Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 23:18

General

  • Target

    geode/resources/geode.loader/APISheet.xml

  • Size

    16KB

  • MD5

    a165e6f847feaf3401a9e80e6834e1be

  • SHA1

    4fdb46be3c617dab728e54f08b1a30265981ce93

  • SHA256

    7e03e949448fc9bee5bf968548919a1bb8b9bd4496e83bbde05bffd3994f5d5a

  • SHA512

    c4ad97f08dfe8cc4a12655d719c51fc46c86a595751a18400887c679991a078b4fc861dc1c88aad1e1b17e84ec860b61c51d53f38449b915b52cced2aef17047

  • SSDEEP

    96:CyQco4FGcNc2cFczXchcVPccFc/c0c1YcYcF0cBc6zcFcbc3cCcZzs4cgcDBScT8:XXQv/Dva5oLZj2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\geode\resources\geode.loader\APISheet.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c955c062c9631de3c5986f83c9bba182

    SHA1

    5d24359f0ca2c152360e9c3034165811a258dde3

    SHA256

    31d82bfa856f3b193daeac77d28b89ae1fbe04537f8e1eeaad18049ac234a905

    SHA512

    90c16ae0c83c3d7c3e51e4b64818fa0c4a2df306780d6496e68169b792d2d1a0acec452445f64f8c95a08c6e9f5a50b68cceb095d24dffee9b1242efd46e5534

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee247cadec47c93a1baafb90e4f81218

    SHA1

    35b0173d8e5d00975afdfd86f6b46ea6100d9103

    SHA256

    27112dd55da37725802a0168e70ad8d962497082e5a19f4652c5c9bb866b03eb

    SHA512

    3b1c2e580469fbe805578c839e6394ed16b798f57e08bbedcb6cba75773ca33bf7dd8aca8b0f6c082aadda8acf912a0fadd45544ec571ecbe095b241c25d1c7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07b0682225c893d7f0582b63e1f34675

    SHA1

    ef1131f8fd146cd3b2355473ee2a721bc2fad276

    SHA256

    119a18d2b91002a2b7c571a8a69a0b131a6c3cd99cc074345ca1af275ec47cd8

    SHA512

    a252c50078e4ec74af384928d9847aa25edc7cd707a29d11a1a098abbdf474b424d321735ab7301d74dcb57780a0ea60ff8f0dedefd9c4b29c61c1d58d74adac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fc2ba6b5ba50973a0cca31618db79c4

    SHA1

    bc15a00683ceea2bad4d5d63070187b6afb0cf81

    SHA256

    326e139c64f4e030c6a281fcc1b6e7ea28311b0dca92a7a9dbb168bb76a0526a

    SHA512

    bd3acfbea735f94f25a43c2d65fbb0779f10f169c4488e421dc41800163cc974108b1aba61785a903562ee326b6fc86841e68f98f24d3d3a9d92fba4540556de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b08d9ba72a3ddd8a6e1c351ede608ee8

    SHA1

    74101a66649b025f4265a200110bd7040e7afdd8

    SHA256

    d47272f71bd77f61d32a5ced42c38cfcdd783355fb8593d99566ecd86736c59e

    SHA512

    0d03ef9db91350385a6b64980ce7f818ca133db121bb076f109fc282d775ea7244d2174013bd552851a8c4669ee71153c70f4de6eb83d722dfc47484467509a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e70bbc9ac37a5addfdef65ec437fb7d7

    SHA1

    d1ebd8ad009f1fdffd28b7596009771cfd73641f

    SHA256

    ffd1b6a8f7a242a1b21d92dba193995c967943f2c5525326b16cb0427766ed22

    SHA512

    d13bfa0a9d2012df922acfc4154f803b50cdd2b59e2347f6f6dfc28577903ee9315479f98d35cbb52a770262312976f546e7ec91efb8da51dbb6743eaf63f4f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6c5a334db66d18b120bae5752d3bfd0

    SHA1

    b000d5302b96658a345a1ae77e43e79deb550fa1

    SHA256

    dadb586832290a97d064a00657917898a890939aa09468b892922dc45974ff25

    SHA512

    1b1e8eed6d0fe439a5e5bbb15eaa0120f1cd989065236b89bc01f69c05df309cd593bb696e4b65a8dfb0ed5d4654d26b3418090c047ba7345d42049ad215af18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c379115d20dba12c5f1cc13fc9dcf731

    SHA1

    8f0dbe475bafe038d38df82d16d52bff13b6c97e

    SHA256

    8b886e63ff9f4341778d4a11e0facef33ff008d9c462a3cb0321c9b0f809cb60

    SHA512

    3c57ae9b059ec5a9bddd3c808f2305936013bff3c63ca787ca2b1883b91e7e1008a5bd4e1f30659cfa1f3916359289998c7861ba4172ea87fe9f8720c91dc7ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01d57818182fcd2157ee696260275f22

    SHA1

    f4bdab8828a558b1efd265ba72ff8be67ae4227f

    SHA256

    725a42c6dc7774cc31ccaee63d4ff63af8f95ef1d0d59a3a23d8ccd4c01951db

    SHA512

    550c0fdf946d56463d247097fa581752f8946f8a6626a726db20e1ab1daaa6ab04cf1cc00cb2e9d44d51359939b6d328395dfa39e1e9e9cad34a434a121e4a3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dae9cfa7342d1933ec994f427edcb45

