Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/FluentCommandLineParser.xml

  • Size

    116KB

  • MD5

    e479f4c914c9c0fab2ecc86e31cd1d93

  • SHA1

    386bfea40ba5ba1b78cb210cb8de5ef227067d0d

  • SHA256

    0cf7bc714b9a0e327723fd9728ef3b839e2f4f19eec7a2868127c88e810c7aea

  • SHA512

    cfc1729531241742aa36cf11479716a3115bd82cc8b9d8624adf5cad88551fd9f60f594f942ff5b662e5061bec3177fc15ddbe0d831ab424e2a96e2e5570accc

  • SSDEEP

    768:KkkM87lE8lT51nmVc35ZfQfvoa4jm8DYidrq:5Tc35ckl0ixq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\FluentCommandLineParser.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2840b44821b9ecdab846ea33aeb4005

    SHA1

    bc88440f41d953a37ad3e6e778a627677adabdd9

    SHA256

    ed4577712a7d38c4fa2083a47a54598128e14048ebeebf1f127f5c0d73b614c0

    SHA512

    df9478385644cd13a5ab06ad4305a5d937411fdbf0faafa54229a2da1e5279371a97c3ec8f03421915f8367dda7f82dce2f4e1d246555d10752eef0948c1b3f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7db989cf92f28ca45ec1865f2371fbca

    SHA1

    eddef8b40dd15a63a16b73f00b1a7f0ac89cf235

    SHA256

    05ce892dd8c17e536fea6594100d1f3c460d0157002a328532aa60bf88618f77

    SHA512

    d4a2dd50a6955ccf6f9313561f5618414ab37153ca1103294e534eb8e99e01adff52367d38647eaef8cb26b2cb6e3b298ed8449b5655ce63a74dc3e6cef422e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e1a6dca961d6ec57ba62b92e20edc60

    SHA1

    bdec184e04537beae63baeb5ba8f4c8c94ba80ce

    SHA256

    073324ed3f5946ec3718d62a6a3068aa48b2c383682f437fab67e3390bed9edc

    SHA512

    f2d99defe309c5531ccb8519820b4e356d7618f8e5e394b65715d5dd03ba729c31b460a6e9ea91cb5056f06481f6664e0ad314273ffc3e06ef03bccf437943ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    885a28727943b8b93d3c2669253d90bd

    SHA1

    c3b536c569f7399481c57a067de8a8e1c07fb027

    SHA256

    405d49b949997d13ce9696cd5f7dd2ea161798e10bd776853b21ad7d58fa56e9

    SHA512

    cf57d0b5a8d5aefe65c46a67170ed17c0dc726e421b6569c395994e97c982df604a75d380d905d9de852c841f5604c5e5d2aa2bb313d9e775159d90825166b6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bff8448c934450d365a8b220332c5431

    SHA1

    bc86be648bb5f5ba24467737109e9529db34d950

    SHA256

    018771399fab39638bebd9d591dbd31c9b725a03d0e086c8fc1511fcfdc2e04d

    SHA512

    0d3d66101913b68b8740b393f03d3dbd9024728fbd5e0a0353b299f8e45b1833bb16e42ddc2e5773e6c6d3e17dfcae7039ce6dcc1e372c5b34544b28007f8ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a30ad210f7cd1ed511df3a925500717

    SHA1

    0daba2508ceba2a167abc572ed7d840a670294a9

    SHA256

    aa9d8554e1e399769e21ccc4025de181e5f793d47cf6a7833ab03b1d1d0204ec

    SHA512

    bd6055f4d71236c8bedc0ac6efbdf77fd3848e4ef8d714ab52c1b618f2fe18eeb7b32ac03a0817612058f237590ff61cbf9f708ac9add45b5ebab684a395593b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19439f50577aae1cded59f6f671d1987

    SHA1

    9d4806502cb28f006c488be33db7efd556ee9c7a

    SHA256

    246b464147bf68b374b2e51cc7dd99e6fd28696dd499e4eb44b889f2c2a02497

    SHA512

    f67f17b127a878082b04a1e36ab075b171e8598afee0cf205b19758b53b9d6b8a3d362a15412f9bf319bfdc2562ea365c16257e4787d70c512b78d77452d900c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a6e8bd36795b0c34b74f4e634d393d6

    SHA1

    b3ee1d9c418afcce01df1231e90cc746adb4f75f

    SHA256

    8c8ed2553eb740ae9f765682030df6ca6f3471649b748ba1c98f0c770c3ae4f1

    SHA512

    322080c257fa2bdf608530d254759e618299359da9a59bf2e4b7dee88d483808935e91db625cf19cde9b803b99d310f3d3bb88c84282569b269f81b62b407d40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdd867f9e4ad155e04589377a926bbf7

    SHA1

    8549dc9e42402795e4502368663ce4c924c0c2ba

    SHA256

    1f0927962b813b203faef929e526917d369da5dc10ea8a1e0cb8f9c01e545c53

    SHA512

    4b17e52bd8cc63ca71a8c1973e39dc2a09bd2bba09530b07b654e3f325c6c68ee8ec4311cc1ffd78560240d1bb6493d8d7477c89d3d415f4c63a5aa74c3ff5c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e890ef1177fdd45da3ca35263bd8ca0

