Analysis

  • max time kernel
    117s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/ICSharpCode.AvalonEdit.xml

  • Size

    582KB

  • MD5

    5bd494ea6ab9ed3a0dd5f4736a6c1f8d

  • SHA1

    9ffb4fa061171eeba0714cad028c4655aa2d241c

  • SHA256

    a8de4e43ec6747781a7e01a7e5d51c92cffff32879e6bc3795c75c9ac90fd9cf

  • SHA512

    60eb5a1a8b253e680bfe4340c2ef4810ef3089124959804436a1a910a8750208972623923e7613a03a41db0d08a93c568c7b424a5406bb5ea40453f2c617a71c

  • SSDEEP

    6144:sFilxsTCj3BkjMG8AitANoPNzLINIFlhgTS9ycdxyhxYYbqEt:9g2Yc4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\ICSharpCode.AvalonEdit.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b64068d4c17a179ef6cd9c8e2073d94

    SHA1

    9de6812ae73effe4a63f68427c3d8bd79f5e7385

    SHA256

    ba9b303a947cfcbb78993cda1faf5bd1ccabf57ebfb949aaf207ebe4d9faa1cf

    SHA512

    fcf162c8aee4acc8c897bca3869600e794b123d440603121e0177219dead51412c6d4200750c91a429ae96b85d2977f2c99f393b2bf5992b055b91cb6ca66ed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f78ed1c723fa929c11c8811a997639d2

    SHA1

    a64f2d2342668b30a013b7716430cbf54dd5c5e1

    SHA256

    4531518eb305614b01171fc46c886239b54e19fce3ac0046746b86d830f3def7

    SHA512

    c02d12190ddf45332bbc26d8f8278d0288e78fa9be6e6b5ea6055f2482ad98d9f4c1bbff5f1209198fe9214bcc8d39d51adf380553e85d916ae46551c4c9d4b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6068565153a9fb49b2e741c2f5be052

    SHA1

    e307f358b49f5d9628086cea8fad771b779fdda5

    SHA256

    af7b550a395fb60f9932d59e5eb80016e579156e0eb500c0def4575396ee362c

    SHA512

    68e5106a9eeef735f6e44a05f73ba932418970c2aa5de9a8ff54a6d5eaf7f82503939f6ebdbe4c8c7dd9833b1f08f28a518d0ec577f7361b837f6ffb2674ddb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21253c6d81aa911394a5971c40a12ecf

    SHA1

    6436922c7d5975f5c846b24e0810214c9660e323

    SHA256

    1f97bd1b0efb61c42ab28de0fcb55fe227701c2fef8c399655e71b2253d826e7

    SHA512

    6077c79f9af876de02ad243441f94d4cb619401e63f7636fc5af343b93d4d680f17d6ff964acdddd126932d8a947d8624a91afa1028199c2c82d289a42f9e08f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a178d6c5f37d464eed37e0a14094375

    SHA1

    3870b31880696f10439f3eacaaae40766e670671

    SHA256

    1fbd7dc4e9a1fed625bd6eee40b1aaecddabf5462629879b1dfa65ed6b92c792

    SHA512

    5b5cf0e984f5dc79e04b79bbbf95abd5a6fd512d2d7aaed6cf7aa7501b8948e9ff4292814b5c218c1066670c0ab59274f0a09784e0f2792e50342b11c3f0018a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8070bc79c2f98cab2098e19759919723

    SHA1

    3bdf92c4ef0dd5ba97d4185af08a0e17f05bdf76

    SHA256

    074cf6230f67485e0ff3bfb716b553d93c9bd69343536b0735c93bba4304a5e7

    SHA512

    8b255b1691bf75c7c42e1707471983f15e5a7963fa5a2f73c87f5704268d74d9dcdba1d58edda9726d7dc27409429812566fa1d822fa235a55bbc0fda924126c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40af10bd7b093029484ce6706c813640

    SHA1

    2c72f288d27dfd89db9d6d408dcefbe5412e0c7d

    SHA256

    9faa69077918c6eb956af15ed116307d04d564346eb516bf7e8e7d4041068c28

    SHA512

    dd4b705daaad0f4a2a59b522da235c6ee632fa8f33706365a012819bfd051ed3dd1487b55f9515ee3ab5218618bbaeccda6a959b940c17259829ec8c18b4f88c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87d2517a93ad1bbb4ea2d4871e9834ff

    SHA1

    7f8d36ab9eab73989647a9183179abffff7da690

    SHA256

    75c669e934a224aeb78d66677864eac36ed9686319ebd634cb0a1a5b102a5d55

    SHA512

    7798c3b4d335ce34f7972841e805a0c0e2c837fa2e03f06052b7c01787bfb72088086d2ef8bd0c68257b6aadecab45fd55fb000af9c96d42063e354a1bd36643

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddc24c2f90804c42e0931a595f692e55

