Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/MahApps.Metro.IconPacks.Material.xml

  • Size

    9KB

  • MD5

    01439430243696f2ac9eae521649f4db

  • SHA1

    03453f8ee3ef81a4c2f43f49d8affa07a4d62873

  • SHA256

    678ea9afbe0406875f3182b6654743200c5f1297ab4b9ac07de1b4eaa09e4b27

  • SHA512

    ebcbf88dd370f4356bd964bb5c6ec495c3aa1484460d7d1a3a821b49ebbda9aaa128948b6ec98ff4bda1e553759aa1bce533fa6bd10d52e03b508139811f2a49

  • SSDEEP

    192:xiCcRF9RSJrnMqwYHW8YUrFTz0A8oYw6c6wAI7ivS43u0X6LiV4AHF8Q:xiCcRF9RSJrnMqwYHW8drFToA8oYw6cW

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\MahApps.Metro.IconPacks.Material.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f53e86a03786299538970dcda25d73c

    SHA1

    e4ac2472f4cb8e42fb8d9aca2b29b8988646787a

    SHA256

    779c22e41ec03b127c4b66970503302857c545d56936512233a3ce4b2dc7c78d

    SHA512

    1e3287d74ef34a848b492498787d749f6339c0a7b640b1b7bdcbb641b253320725b0ebfe3cfb6f1febadf76d1d67dfaf313a72fcf52fab0a7db17e905126f95e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    140fe38affa2600955e8ca42a0a36221

    SHA1

    3d1aa1b8b1dd99a22c752c5acac04aa2c7d563d2

    SHA256

    0224f381676cb96b8c671a782bcd97f4657e421879996f7547a7277bcb670cb2

    SHA512

    15636ed4dacfff7c66fef20d36daef9f21c5c5acc4c80d701aecca2b6edbb5d3e1af937ed824c8ce1e40b0bf61cd69871b12e2ae28b7fcefde66007c8de80617

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e2fd28f5e06f4e8cfabbd18ec4fc62b

    SHA1

    b5d341a46503f2cda3b2d90d27136a0451c235e2

    SHA256

    aacd5b130296db2f5ea513f3a7b5895bc41008e7e38300ae1a7b919f98e00b71

    SHA512

    391115eaa9a82dafee798547bd12d1155a6d6cbe7f9d590b0831d1ef16b2e9b122870c911ca89b713247062a42d40c25b076c498086bd708a65e8a11bef446fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d221d19ed15f550e0d9b0042416fe86a

    SHA1

    750319a1d38f421068b3a481957cde9e53ad5b0a

    SHA256

    3cbfae86ce00398e13d9f67079263a9aad64cf0c9b19045b3758cb16055b2e41

    SHA512

    5564f3107e7b3bd7c962f746b3b4935efbfaaeef359b10e959f65338ac63b8c4fdda7f790e221af8bcbf4f038ed4c47b74632b7d2e0a0903149e06125e32a5f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22f5d2a5a01688a82923229278ffc7a3

    SHA1

    e50e6866dff56e5d3f847fc2ac4d556f2386c105

    SHA256

    4badac3494ea5019583c579af8b07b86fef7919f2596975dec9f394de1c7b6fe

    SHA512

    a0c04b25adc4a72519a1847e2ceed9b8153c403b985e491687ca33f315022ae59966d88db4cb3463667912be51ed84e02e97d2e479b40ef549b20dc5699310ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f742a63369fe8008b78ab1522996751

    SHA1

    171ce83013e88a3a6152911e7e3f1b8378b1efb8

    SHA256

    bf3929d2197da15da99c7faf1d66760247eda6191492858f92c3fa7e4267e09f

    SHA512

    7de65f77b0eb6eeec62e79e0bc865ad441a0432cdd48b9969c4eb2962c62eeebf92ba174aecce03ff19faeef249671cfe3ca7ca35f45844789103669841a9999

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fed95da07b098fb5ce1c77aff1bfdb2

    SHA1

    b5e3d4d8a04f1329c00a26e9b2623c92b4884e0a

    SHA256

    d659366eaf2bca07d14bcf47ba8cdf9cced8d94dbd00620f08c400bc5deba331

    SHA512

    42f12c862de488c7b0f8b9bf33afe9844313ff942f85af4bfffc3bb17a77b247d0eea13ce13316430f4c264aec6cbbf31741e28fe4f115de6eab108cbe1e429a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efc6026c7058fe185555f7f8d5d6e71f

