Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 10:18

General

  • Target

    .rsrc/MANIFEST/1.xml

  • Size

    726B

  • MD5

    8ac7761540a25f0e446671e95051ad9d

  • SHA1

    dc2cbe444228a356272452dcda6a5f4f58bec4f7

  • SHA256

    46e35d3bb4e0d1dd59f3321fa8b908e7202b9bdf70151f941d58f9bee9c0ba67

  • SHA512

    7375e939af102200af9facde9a02296f074f06ca0e155b763f51f0bf0c41b66140d6eceaf720194650cb3bd4e5376d94a36bc9fc42fccdb1942894b9d13a1a93

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\.rsrc\MANIFEST\1.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7824a1a65e552ea176fb3ba4122a6cc6

    SHA1

    870fc92cda2f04f0a8fcc34020efe6562cb4d033

    SHA256

    5347f56bedd013c46d19cfb2aa54780cae25a5ba73ad50fcdce7a759052be2b7

    SHA512

    481f9f8650476142956ca677842a252a8b0b643fdbb934b59a9d1160cd8c0036941cab3dae372de52abca10f69161ff03d6eb1044fb778b55e73c4cd387ac235

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    963fdf6cdcbf5dc53cc3e2df5c55be6c

    SHA1

    f49b042ca84f8478e424ac4edb878f992c42bce7

    SHA256

    5ea9cdf686f151ffd4f001c420c5e8b2acfc6d879a744787026a9fcd02cd2285

    SHA512

    088defe0b473dc4d0fadca1820bd064a418af0b54735ce3502f8da7f6272812902f398b1b049ccb840b1c84dbc3cdad7b238c689d5421c04725f39f85451eb21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    355958d7faf6eb9bcfdd4684255395e2

    SHA1

    08c3c9b0454e3007ba039a29e989bb58ce64a7c1

    SHA256

    2231f07afd872f3e5db68d2f5745b2c8fd06028451b3258555b90d501dd9d4b9

    SHA512

    9203ab6d5c92325507da512bc836079831ed5bb1bb1ff49eeae3a0cf59bd0eca637bdc47db03d09a1c18e274a17f22856f7b5b68bf68891b3f93d8d69666e6f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be690adc397a840ca7ee4a54b79a414f

    SHA1

    bd23f1e916ae72ff3c459625b26a3b069f68fb0b

    SHA256

    c2c9bed04f6caf6824ac8ddfac9acc0753c516b2558b8abfbac7c794300fda1f

    SHA512

    b5b937a2de4092b91acdfb66bbc27f6100743ece0344ae79bf782289ed5518f5879ac32a06bd16724bf54070ef323cc09ee586903ca59c5c1b8684b1c32817d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a02de82e1e5cad8ce4bf0954e642132

    SHA1

    4c86dca8ab3cdc7291b8a26798e66f9dfc370fd6

    SHA256

    06d1f77e402ee98663e7743ba5b83286f8541366d9d3d05f1ad8ebc2585fb88c

    SHA512

    8dda2e7754f3cfc41ad1c4198490a1c37d5f315fe5677269e847d0df34993b7bec0f601edbe6c8992d062390db94fe00890dcdf462c501fffb59e0ae67a15b63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1741daf9d1873f2975ed0d543d86189

    SHA1

    1d82bae6393db90bdf1ab7626acc69cfe7c48cd0

    SHA256

    bd7a04c8c5af3a6ea9fef7fe73403ed80f369c68bb24405e2aaba1fc316aa929

    SHA512

    b72063b713859fe71fbd97e9e16a3793dbc288f3084832859ad9b6cbdcccf93ae105f5b1abbdaa0e9dbcfccbc709cfa504853757053f89bcc335b8e2b8ad33ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f9ebc006b18d666c62ee6f958044937

    SHA1

    f61c6d5f943b595e5a74a1df95b48070545cffb0

    SHA256

    07e34679382af23702276c1b89ab5b1ef08f2596139db7e72fe4784354442fe5

    SHA512

    1d1388bda36373da11636271d225b290438c2dc82186564340f3ca2cd785171430fd6b33cd8025accfc7e8c8c6d0234f6514f99675bede23c5bbccf7b9361a32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee4dfebdf210bea6b1d5626d95703ea6

    SHA1

    3809709458a041fff03dbbe955870615aa7e0a15

    SHA256

    1c5987eae1637da0bbe811f778273ab300317f9ecbc3047d33793dfeafbf5954

    SHA512

    36f1247c3638612a64d68d093a4d799c3f4f20fe2121830d91cd732b3d7da9163347818698b4250697297032b074538bba1c7e0604e510b300abb186fda14941