    SHA1

    5086e2baa2fb6c5440ab0cbe65866d11e312ea42

    SHA256

    8570e8466ca55b14fd47b19aa9bc22cfc7df16247905da36144bb4cafd7f415d

    SHA512

    54198d272ccc8f557069e9e7318ebbb118b0a156f586fd884448b1dfdffc7c1f2812fdb8e2252f2388b91d0161d73ff6508bc27a6c25ae30c01876e21b4e1dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d8c34c774cacbb3a5957886ea538e7d

    SHA1

    cc956d84211347f7d0dfb2734eea6602f18ab0d2

    SHA256

    86e04f2bf7bff0d6cf87fe05607c341497ca6cb26c6b3d409912ac787d5f1f10

    SHA512

    5c3e6a7549588d92f5ed38c9da1d94381c544d682c627a6dff72a6a4076b783bf7cc93ee7179d274f821d2dcdc7aca18b31f2d73989725c13522a132cce54e97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8042efb37211701c960bd73ae8c05bfa

    SHA1

    e0f94227ae61b70a6e850533943752b4b5271c7a

    SHA256

    056e231dd191d080643309090e4979af8ff6fa4d9710ce4881aab6fa495283cf

    SHA512

    24974da8e3cf9173bd1584b25fc0ee4ead02da96effeb3f29703fa6e966a62716bad24a4269169f7ed604a100645d8c6e057fdec0db81eca72341a974e95df97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5be6e5c6238bff864173773987b003a0

    SHA1

    4a375372ad629817afa9ec0def30b207aa13f98a

    SHA256

    6eb2bfad5fd9c7ac1c01b82ec3749cc93db127edf405f2cd4c8c64c92dd714f8

    SHA512

    1b3ab5c4e2eeba17cf07dc72bcea023003a559cc405f8953f731fb5ea0fd21a79b85864ff3e547e5b7c5d317f2788589709e99e7fdee58e7b51252c0548e6cbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2ee5ca55ac4848816ebacd2e8720860

    SHA1

    5d0947f133e88f4b6080cb7d075edf63618ce514

    SHA256

    57ada04a7846edf61488d0d9faccdbf3bf9133a2fb6fe4fd864c1e78e19e1cb0

    SHA512

    376f47fcfe8ccc0bfe6e4afd5a7ff0454335723ee66b158a887a48fb48d98d86c165a723cebfd8d75bdd42e9c7ba9bfd71b774811dd25247da83b7962d21215a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf1dd171effe9ea0506a1eed03ff7aaf

    SHA1

    2a3d00ad40ed3e3a83a53d01560748327f96f46e

    SHA256

    280ca5a56922493782878c2b7c1114962099eb77e77e63e5555a526f364ec851

    SHA512

    95262c828b7207b94e78ea8846d590a6d6a03aa1233cc2edf46e0b8ee0d74a6871e4ea50720225d380de420cbb7b5d8fc02f115b117a7fe694273fc046ee90b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ff56c9b50c6df69942b0744e7bf550

    SHA1

    8469033827b0c98229ca08f0483372ad0c0e5def

    SHA256

    739ef29649cdacba5d6197f18bc5df18851455d5ba1e496f02abb55802bf492b

    SHA512

    6e964fe077fa10befaba2f050cb51c71014a1bddf050ca5977b097275c72541d89572321d87e2723169b1ded5511a93baaafe971f4b2e3e29f00a2fe42c62d53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38c05333a69e308b6dec55f2a724ed1f

    SHA1

    ae4dbd64eadc90673c99578a5764d7a9ee52d6ea

    SHA256

    1d2be419151f99c47a2c0b96b1e8c1e592129810c2cd1ae45a8dd42fac321617

    SHA512

    7b6a3baf7a708ac63025b6a487d4f7acf320dd518b9061cd41d82ca294b2766661133505f8c070d48787644b8beb661deb917da20ae6a5303ef735612765c2aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6306ceff83b7c16fba9909da7b69efeb

    SHA1

    156540f3f3fc7e31b13dc775cbf148ede71e69b0

    SHA256

    85c6b1c66143a7335315e274977fb628a7405b2d9d61ff7e7cc4af3f1ed90a12

    SHA512

    0c72a87ab62fe11aafc9dace104c8c3a24a283cedbf8205468b09cd95f4f1c7248c46708f3a904965f250c2180b9c7f0c1fd3132f7d8051922cbba78d423ce32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5df6278c9ab8acfaa1189a218979af3

    SHA1

    9cc99bca77aaae4ac09146a275aa223f85c4200e

    SHA256

    49d789c986ee0101c66df43f387afa7181c52bf63e8c06a75d89c919369dcc56

    SHA512

    d8584cb4b38da43b53e4ab2bd6092864a5cae3c6bb431ee98164d801e3dfdf3543ac49eed3d4f3e2b3f0c370a37a4e6c9d30dd30af744e791ba4ad8c381e2639

  • C:\Users\Admin\AppData\Local\Temp\CabCDBE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCE6E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b