Analysis

  • max time kernel
    133s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 06:46

General

  • Target

    file_azlm5.xml

  • Size

    388B

  • MD5

    9a08abecf26907570f189ad39eaf5e98

  • SHA1

    8805fbb033a7b6b90b11e6b9254034052d450fa7

  • SHA256

    8120b0aad5715d2a95f6dd320f98a13fecd592dd657e08e20f027abc205e2d8e

  • SHA512

    7c21fe25c0349811d017f52b07c2a07cbcde5426fe336d549a470c82b0265456fe38cbd10aa4822f14eac0276ee00a69379c7c7964a29bc2931f26e5cf4fcb74

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\file_azlm5.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9064fdd4510c269dff98a245b022049

    SHA1

    90f5cf81e553b529e6c203e88237a48e8595faec

    SHA256

    1a08bd22742c239aeb89ab35fdbc8c5342eff219759a84ced7a9cab03f30af76

    SHA512

    a6d4e9e1e38918122a05a2b99990e7a34319c09fbcbe061711c6897371900dbea8fa58ad3a0b0d988fb5bb49cb9af45afb8fb3c8561d762c907be0c3742f2b34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5cbc8d037a03f565071f06e43dc71b2

    SHA1

    592694ae33184033453287bd1199cba3f546bdbf

    SHA256

    2df5e28c065a287c4697e69081c94e254884af24a5044c6f1ec681935fa3b320

    SHA512

    c7ee03883f574cbf3ebfb9751656e03328be9d876b8bb01a47f8a17550bb4f39f6de140e5d5173dfec90008f7d3a28f6c3bfcb03f3dec421c82b7f52838e3501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e6319b3e4161dc260dfe2427314b324

    SHA1

    c066f81a29566f065a851180f0d12f4132fa2d76

    SHA256

    7a21216585ce37b78a84453e4fd74e36665246eabb9a52429386a79b0cb2eca7

    SHA512

    84da819325550e530180e38c215f73b6a53cd211b3db13bb88cdd007e00eaebeabc26cff3bd823f8e8221bfe3ec61a08d5115f98689622bfece0fd9cf82c1548

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b8a6b7512cb1adbc0b2783f97daa25c

    SHA1

    7c2f88a8b80730f69c9cd4b3257fd545968f2bdd

    SHA256

    d028b599f18061b5b5123633c1c3b0ff4cac637911d73a504d65847dd3d56361

    SHA512

    c15a17f94e31201297a5f8b592aaab9e312b6be7031d8600c6b83eff8a1647358353610e2640ec7bc95288cf168b313a94e3df332e132316ac04f3ed26a11120

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    002d2914400af3493552898ea64e6d3d

    SHA1

    41e52947170b9253f7086e53c54725bb843b841a

    SHA256

    48279720caa068ed17f3c7d90a9c4e3ae2a8a000b73d773d53b6b72e082027ec

    SHA512

    feed31ca85dba0b4d786de9673ecac50fe0727576b94fb3dc0636807c602541f272496ca3b028b0fd98980806c30d8e527e569a98db500e1497ef8989f7a8c84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b1ba628650d0bfaff417c673902a8f5

    SHA1

    907b923c59b9a0e4da15b0a583b79996aa2241b7

    SHA256

    b2b80361421113ef36c5327b2f372d5c528af08ccc4f24e2a51ae9cd653369f0

    SHA512

    189d21931aa3a86331c40c1ad2029155ee6755916353bae42284124d38db4e7946a0fe3f5a09c198e86d049a29fc7f6dc07085ea516551b3e05dea1f09d49bf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ce162e1f353b57c9a0d32982fbd8473

    SHA1

    5acb5ec1762bd86a20740a6062d9871866ea6ba1

    SHA256

    c2eac930eb925b89fbaf777339dba8677c745445635d1cf8b76f6c210565bc85

    SHA512

    7a29827de152529826e9e3daf48abfa058154e49ca020f013f4f6952b7607e3927e62f401695182956d4b376d45e13a1a428afcb134d3cce803832cc7016b3eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5259bd6649f6657fde0dfa57dd8d0895

    SHA1

    f0402e1296eb037b1721defe36486bb2b5c69f8b

    SHA256

    31e437be2acb59ee85edb43fb8d54480e3bcb23308592657c3b79293ed328d47

    SHA512

    7542bb7fc86c7ffcc591c343a80c0e94fd2b00d06f60e03277b2812b9ce6f50e9c9f568141cc8be86801389eb06fca0e88958798b15c5806fa65a2f20f013d54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3aad906a64fc583b5d3198db454f490

    SHA1

    4ce7c517863f2aabd86a1b103696311c6499eb21

    SHA256

    027d9a7d20239efa907bbdfd5e0f927e09a24df86641104a89b5267675759546

    SHA512

    19676b910fa980a43381ca5627e26c1866f3ce68436a605a5eeb49d14f7c31970c30f10eb83ee922162f45b9641f313bb741f8bcb7577f3999fc330d798f88d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34f2f121b1618a95aac1b214778dd8ba