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    657db686ccb65b4c0b019bd23fd499b6

    SHA1

    37734d70fab467de7f8871b647f5c33e63b733dc

    SHA256

    4515b2eb311a7e4462c44287d232b3f9c3b203f7a951c70905baf4a75138a0f2

    SHA512

    36fd8df8823db6f7636e810cca4a16d7b716eb866ee491cfb2604eec04a1574a4c9bf04f6819b79b2770893adee1087b483409d466dcf0396a14784449b32f60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9621546606e6c2fa276182d542e58cb1

    SHA1

    264ee607d01912f1eb2cbf46272dcf94f0d32fc8

    SHA256

    ad7a2c0b153bc01ce93d0bb18d4f1bb6f1f64cb4ff50e994a2b2a47c01ae5e8d

    SHA512

    3068ce23847d19e9fc713dfd2db2a63f7b9468f3e7735971332a8b60ea2fce9abe7ea55fce350f57e4bb176b761785525954470d68ee47db5dfa26569e490959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a7177c60e940bd8d663114634ad7552

    SHA1

    29c6e9ca81d8c3e08c4b1d6a9ab74b8790e82bbb

    SHA256

    3c8c3de23242c4a724f30bae0e045acd0912421c197ee07c8f2e69decf92c32c

    SHA512

    583340eb9f488908474c061ca8766cfb9e690582f1b5973f25f5850cd897cc0b22f7204c74c968a04cda3fcc627cd4509cf101a76b0fb9389c3ef803eaaf0b4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    382e07bc4061b61d2330d56be3a6f417

    SHA1

    59f4d632227220ca508e512c9a3813c45991570f

    SHA256

    f2315a473ca9353fdcd7220725334d7bf99580c0afc852cdfe2313920ac6687e

    SHA512

    cd985542679945fcaafb7b24533f4f499094a40d2a4bf003e8f1bfe03bc5c3330743aee9a477d73ec6d87aaff6f06377db505cf8437fc49da6da55123257323a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94d28d76a6e5fab51095f4ccfc1e729f

    SHA1

    38c81914471a463c228b62ac7bb847ed7daf4d8c

    SHA256

    aa7a0d3ed1b359c7b0ce3d0a3798129e5aa1ec85fe6270363d0fa17107cc794f

    SHA512

    7988ac0e054cde2f88094ec5bafd653c2632c89ad4225c8e98a4b1f5306263dc6f39c6cec55c9ef31d77cec90f9466b8dd6cc3b2cf1721f16616b1d03ae9a4c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3447ca622fb277ea27ec91a9bf035eb

    SHA1

    d19ba6fb78147e489fcad9289beaab5d25f8d968

    SHA256

    62b62de6e69179b619624d4154a660e47521342dfb1c074e28650cd866e809d9

    SHA512

    92fd60e3cdac757e934940901a7137b2b8d8b9e864caf8a4d53f121c685ade6313d4e8f63a30bfbda29562ed87156709440f06a8dfe3dc8b7de81048247e965d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e75861f3162cfc7eabfa90ec1d403e5

    SHA1

    7ff4aabda5356458ab508cc4b22a16a2d9fa83d1

    SHA256

    d81ce750dab8cc5bdb5a3c712860e1ecd518f870fda186ac2dd9713542021b2a

    SHA512

    d88501da894899ffad131741fa6dbc2a2eb3f78344e920e6ee7fbbd26515570de98c4e42dc4acbd2649e09493ba0fe0c4feab0ac341e01e0ed86ede6531829a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9319d9fdcbf2e81ac69d70484dbe2908

    SHA1

    4c94355ad2b11b619d708e31ed3c64f95d3cb6e4

    SHA256

    5991af10daed2ba51a69a70e224acbd33de6fb6563174fa678449670ccf0b1a9

    SHA512

    0c40762c9d3027809a3ab01cfc719cfc0538a3e6cf6492d33a15310a2407ebdf9cec4cdcd2857c64c09362d8f6ce205e69712bd9f43509fcdb567e6149efe23f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f316440adbfe1c9cf99a8ccf126ff19d

    SHA1

    5d8f2e12efb3e37f32eabc419e65491be02ee656

    SHA256

    5a238764340adbac7788d3fc4a84ee96e444a0952251208981f7bef4c738971b

    SHA512

    e6232285b5ef8d6ac4d0ac790c7ec42556cc74a5e37f8c592696d575e961ead1cda53c1c3f7a1e599381332389381ab983c48b4ffa3f7f82a3bfc5aeec74d6ef

  • C:\Users\Admin\AppData\Local\Temp\CabB1B6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB2A3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b