Analysis

  • max time kernel
    122s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 01:46

General

  • Target

    fud crypto/BCSEvents.xml

  • Size

    35KB

  • MD5

    c6696bb4b2e515f2240bea9e998be82f

  • SHA1

    88747757c0e8e6f66ba1cf0c559b7d7be4074d2e

  • SHA256

    45f763a5258f39a14872b4823b203ccf311bc1bc4e9a3bfeb7e2afdb51cc36ec

  • SHA512

    e4139f5b56b012f4601c59c29e11976559f6959722c4b690ed9abfadce3779817f4c97dff05068e6853959aca1f5bc8661c434918c9c5c25160198ef5823a335

  • SSDEEP

    768:GD/741Xy3AxbsRKXS2dUmJBe7I+tGB+D0DiPpS3Onq3OCDIq3ONh+q3OYcvq3O6j:GQ+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\fud crypto\BCSEvents.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93a0fecc81660dab599292ef241515e0

    SHA1

    619e68191e46c21af208c35950d32c940577d2af

    SHA256

    19b97de9fdc8ad542269f2060ebf3b62e5a31744913ba27d909c919cd93ba551

    SHA512

    38c6fbeccf35cbc75650941e6d70a1b1b2ede22be6539d7af12bb336df5d853fd661ec5e8b1a6583eaa251d9aec2f8a836a85b1a3854f06c4689a759435fd59c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    360a8ad76646557420fc0d49fa78ad4e

    SHA1

    1b1c7c1673acc79aac9206cecfbdba493cf02dbe

    SHA256

    de767bea80492052466a719a28d9f5acc60dd83c6d69e2759b78b230f9273584

    SHA512

    8cd54d0001e55e824c35f8212b713d3479c583457d40b5e07d6f59a15ce9ef24b31b3b76a51ce60b744c84d8490fa149f27092f0979c7d5e8aded41a5e40aa6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8c7a689e1213e2830b52b8d6eafbcf3

    SHA1

    3a83b1fa9d9d13978f357d035728f244ab5b2cd1

    SHA256

    887d63d1298ffcbb48c1787dbad5804bdcaefb7d37bdc4bae08822ed332e2acd

    SHA512

    b3f8e9d6216721347a34a87abfa46427269dc8be9d04f67d6ad5bfbbb9e77581e053fb4eb4572912183ebf557a90ec694327730b2b5e9558292f2aca55f02d64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e208a6b0886b4fefc78bf5fa1e400c6

    SHA1

    7ef7dce2193b79727c55baff517d21f10e1c3e8d

    SHA256

    d4b8378ae6f30c2518ba2eb6460552641c9ee51fcd58467752821340d1b5d121

    SHA512

    0700f4fed41dad4ac56c28fff1bb624442811d04f9efbcfe1bda2485eeb19da28ce513219d20342cd8a6901c9ae100af52fb8ce95fd50e586b136a6797563e47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfb2549b3df3ccb071b12945a21957cc

    SHA1

    a8cf1f90c1e8eb35f82e76ae60057e513b6dc543

    SHA256

    4ab0fa303d6db14f8b48762704a1abccc18c7fff20efff80e6b32e4999d819d4

    SHA512

    63fb3db82ab7367e10bbaa393f5f1cd94528c23d113e2c982e59fbad8ef763b89136569d3bb08a2f572bfe130779a5ef255cdc91e6ff3f9f47f5ee057d00f5e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a2a8eb58ad2cc64786fd64a507bd1f2

    SHA1

    4a0971e699a9150a6eedb7a26b7e30741c5e0241

    SHA256

    29c7ffc8c9c1dd96f5ae56396999d160cf1c810f0b1b5a8227aaf986d459aba7

    SHA512

    88a840736bc5e7b0eb495eeadb5b07879b2b9228f61dbc416a18e95be3f6f6efd090b3111385f4945bc5a5a68f3025f453ba63519311db2d7567ee97a2ebc7f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08a9ca42f9523931d44d179fcbcd1bd9

    SHA1

    e1ca850da4f63a2c77a9e1b04a5297215079f860

    SHA256

    0e39e13f7de2254c16c4125ecb3d211714ced9425ee8985ef366b420755983f8

    SHA512

    536bf7e6a89b57b7d741f93a437af62619c13e309c84994e63fe0ce089a9d9484452d6d4d6e127d208551106060d5b40de35e91c9689ab8237914b4e9b858283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c8dbe9e1536020f1a062abebc45ecc0