    SHA1

    7cdf5ce33fd61024773faee3b43bf9856515ebbd

    SHA256

    a2d10a8b6869aff0f06a811ea3b3d8b774991cd0a4cc7baba981d676fdea1e7d

    SHA512

    8013f3de2986eaf31f9fe56707c76677a4692075cf89e6bcd0e9e1ab5c541cf8846dd5f90a7b4510e92ca3576778cd0b110e33c8a7c34ecbc1448725d5651128

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9908736e5b3c8e5c948044c8cb756aed

    SHA1

    a07c1a6265677bfc5914ce617d454028f49edcbe

    SHA256

    49c80d7626fbe56f1f2be8371a836ed6e6d6d357a3ce18aca9d21208a36dc728

    SHA512

    656e9081796ddc550f97d04e4785d2a949d807a983e105f8dbf79aa2e594e1b20c2f7c9cf28c67275e3f9aa30f07d0485f1c09e54d2ec4a7468f2ee1716693aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4972fb389798128096703c3619b0c459

    SHA1

    0e1aba9266a0e02087d84e9d0c7594a7b4845aa0

    SHA256

    60ed998596e69532d7626ac492d2053e5adf769880b686c612a3520da42e65ba

    SHA512

    ad138051ac500970bce2fc86eca0a7d1196bcff26bdfa07b81a2042070ac305eeb58fd0800790445a72be804a64dcd7649f7666612d72adc3d1c3bc8ff59e6a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc0c56379fb5d627b2ad24496076c751

    SHA1

    074ae9bfb4fdc2d571f90adc5fb43d971992923b

    SHA256

    6f78dd738ee51d30827278ba9bbe7bd29d7c471d7cb58f7600b62c92f397efd3

    SHA512

    0733bcf84eb114469005de52a87d0ff119ca82aa9a7c8fecb89a5b8364eaba2e5a55868dfbfaf22cf07b98e2e3d3fd3dc13bede49bdb1fc7ef3f29aaed544721

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a68cd3e003f8ef95f9749496f59da0f

    SHA1

    3bd6114f9812f6f9e9e124b80e7dcaf2064964fa

    SHA256

    452d6b7b15138389a97e71526549107fcb6d6af06ebd34e3e9f0bb51c13e9676

    SHA512

    e566f1b97dfc06bc1e3b42a9e9a5008cad3e449e9774e5ec4f7a7421301584e6e0157cfce6e6333d67a6f3d10044eb4e15b924ff2f214aa95986e7db1e82d6c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70881f2e2ec3db2217d075d55a76d859

    SHA1

    96401352590863ca78ffc6104dd005634f0db583

    SHA256

    a6fa3b638792fa9a36ad31d696271f0090881917989bfba42709d84f735d71b8

    SHA512

    1face1d85765cc5733be159bd2ae05f1319dd0cebb92a8d6162ecc25f33cbe11aa8f466a790be649236aeee5144e64226e31ab4b4f0e9dd3c6b6f8f6363b31d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c395eb55babef9a9259320e9abc79ab6

    SHA1

    e3fc6aca3c49ae4225114312dcc22029906ed655

    SHA256

    d9e413808ed676c73fb7485fda7d0004300b41941c422168683bdb2e406e8a05

    SHA512

    2df4e6397ee446e9df953e8766a25cfe9cb2a4c14f4414b9aca236fd7fda3fd52a52007e40dbfc3327d51f8db1228289f22b89cf86eb8592b6b3296bfa3db682

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d58f8cbe740282a29d337c8596abc3d9

    SHA1

    bd12a7edfe7ee93e37715379e97a21c6f7e8126c

    SHA256

    caa5348cf8ccc4bc411b467554b80b665c25766e3292007a97d8c5c7e927345c

    SHA512

    61237ae8f7fa5ae1487035ceaf75d1d6ecd620474e45f15d2d57f426e8ef0c55cb52421440746989e3c476728a8c9c1df7ac4ff750370891f41b0998a291d2f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0de2e2642e4ed853a8e4cf7dcdbc1dee

    SHA1

    8f7977612f7357c32f9adcd3f5af6967360bf98f

    SHA256

    96f406679b16c76b8114763f28f893c6c0c1061795cd1da60ddd2edd2bb5c74c

    SHA512

    aa5466bda67992676230a9513bea1da5bd89c8109b26cc0c363ca3adb5b51f33f99f0fc9376f406239327babb9749d41369756728b8224b522a4879ea3abf6c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8a799ce3cd9a60abd7238383dc95ac1

    SHA1

    dcf825328dcb0563d12ec685fa601ba1bea5b8f4

    SHA256

    900e53c088f30def7389a991abd59c8d69c80b938f510f834dd07cc17a00b184

    SHA512

    67e1a9b42e6f996f7575fde0b08dad89a8d16b24165b45d7c1b15ccf41e229ff19befb9e46d30b1eb14cee7ffb0cfbbcc94213214d42524e9fbc24621ff7b850

  • C:\Users\Admin\AppData\Local\Temp\Cab7FD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar88F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b