    SHA1

    c545f91fb014b55a4098d9c9dbe6dd95a6ef68b6

    SHA256

    619a9add617b10c14f2d42f6f93ce4138c59164db478cd5d1cc7ed6173b5edb8

    SHA512

    120b15de203c4bf462c3fc2f58a9e483123728b811669fafd1b6281ce0abd89270acb13c8a58035913f0bfb9f03ed492cc729a5b7566840404cacbfd25b4ef6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f02d441a9ca7181571643c23196edaa

    SHA1

    741b13383b08083759ac7cb6f0045dc037a91a4b

    SHA256

    45e4c0c2f22a6c4fe251347d858a5256ea0e551808cc63232658a71cdbe9e8f2

    SHA512

    ec3d36c3e6d9bdd4a837cac2e402b38f843a93975b89a6f5872524e08cb21bd55502273d0709a408d9517c1cc589c7d3d3ca153356bc8a66dc8309791d093eb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fca25edfe380a14278067f6b5d1f20a

    SHA1

    eca2a9b22975a692306bb25fa905c88b849c35b3

    SHA256

    26e804699bf223c106086a1c4538e092ea58f5c1c35724598cc5a80694d23aed

    SHA512

    f880e5a48effbf42431e1cbe2ed7e75899fd35e8a8ed733892b29fa0587268518621336d81191d7228536fafcadfacce3eb7fef16e0a067e2773025059a2ce9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6c70863afdd328a7b2ccf5108e3d9db

    SHA1

    fea070a6ad6fb7d7d885b9f923c188c79b6345b6

    SHA256

    97d3a6b606e2891a4c24d324e69fac18a9f3e779681fb7926e07ecd8b6cf2bff

    SHA512

    19bbd111bb6485a90215c4e5af74e9d3f4c7c541422bc9ae5177e9b2d9a08d9c78250ba77ab0b049f5ce81dffe5054920150a8737e3e590eb48f3f620962c3f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d63b653bb59f506445d27c013b519901

    SHA1

    876789e00a66219d1e03aa155132b1aba58da66c

    SHA256

    9254436694efdcf5871483850b43ee64d9dfcd71629c5e7dc306af8a1ca33854

    SHA512

    3ed952c278c415bb109f225115cbc9167ddd5dfb4417b87fb2fd41326033f3d2fa16f13fe8a46ce2d5ef2f0ccd2f7fb0f45a5cc9353edb9535768612ae72609a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    615938f7affdd037e555c331fef36214

    SHA1

    535abdf880fa01a125f972862786fccae80b5d7d

    SHA256

    05e3ceea33efc567bc11ee8cedac16c1f5453a1ec15c40f409186e4674d8aaed

    SHA512

    177d3a07722a7c46d56b39ddc10503b93301b449c2564d0d47d00102cd3eb83034bba219546660f27b8ce2390ab7282bd625f73ec62b635c3bf357263c61e75a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    656135d5a66d3a6c158e2d84c14f9a0c

    SHA1

    f17e1b4aeacd8b4f7bd03fe776f50ec51d35ab30

    SHA256

    df85d6a0e7a842d9e6ace77a0c30828df29cf7a72c632d364a446ed6b893b439

    SHA512

    e361b15ae90674d87c09234b3124dd47f8f05e0a328d18c063524c5fe70df53ce6ade8fb5ab76d946f7e9ce6e9399e982146439e58ea09cd0e3ccf1a36356500

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    838872a0db522e8dc06f48e5172d629b

    SHA1

    112f2eac4bf2a469f7b61c102c82d692be45e660

    SHA256

    4fad537b553abfda7524623aa3692b589d756702d75a0283949394127fa4535a

    SHA512

    ee79d213129603822aecd54457dc73ff21e8a7c20608ae7006a5baadf65a63115d27071632a59e0d1bd231ade5464dd4dedbb8d33341617549015d2946985799

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60cf3d3d6905f125272706f005297699

    SHA1

    061484b56234d20413a500144d753df2d96278cc

    SHA256

    2d6670d8ddb9d0aac390a10ab58e7b1e9e6bf599042991f96075d90eedf5bd38

    SHA512

    60d90d0896daa12a12ee131250070499747edfb343acbcf04b7ec3dda3382749336a2aa1063d66f284d3093587411b5405619b6cb0cbdb0d1f8bda2436749dd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27a4fa24804a7069efcdca80ff2f4e37

    SHA1

    a4e74ce615c6aac3f651ec8ee45f5ae2a347bd81

    SHA256

    99133a924268560d5bd904c30a963a2f4dc779a30fb3aa60c88da6be4901b639

    SHA512

    c35ff29d6efad37099ddac7bcab2297d00ab15282e2d0311b2370ccbe2aefe2acfaff18368ef77bd6eea0019d499b933f969cb1b34a4f896f39a42f0ac110396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    864377c59ce9e41236581cb0773f5738

    SHA1

    e8f66207362fc57deb3d9bd4258fae53b5409588

    SHA256

    87f2b177dfffbbc0df485d0e5110ac5b830466a47c9a7414a9c8545d9b0cf52d

    SHA512

    af0b4f1ff7834fb20766f72dcdb13ee85d4a6e6312441da7549f6aa4c507d24c83cc3c3758d6359713ec8181ef67011bc6f443ae9a1ebf0953dd96c7b431a234

  • C:\Users\Admin\AppData\Local\Temp\Cab44A1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4521.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b