    SHA1

    43f3101e5d4e290faae307b188c7d8e21afdb4fa

    SHA256

    c60cb267f0cd501b80d8ae9bf546b9badb93ebbd897381223a26d0dd074f2440

    SHA512

    9ba31d5aeab050feb1050a6eb217b6a64d7843d8055640f5840d2571262f4264504b05fde4cad560b805123d0416a697e991329a1e9162a25eb20afe9e461085

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5634c8928e28e2425ce130b6d2b51f3

    SHA1

    36348564ce72634188b3d1287161ee4e72a971a5

    SHA256

    ed4d8c49a55ecdfcc9270d95776d2c5d901aea8a9b44cf95673954527bbb5178

    SHA512

    c88f4496acf2ba0f70c252d51043df7618292183816726e28c2c1195600e85a75f1b54fe7771e3459a78d53b52ab1916b09b9a90b1a8a7f7459d0a8f00f8fb51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b90ef54e3cb90020447276a78f149f0c

    SHA1

    5fc49bea1b7a203dfab647ed9b5b1cfce622775f

    SHA256

    ca20f6c925c975052227b05b8917667a0403feeaf7f65f766c58e7ee3cd16e39

    SHA512

    0be33315ef9a97fffb808c9d2b3312a027806ceabf6a67bebc9d49f1a2a73a4864d826d721984ad4e16e3c8f71422a859eb7c71e20fee262de859c15bd5e17df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42297cf2511b59253a8dfd5305718858

    SHA1

    f78254b3bbbfb8ca26b13784855a0c8392f32cbf

    SHA256

    c849c9afd0297995e56d5d5621e8b6d31deec74937c7d401e564a9d0f6990257

    SHA512

    b75b6e998abd1c4ca6c77a0f92a51318ddccf1045d46c5de050c54f0b8a7491a13a04a7dd18040a383b2a2e67ebe7065bc18b2a4fd528c51641a5e710ff6a1d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb1d5ccae5dc4346a8de5c44f444f0ca

    SHA1

    da47b82891b811f49187d8b3f4a48e2c838e65b4

    SHA256

    bcb9078739e5608ff18d053b877c20f14823e37bdde2f1a04089ae4ab39df023

    SHA512

    14d33c8dcc66911657c8cf88dfe41a5c2064bbaedfc33189f665716eb70cc76347902dbd5db5650fc73bd64bff08e8cfa88fb2edeba7f2702f1b28d3a256c06c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9a3c8bb791936fb4bc2f84c4152d315

    SHA1

    07a09d7403fdac58fd6bba3049e6b60397e20a27

    SHA256

    2b017040882be3066469f1bd890d71f7499bf78ce74a58de61aac244d378c783

    SHA512

    a0d087f2da694ea926c2eda58417a99b959afb8ba10d9b731323826030706000088a0f60e6f4c2520af7af9f0a79b9a5d73500f41b54aa193d5ee1121e232cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f592451b91c3ed53f6e6b60c8c9559a6

    SHA1

    e183fb3ed8d7dc5ead62104212683c41b9dc18dd

    SHA256

    f8acf68187ff320cabc8e5ab64cf2089b48d07121dc57a03bbfe303c3beff0de

    SHA512

    4c019151df001fcb287504e140c19954bfe1119a8c75a215a8c6a4cf43a4cab76d211d282fb238e5a2a9356a598a0932152edd76acf40e13ff2a40e38181a177

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9eb4b36bb7cf706998f46dc93e17b929

    SHA1

    6751725758f48f53f67fab5cd8c5520083716886

    SHA256

    658b664d47a6bcabf2130df3050995393a29ad5c737dd64672245a14ad46c737

    SHA512

    9058662f86624c4f8bed0f550094712dc247bf7d42209bca1d4cd97a825f0ddd10c012d904e6d58f2edc72b3d68de2eb1aed86aac0186924018c8ca6422fef4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    342d18334b696f1b6086130dd6406349

    SHA1

    3a9f4f2c3e5163b1a3bae78be27aaba1b627f5b8

    SHA256

    a08378f018c95e7dc96cb8023bc1819d4f44b9bca1bcee74106d03291bce3019

    SHA512

    db09214638b44e52645cd5cf6bab5617b193b870324135dc24e250fc3576e9feaf65fe452dcede8dc3cb722d540797579f0a52ff801950e10dcb6b92d7b4ec3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8612ebefd22fc6ddce071ad792457df

    SHA1

    740cdf7c01ed25ae8148d45ec5f0900105671287

    SHA256

    df2e40eb3307f407f6c87cf0d3a654ba90a374b42207b1751f1e26f2cafe3ac8

    SHA512

    4c361ca6561cc07d8c1e202990f4198c9425cd599862bcc08ab5e5e7008db5936872ae1a52f03e124c743ed45fce986bf54c799843cbf773034ec624960455ce

  • C:\Users\Admin\AppData\Local\Temp\Cab3084.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar30F6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b