    SHA1

    4329333ea08fdc99e4100b34253d1033da50590d

    SHA256

    0238bb95be6122afbfe757cff73c1a808b6410a9ad6a907555ce64d342254565

    SHA512

    7053403a0bff349b1cca2540a23fae5497679946aaa56157fde5d6d227acba6b6646350b4157ac247b86b833c21072a904fcd52850957af65282d4761221ff63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b1d3aba8efd506f158566508f00d448

    SHA1

    4a7f7dcede48da66790243d49d9bdeb18edac404

    SHA256

    182e0ab96c39bbe44adabb3be2121bf9583e2a75cd16b9c5ae1baf0a694b2545

    SHA512

    3e2a74fee6f9b2e0a407b514d3c650d99a5d9c4133d93c6b543a18a68c9ccaddd795e34b5ce92601e7cbc2d635ad730ed61dd51702770a55183defc8db05ae62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98df85be6f2229d0d49b8611a64643b3

    SHA1

    04e32dea93ae0f436e45e7e8fdd825c56f3858f0

    SHA256

    82b59c1e1919b1ed22e654af5058417f7fb0af298a76a63c83e43584e9c20f89

    SHA512

    da9adddcbe239365e778c7dd20b90979f2fc44ed6bbf3cc9ab5aa1aa120903367a7ec4ce0007235169aaeac5420a1a7d75a15266e332ec3b0bf3a534653c5ba6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f9781470920e7aab104d694c929cd4b

    SHA1

    1db12e4d1a55b03af36c68a2178e3e8797341b94

    SHA256

    272e11aace28a2f651bd1c778a98efeec6eeffcbcf2fdb75847020bf5b3454ff

    SHA512

    d01ca092ec31744d4e6d6a556d4f832a15534ba724ce96778b54653013e78f75bb93663a4afdc987e27975e416cc5ffdd249bcb41d775586b1a88f02544e14c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3159138934340e4da9faf9498e4ad9c2

    SHA1

    890841d6cbc890358eafe970aba29a565a0d9449

    SHA256

    c2c0fe048a5f107869e5ae33d8dbba396b3bb6dfdf77c99710d9bd060caf34a9

    SHA512

    1e9e6da4557b6c67288035c30a5f1378c68f2c93daf8f3c2b7086320046fab763c7fae76c30c479e37858c8a3aa89789590d09a4dd67d07dacb29664e57f6bbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c71c5a279bb59c12745b1a16c2300b8

    SHA1

    ee08478d404fd242b33e4a0613859cfd6dd7bfc2

    SHA256

    54f2d36ea5eed612993ddf6f4a6332c8f5f9ea52b9e063bae69b7281dbb56182

    SHA512

    3dba68b2020fd7b009ce5204066a00a0292d4d197bdae4d78c487261e55747f0463b99a4106f5c46b1219dbbc0c3ce691d01866bbece9483b53057b246af14d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b932e18f7bb2f3f09e45c6012e6c781d

    SHA1

    b93881ce1d37e6aec188a640935700df53601b1c

    SHA256

    7394070fcf633a7c350adc30a736b809c48544c9dad21f9fce6a5ed33d9b2ef8

    SHA512

    75755a6a6e4d521f1e92b8647a17814df49a4e7177e80124bc785c90d3778d5eefe05803f05c1de1fb0f75cf3535f98f8911f4a68342739e07f7ac6b80cf6176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7714e5f3870373a52b22c7f70abc0f74

    SHA1

    914ee0aea38095a83450918f0eb87d869860fede

    SHA256

    bf44e5caec510f9cfabbc860b10f330e55c15601e367b70de0b2a8c4e2dab12d

    SHA512

    19002cf5aaa5280e84df26317a010f8ed2a13a13062496058b232068b84b9c5805d40fa57b7603e497d692affac93d926c070ff69a3f4dd624f37ebac937f268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cb4d43edcc47b2d0834423d0f0ee1e3

    SHA1

    1a574c6456764f424122305765273b018a664cd6

    SHA256

    172ded38397cb9d0e3d5c52f1fd6a9d5c89d3caa8fb5c21041e6adb9eedbcd31

    SHA512

    6ad1b4699b1893579ee0f81ac2a7a9da75649a373271cbef07ce76ce9276f3d32ed4d79afa0e220b956dfc46861b651f7055397b26a6d8381fe4f62dd9154da4

  • C:\Users\Admin\AppData\Local\Temp\Cab8421.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8491.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b