Analysis

  • max time kernel
    123s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/GongSolutions.WPF.DragDrop.xml

  • Size

    72KB

  • MD5

    acfd3c87541898ddbe58ac661155cf23

  • SHA1

    1699d1d9be61144085f16996698c52b51eb4215c

  • SHA256

    bdda71a532d81e93f5713fc096d4b0b423d38272674799c5cd26ce4b26d4ca02

  • SHA512

    64cc79c2f8c62da97c90b9bf9484f8bcf0e586d470aefeed49976c04da07a1601b5abbc34939180568b72a055032a7a6293c3bdbb75825cd936e342da8a479eb

  • SSDEEP

    768:hKE6JuJJ+7d7BfmXB9DtbI8OAM/6OhDfkn/fZII9n+Y4t/gtzMHKk:hr6HZoB9Dt+6ZfZII9n+Y4t/gtzMHt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\GongSolutions.WPF.DragDrop.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48db5bf4e23804512e148173a4c3af1f

    SHA1

    0465383ad7b29db9b732d95415a24e13abe68762

    SHA256

    32e15acac44beef66ec7514ccdb83f729b16606b366311d2ef8b1c788d320ea9

    SHA512

    1e428a0e097e9f5c93d0e0bc4c93b0699e1e6c2c227e240d63e704d70dd98fe3434dbf65988ed8aa60e4b0a88f2602f0aecb64d1f47dc81f0ef82ed2d98cf468

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6167384ebbc334a97b7ec2176fa0ca2e

    SHA1

    ab7ebe6c3d44c19126d644a296e809455473bf0a

    SHA256

    590962299d79d1ced8f1a99aa7ea556fc96235d6f9bf006bd084da9cb2235b5e

    SHA512

    1a8252eef24abe6ef9b217f0c00bc36b2f388c189aba2d7d61f43a6a2c320258b1455ae9db3ecafc060cc7087c487d1a34ad4fa9723ff83074828ac62e5c19b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c51b730b35420e22e126b460a1ac14d5

    SHA1

    87940b2079f3a1fcd11668187d5a67650ee5ebb3

    SHA256

    f8a152bc7e62cf7580137993287cf29fb9a96387605aa4d9642c2e8d003b3533

    SHA512

    22d88ae47bae531c6b3b259803d7c35318b3e6ba572d695aa7cedb13c736cde718ee173489e21da394083d7002d4558a52a20dc9a22f37180c89c93d2d24fc68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e11c23280df0328d4515ec15bf5dc50

    SHA1

    81aa7a59bd4bd94bece60f84d28b93c10384e63d

    SHA256

    fd7da94ee6f905d21058267930c61323c03d42e6d88accd86c6444f2c0ee50bf

    SHA512

    5c59310ef507dcabba8bd5708c7e4e2cde0934a5e44c65490f9ef4c74bdb90627cd6039e4fde1cc22019df85e309d329c2d64242daf2988d3e6eceb5ed059b71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d15c9420c04a866b86b5c7f7ca856b7

    SHA1

    d7d2c90d720a12fbebd1026c0c627e3b1ef930fb

    SHA256

    ea9d13a2c558d2b06ca0519f986108233aa94d43d348d524949cb47c61d447ad

    SHA512

    1b1f4325ac73eee04dfa5a93682ccaf30c93b74f4077caa955d31fdf07ee6f58ed19e6a721435a2ef5649b9c68d72c590353ee63e66a9c245457cb2f47608c2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6a92c20eee4a0fc041323193bfd9730

    SHA1

    11dce65d43e62b90bba53101e64371ccbd81ef20

    SHA256

    bba85d2fb6e57ece2bf735358e826b10685a2fb8eff7f2d095046c380d2ef42d

    SHA512

    ac65584f75c52f047f6c8e5f1e8cbf1a299ae47ba4deea10c670f1f4f4938a6d027ab4c9539f7134f4038e6c95dc8edef177678b7e6f02ecf7ec80d01292314f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2793cb21af2922e750da17d276126ac8

    SHA1

    cd6adb5d2c5b7fcb3956be8d118392480eaaf894

    SHA256

    55774cdde1d10e734fcb30426b6a523d3d2f18c94d3719ec52f09efdaf38a68b

    SHA512

    cf4d3baf73a7346c98ddfda3fed7cb2af8226ea46bca8bca672bb7938e0fc0f91e745febbf93c7c9571399093f47fe9becbd45bdbd2eb3473e6a6d66fb949f85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93757ce3a60372ffa87d0727b3a9643f

    SHA1

    3d5dba222b2741198dd5d84800be798f2e6b0b33

    SHA256

    cb579f64924865863d66a63a0669ef30635581ff32113c6b242d9a11f5299900

    SHA512

    a8223228f498a0de0c16c19c64fd6e9cdf8a032d392e0f0c368fac7c7baa9df07fc267b83fb955b7dbf22d9d81667939d6d5944bb1f7f0024c2ff3d31cd3c443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b42bc25d9ef1413e446df19cf289deb

    SHA1

    49b17c3d67355159af66a35be9b6d99bdcaa3edd

    SHA256

    975f717c76e336a6cd292fef8a4a362c6016169fd631ca38d1ca7d1132ce840d

    SHA512

    7f20fa4eba26d4f43d30e3d4baaa6f7aa0d1468d96f1a8b6bf8901b05a7ad65435eebd83641bdf09eea58466afe0e7462c38af4e57fe8a7eaf1088ba409a30c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1621a648589f2c73373595af872af4d9

