Analysis

  • max time kernel
    138s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 23:18

General

  • Target

    geode/resources/geode.loader/EventSheet-hd.xml

  • Size

    1KB

  • MD5

    732790dbc88d1ce29b5304866067b833

  • SHA1

    3bff7d8db17a9895f5aab37a946d4cc05a809eb9

  • SHA256

    2f328b13098b78d8ff23cca587eb791f8f49370673837324f5c600dc7070d1ed

  • SHA512

    da212a50da0c4b93e780e5ae33952b6e5fe0c85d0d5a283ad0ae7cef391c0314ee6d57519cf8b8551345b46ea84669d7f7f0a8c447652217ad57fc139c28d143

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\geode\resources\geode.loader\EventSheet-hd.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3515ec03770abe9dcde4faefc74767c

    SHA1

    1c456dcfaeebdaadca7b442d2d4325ea1f8c7372

    SHA256

    d484c18a62594b5ea6f29274209af28ee5f81710c6c7fc90281bb2c2263c148b

    SHA512

    58d13066f4d04576eec75499d198bc2442f941a53500fd246fc731dca0f0c44e5f6fbdcfddba46afaa6166c76c72eb838339efdf74704c1f7679da7da03706c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20768854256084f4ef4cb170cad65f92

    SHA1

    d8dd0935697b73deb2cb3733b89d69eb47bccf29

    SHA256

    21c7705f7251287abe652c18c8320973e58c7c89473780e67a4491ce5d746b18

    SHA512

    86c135e313e620fe44a1c1d915a3f365c9c64408acfe15fd0e72e7d8e202b86d13de9919b13af81ba31fbdb66b0021f8854a7eb1b721a05c27ae311bda2a5f98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e89e4d701a7fc5bfdd1c5000ae514c1d

    SHA1

    061ebe875ab606bdf9ba78bb577c350de7b0037c

    SHA256

    c7eaeadd995eb367e85a1b1c64ccf9f575b4d7abfaef6cd1166239134631ee4e

    SHA512

    e2da00399885b82b7901bfc6965fce0cd0c267e45af068fe4dfc989ebbac832fbf81d25ff027bd708102b209c753b6120dc0e4bd0101a8d80e28dc0deb57cad1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cf02dbf91737372c992fd74332851ff

    SHA1

    599e5450aa921d6dfd35b25c04da37dc157f5d6e

    SHA256

    afeb1da7832198b62ebe195c0908540a0e4723963a9dc3fd6a771b876dfc3d6c

    SHA512

    826ed68180d5e5c0eb4d5d6a7e43d913897365049e34d113d4d593bfa69f9bc64d71122248b50a0f0df024e95f58db7a6937ec3e2fe1b5389ade457a56624585

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b59b33d3e8c2d8ef3e92838e80fb378d

    SHA1

    484640e14ebd99b49ba7a9f9121a1e9d2cf8d3aa

    SHA256

    03381277ab9845ff649d94f24153f68a5b29ec2c8100e43035ea547e67f425d2

    SHA512

    b190b7bc761bddbc4e1e5b136ae8124f9e507a2c52405798bfdee8f59c6595f382e4f58eb38a4ab0353626df6980d4384af7b4977d362d192094d792f2843357

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d63e109049ed099373901654ce54eed1

    SHA1

    1c6fc277e3646745d01f4060fd3758043fe8384b

    SHA256

    544531b10c7d93907a87ca4ebd2b26896191b0ca5cee169f4b9da9d60a30e495

    SHA512

    c7be556311bcae1e197e8c8805b806b42742582a4741c373ce8477c63a645c3eb052f519036b29c9a6e5f7b31d47cfdefecbee670873534cf804a33605197156

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88a905610e90ce87843e64901c72d631

    SHA1

    91a779c502893431e31fa20d7945a35172a94102

    SHA256

    60bfd4883f0d3469913ba410045fec69d0500044d9fcca4305e837f3bfe62b7a

    SHA512

    0b1543f1333308d1873d6b7bf07c793c21588b8180055ad88566812ad80492b6d1789cb14d362a9c283f70c4f7bceffa6d5a5275bf3bec9f48753440f96b2a13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1665acb7405bfafe4237d6aedf99946c

    SHA1

    5f805eccebd415b93db7e36664af95497262dfb0

    SHA256

    d1022ab68bb56d95dc3dabd6303e6e8320661f412ebebc7c04a92413b449d8e5

    SHA512

    f7eb6ec8a7ef9b2f62e3a77e2a9f9a54a79fcd4b0b5e0edc48b3c09ceb22da428fd4e1a5214de2e859a8d7135bdbaa4bddbfb52c05b4ed034b8e8dbbc624fb8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e04630b608ada4889d3513a0c151ccf0

