6bec6350b789d2c99e89c6f2d7

    SHA512

    662dd300b3096c8cc4ca1ded1be978820fb15a0a35e7c373b7c3550df0166b39839a64e22fe1b2c9768a8422dbe9bfd8f1cb28af90bc8b9ff62859ae33df539d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    404594859c94e0849f4c99888ba72f1d

    SHA1

    3541d0c80a4314a52a24cb925d2b9c03912b428a

    SHA256

    d2f6c4857e863b474ee797b3337ea2c1c55ecd69bf3da3565bf1c2f2769b3a32

    SHA512

    ef83f837460f06a3f0a8d35dbfd1301ef0c5216797cf596b69861db735c278cb7609f1eaef1ca3b8deb0fb49844862dfc0a8efdfd4f1109d270e9e1be4561f91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21c733f22463cbd495658abe164ec2df

    SHA1

    2576353eb4ae5f998eb6adb47bae1a070c9d2381

    SHA256

    f03548e1a1a3d473ec3a495d02bec0a7fd2f069b4a07911f5be8a492f4d4a659

    SHA512

    bbd012a33fce6cb13b0ef9874143cee254d743482aaf498f09a4848137ef4e9979d49867c4403ec038241c765bafc94a324e9524a42665adcf61e2700d22c880

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    834c243b22c6a9c9194cd9c1da709c86

    SHA1

    13648e257eacf36f2b8dec57f7f9d98f47a98165

    SHA256

    90d156618160b2dd56f72cdcc7cd1891596b5679f4ba7b9e67dd2aeb6d8cf336

    SHA512

    b91e2c9c28f115fb76a97e143afd0fb69388797ff6e4b0525cf99ee32890894c6c585c6ffbe5b0c6eba5177d11b55ed0700ae2bded3634cd2a6af53560ecca83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b777603ac57ce5fbb18b68a0fd0c120

    SHA1

    181623b534b8e36e2fb41cc8dea88b4ef1301b09

    SHA256

    9e2966a4f49ebf1580ebdc42ddb2e350209e477f8cd87127645d7f927f2176b5

    SHA512

    acf437549da42e5694128a4a939ab3d736e83f977affb4dbfe42e5c89064133a1f4419d78042cd0f8cba60815f7f2d2212c244d7bb269733a09601f6c9cd0ebc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb85f9335d2fb5ec895cadb1ec0f2440

    SHA1

    df608ed23021fccdc8097f28d63afdbe14d79233

    SHA256

    605ea1e32910bb3759a364ce2963922599c226c3ab6751564d0c1b09771ec343

    SHA512

    5c34edde497742ea19ea284755e094f0b71e85b095fa137ecf4c0ca9c60e48beea3a1a8a9f85b48b3a7ec20609bc28f40e8484ab439e013129a2f9234f59c155

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d75aed19dffaf99ca62044d42ac56f0d

    SHA1

    f35796dd1a03f954be721fa8e139d7c34f430b11

    SHA256

    b6ad05964fd6ee4c3581bd9a6dc82be9913704cfd496fe3f06b9e3fa66bc53ce

    SHA512

    51799df86d234708e9cc62f1594cd469954e70a9354978f489d49e1f5966818604532c79eec12e4965b128d6b84455dfc0cbe5400030130b06c3f3267cb1e69a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c95ea51cc559c82bd15a98d400eb943

    SHA1

    38eac9550e48a7b6823a72c8c7a3a51ca6642c69

    SHA256

    1264e6a056d4631b39bbf22c6ff6439ee00307d9ba3dcee4d372ed0f3ae46823

    SHA512

    b021291c73fc850595729be735e71a8bf69fbaf3f23068f54984008a26d83b6f91ff4cb1db002cd54eb139b0ea58c2694b00f6bd29a0470fa83713a987be88cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a5c10abec5fc586a4ecaf45728b1676

    SHA1

    573c30bc581e5ead379e4ad2629bd4f720c18292

    SHA256

    4946b673bef1b658b7abd1138d3e1b8304a2d561f96728b761d9a47e5c3ff8fe

    SHA512

    51569a848e6321405d1d9b8551924983ebfdf7dc6d76b1a316257883853871b04ca359050fd9982e68f3b78bda1f4dcc5557b2c876ae60da03d228c63835e83a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c2852175f966acabc54a3715019e319

    SHA1

    d0a0fca97a4e20b35e0b8b5bdb4eee3140af5e6a

    SHA256

    980130819d557783d33399ddf26fc245303abaf149b3ece18950203a4ba253a6

    SHA512

    7e820471949ed018fef6f5032ec4813b9c010bf4f895db09d2cd7192333826f5f22ad09bf4946f0840b166fc4f4e76d28afe7bcc993766c242f44d85240c0c13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56ef378316ccbf2d82eb53c2cbd5fe5a

    SHA1

    37671cdc02d235f5989624199e1c057c718eed7a

    SHA256

    3f779475538ac2d4d9b9c896077f6b05f73883a2ba0116d6483ce7909856c0d0

    SHA512

    29e84f86518085ed78d345a78d395d21afe9a7b4847546a9a9bb8f9d42de9bf992d29c9fac12b7142cbcae0428699ed2bba23bcf24175d68426b36e3d724daa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caeed56fe21fda9e0d97c7384fff2ecb

    SHA1

    3b46773a2414fc0749d876cbf708bc6e71ac4b0e

    SHA256

    0a664b2f66b03b633c5c3f3773f8e751f0fd0f4735e1ebe51f3cd40264d0ffbe

    SHA512

    ceba6ca9788ae7408cf0625fcddcf0251e54fcc1e916529b07fa4b37787c19566c86bf68aad60571ae9e5dcca205855b1dd05b1ac2e33c54cf58e484a4558490

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c3695b4065cc56a2b88b691de2e20da

    SHA1

    9ac30f7afe1453168f766ddee69895f3310546fa

    SHA256

    e0fdbd45e868e7df5f87379b192730c22db27d7c834b56270a759042c77df3ae

    SHA512

    ed91635925dda405bb94b6b6460d5eee417aee92f604e0808c413a291b85964a487803fed69f74643a40b0af1f8a102a0d7c86c4bf915da4c4e9913de7644e23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    114bee319da8955c0c4dd0dc0af55710

    SHA1

    fb659d749739ea24fc467dda15f8c7fcc410bbd8

    SHA256

    6083b0f6995ad929794db9cc9d82d09164bc1e30e3d1c2942be68e8812adabeb

    SHA512

    62b8e5d773b0478573db2f48f80ee64503a5fd1df2452b8d7b3ae8bad4e6ed4f94289879e748d6157e419cb857cde82058b2e08caf46efeb6ba02b2211a0b08e

  • C:\Users\Admin\AppData\Local\Temp\CabCF32.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCFC3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b