    SHA1

    7cd93690bb3a5749f5a925b8585ad5741bd5fde4

    SHA256

    bce65e88d44da9261c7b03a782173ce731f7d4465814112610fa5e019fc10701

    SHA512

    a35c9f5333ffe98f9ae6f1f8f9cd09ea4b0197e98bc67f09d069c7713dc8964c6289c305f9923fe13f31703b49f9748654a5f684d424b3f5857636ed7596015a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2934560c51e1073c271638e3308de8b4

    SHA1

    29f340bcb53596d5eef98897f08944c9e2eaeefb

    SHA256

    5cc8ee2b5ceebeef0be4eecd6753aa562f389d3bfbddf012586bf12004dd24ef

    SHA512

    2c69b542995f206fab061d66aec900d9d6cea86eac8acb052a32da5225f6137212bd2b383a29c88d27a21029d5e091a09f07e9efab8b52349e37f973d2599197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee25d3cee81b32e0c1e54fe5190ea14f

    SHA1

    523bfbeb43d5ca3dd533f97b4f0b5a457c79935a

    SHA256

    faefbcf319ab586d9187f321fce418c7fc19aa937075a94c8ead57bda77a5930

    SHA512

    f596b5dd0abdd6ba27474b56bdb2b1df97d53a6721ec8e750015fc1f07d617762eb26284b514841732553a7e172f30d2b3a7b38115b1e2facb637de048c4d981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b15a5ca10d48a4eeac176394ade1b8f

    SHA1

    e884c844bf3599007d85e2ef5fafd13586053ec1

    SHA256

    a52826b609adede31bda7db6140c217a9abcc9036065f544db662121693acd05

    SHA512

    99552c468b7289185b50db195804a3f76c23075fbe07221dbb7c3d0eba682132e2f124e5e1127b63701f22dba5ebce6dd829670e96d1ed7e3609d32e0b39256e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10b5381df7a7d79d77398a506c3ec848

    SHA1

    342895b0d95d602539d658d5c314cf4496cc2277

    SHA256

    69f24304a86ccf8d5f9116c54963f2b8fb06aedbdd25021e92a071e281460872

    SHA512

    52ccb6f44a4acfbef0f1eee0d01ddfa663238c7dc88755c81d556b26aba4b8c9974acd10bab3201e65f3a89a2f545863d8cd2588934ac8b5d63622c5157393eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc955e57ff60fe1ebaec620e88a23dad

    SHA1

    41773cabadc92dc4dc980facbd49bf95e0377d75

    SHA256

    69fb100733aaf31b18612115bf4e9e26050885b0e127dab579106535ea86e265

    SHA512

    5101762b1175eb05de3abc3bee096cdcf34250767ff51832ea9c00808b136f130c0df0fac7ad13f08b213b23792a22192d8d4b13bde21955b496b71e41eb761f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd54083cc6b67ad445a798c7b8603978

    SHA1

    5e63c4b53050940de950e1421da9152f9402e941

    SHA256

    cfd34afebb10b539efb5df6bed8b438683e1b1c8472accb0459c361bab1b878d

    SHA512

    ce0e68dbae721dfbb8fa1608ac6c475546afc0b2fa8bb206efb8b9f20b49ac2fedd2179af4969f4a1f8345f7c1ab56e02ca5dbf5b7d41e99d73ca53e50f7cda9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2774ece1062d912c2d1ca52b3225bcec

    SHA1

    86eb29d2fc45fc3da76134152a00cace3fe09412

    SHA256

    6e35897692dd231e414d08860d10aca319cd384cbda86ad8b9f23848113a0b06

    SHA512

    fa9bd263438996a972bc78ffb0f388e9dbfea4bddd1e73e660de9131b992c5ae19c943b4edd0963d5e04dd1d07d42f2d0325ba86a1401c64caa001ae42963cc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8a257373e3ec28fd1c0501df40192b0

    SHA1

    c83b7cc020b9fa145cc5fdcb6dcdede791c4527c

    SHA256

    05e6c22a327a65953b37758f07e6bc5ebfbfe7e1957b7ae0ab21ecb052f1afad

    SHA512

    445ad344e463fd14d49d4956e28891ce3de8cf11e1e3a3052bd326ffbc44f4064e58ffa8aa0d6322317ebf240fa6aed26e8c8af727bf4dfacacbae5b53211d29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b54e5efecb2b7cae3e2029985b2d106

    SHA1

    283451bfeccfa488142952825903c24af2651049

    SHA256

    6c74e4d74cac26a26eb0abdc49813fd86be59ccb1c91c185f412429008cb691b

    SHA512

    7920d964865e23f139b0c06cde45e0155e6f65ea09c56b9793247b038aa78fd8fa9df123d0b82e61a9518f9efc1f0df184e527d8bf5f2f3e57a376569934107a

  • C:\Users\Admin\AppData\Local\Temp\Cab6C2D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6D0B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b