    SHA1

    25e67467e408fe6fe37fa43f9be519bd6665e995

    SHA256

    2e4290785071424b2ccc1875373345c5192e8986399926140278e4748a6d5f87

    SHA512

    67da5468c0b9c02deabe78fd834fedb289531bc550e36d05560a9e08ebd9da55327b8af67f9e006a724f81bbce8f91247569089247525c60163d6555844feeac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfb6569873ea48fa9118a5566d54beba

    SHA1

    96857a6c1012e0e77ac55523e9784a7f22d18c35

    SHA256

    bcd01fa727b7435b8b68d29f4ff58fe5aec05591f79ab5b632cc33d2039fa4fc

    SHA512

    3dca4a77cf868e2427a0638ea591f15dd09458684dea76086be48fc554d8be8e21e554afe3db0b5945d2a52ac59d4f0616622b67cd52ea857305ae0d0958ef80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7743a4894aad65f9f06607a7f143664

    SHA1

    d97e4d3ffd63bbdfddc6be21917385fff05b1f0e

    SHA256

    e7af65f38ed66e6e87dc3edd2f2b5cf1b3d36189779e6ee4f699f4b74c8e9f6a

    SHA512

    47ada6674a6c21ea9ff5de4b6e6dbd8bffcf2833c51df5423a91773fcf136d877f123950a6f26d6e8cd3e5ac3aee31afd798393dc7a5238bec3f999897f98127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    721902867bd68c148a2cdf070569f3ed

    SHA1

    f5451fb5e74cd776fab19d26e6e62a617ef7a36f

    SHA256

    67ea8b5a28ebfd1d4cdb69e9f7c11eb8ef943525e43e66d640fd787c1084fa8e

    SHA512

    5f16dbad2671c81719592ef50cd677579d7351a4829333537fc5714a50745d2beb4f69bee5b3b4dde174e7f6730fd7dc5130c8de8b8fdec254a4cface7334c27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22f7120e6cf003027f5584809f6408f7

    SHA1

    df7327b381a418d8593e3cb93e866ebef4920eb4

    SHA256

    a4b73b28c776a98255bd391fca3ec1aecad562ce73feb1c9c4603cab8f4332fd

    SHA512

    74f67ee3d6789283838c650083acff556b564eff4d2d9fcb77bd13fa42c9a51a2712404d59d10817c9c124c6e870b46bc1d48bbea7240ecaad5f2e083cc9d535

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cc45a1f569d7249d0faca892a1cd8f9

    SHA1

    fc547e7af64bb0c9f11f51b53911cefafc94aeac

    SHA256

    5638c68c37ae6edec6922737691dc99ee49012f7c86bdd7f86fe6b039c49975e

    SHA512

    ccf1c6bbd95ba07d6064e72fd3d08fad9f39ba4a54b2ac8e26fcaabc436ba728b0cf6b12c754cef1e793f2e5d8a4b730ec5fae3f8e4989bbff173d4f7d53e980

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fc4ff31e393852893cc85f2b26ec43d

    SHA1

    35daf260d8584742721d5d81b8018dbd5d6abed2

    SHA256

    5aca13dff37a5d345503942302e8808913d749e3b3a8a2fbfad8f9b9d5d88287

    SHA512

    0d23b386979f7facbe8e870eeb45e40f387f1b0f07e5b02a1c96391a05fd08da716fafad391fcff4b6db12f870c91395334aea824ebc6a4bd6442a5b8134e434

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    996126baf04d4749516fb9e01a5b3601

    SHA1

    e7ceca35ce77c9a1948f349bec9f079826d0bee4

    SHA256

    6aa2d5c2b6af09c99364b90e14d02852dad71816178e599efb73c40c35b4b209

    SHA512

    ca4806e09d3ca49655e9a19d05adc0b17b286de6955fd8f5c866a4fb1cc2eb1201ed3d4e6087b1bd3fd62166dc9b83a6ea259fccbd9104e9fdfbfb3a7313581c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86128cfbe3c3cc39e665d6ff69f46999

    SHA1

    087f48ed826fbdd77aca5f526bb47975dcb361af

    SHA256

    d90c7c3302accc63a9982535afee9f0a74106a611b8876d5713ec3d990f8c590

    SHA512

    4e06098ae6cc6871bbc9cc4338ec8ee1d0ab195825388d916dec109efd9a61e642a20e8c7f1abb1bf120e41d550581ac0f0984b97d72dc0f858e611e07a11c6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a37fc29255dbbe557fbfe9d73f54ec7c

    SHA1

    0db16384e278db6b6d42fd5cf4b7a89acce9d797

    SHA256

    ca7cfb30a64576f419820364d8a7bc233d75ea406f7f98a03e0889a686e716d5

    SHA512

    b0bed14f7248fd461f24853bea3b2367fb7ec9ba97d3f19de8a4c2833c74ac5fa0ee45594ec4b3bba353872d33037aa2fe31ebc2455a47292a9b185a1a1bb9f2

  • C:\Users\Admin\AppData\Local\Temp\Cab6700.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar67CF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b