    SHA1

    8ed406867b3ae010dc2f15f0d44c61ff7e2589d0

    SHA256

    f64bd5ebd774f0baabeb31f49b619aab7dd69533ec544aaaab21be92ec8b9aaa

    SHA512

    f692c3494cd30afe029961d069e990bba694df62fcd85e27517ea06e469dcdffeaffd4389d928d03f7c935966105f880c4c186f205e2fa6f214b8d6bf1f46505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f708e97fabbc885496dffcaf369c69c

    SHA1

    8838f86f9bf22eb3267f00dc95fbab457061a27d

    SHA256

    97e101427705cc40ae8988984a6ae01b2729ce817d0919cc88f70d711a279116

    SHA512

    8b53e130cb640ada739d74b0c6a9acbb5d45e86bc99d68f87ed428ce8d9d8f5428ad00fefa30a20a361322185dc97dfbcb63e297122436475a7bc019fda106a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20c5a3f9b7621bd23ce9479d03081063

    SHA1

    d333839fcb149c910fb21994894dd3f327dfa787

    SHA256

    d3165ed664d2c092c4f560bd63c4b71b273d6c03d4260dfde7a4e9f500566e52

    SHA512

    7c1cd3a8dd823983d39eac415efbd0af45f582bc063aea05a67f7edbb646b0814e2a4b41621964dee10fae336d1650564710bd3dd5745db98fe354f15d4fcbbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65b66c7927769d7c2c4777b7342254e3

    SHA1

    c41ba0e2ae736f697b5d492672b27e3aab99bf64

    SHA256

    c059cf767ff5f9516f0be2cf0344e8ee23952a3f791712d1f67c7f1da9262952

    SHA512

    76882599f554758a915b8d11e008774a79baacf6aed55c09d174d2ef638dd2eedd25e869e14ad94fc7d9ceb2c338b9ad44da995eaec79ebc95c40e3b2df21881

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38efe6ba93631aff1eeec6703c4b3123

    SHA1

    824523a2d9cc1e940cc0a0c9cec47f2b91b5b2e7

    SHA256

    cab11103d63e0a208f90033fed96be5b98b9e4a3cf21de3653ec45cce16b224b

    SHA512

    c40d0d1ef8981e52f5d709416e0599aa2008a334074476b969583e3000c8d65eb57e807210bf331086d509c6ce6677928e7d411acc549b69f18cfcf165fac5f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c223dc774ebc1619fa7992febe8f99c

    SHA1

    c46d6aed4731afa68ea581a5d5b582f675f561f6

    SHA256

    ad7f7caeb00df8d5fc8e4c1dc5776513de0f7527bb8e4fc1c95fea7b6e7fe75d

    SHA512

    2bd98df3163f4c3aa36063f412a411c1f04cc96ce56a11ba5ae5bf924e5feb43b4f8c01ea7485802fe798c9e09b6713c02d63f96478a89126807f7adbc1ebbbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    676149c83b2afec6886ef8dfc32a2b0d

    SHA1

    7f749e9f5b5a639c56fe7e5b6b68c534f0e71bd9

    SHA256

    d936790d1c38d0da704c87ac1954a8e4e6f386982b5b13ef6e50037c9c30b8b5

    SHA512

    185236576f06cf69d1a2b102c2dd21ba34c4b9448695e87d8509895c43f234e69ee7f8da1eb1dbcea3e0776efe5369eb5465747a7853551e1191dce7c0e375e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    605ed66c666841be218af9b3f4bd55a1

    SHA1

    d3f92d0aab289323384b5149113fae560dfc3701

    SHA256

    75faf211c2b143f58d188e1ad322bb86af63a4e656333e03d8e843daba1c6cef

    SHA512

    ff269dda2de7454088afab8d2012a847a81f2e9669123177e71032332164710f39af1bef1f64eff1ee666649913247092ead04890a374d58bcc3c89fff6e0a01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf56379b123dec9913717525442759b1

    SHA1

    4130fc215ed1a5bdb035eff5641ae313abfb8d56

    SHA256

    76fa7b1776513aea08c8021658583df87fdfec718d0e594ccbb1bb1006d6a5de

    SHA512

    530f4fb43a387bdf71b4e891337d4d8ded224c47c55f937dd1e8a6fb9f0e4bd391ed5c1ff75d8de7a33c993b457e59a549feb42591bc3962ad787931735d6ca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    602f98d64569c76d0078f7a9c35f8373

    SHA1

    2ff06f40bbd4a74fdfa134da04af5ae3f113f3d8

    SHA256

    b554cd924458d507af9fb1e23b2980cfa77028a6aaf387fe1851d66c635b47c6

    SHA512

    d3d20b7d92b0c653443c0977c858e611a66399abc96fd11504f52c6c9e86b74d23221e1ad32f403d13880d7b8aaee74ff414c07c1f6096193b43beeef9fbbe3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14b04165c02448d0e555048eac5ceac4

    SHA1

    cbdef1c0d66f45563576bf8572a22d0b862afb6d

    SHA256

    d269f4efee9b2e3eb66b6bb62c25dd1ab6cbdf0298ce3f6fa5821f3823971756

    SHA512

    4b210e524ac833a340189651a89061f556a65adb76cba4521428490a06dd5a46c1ccd95dcb82ea6cf222579bad2d35d957ff606bd47764055fcfa23fcd3a83e1

  • C:\Users\Admin\AppData\Local\Temp\CabF3C4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF482.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b