Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/MahApps.Metro.xml

  • Size

    373KB

  • MD5

    0c8bce16598497ef3057e11ec1993707

  • SHA1

    ce3695594d2ac344630c4486761770b89221522e

  • SHA256

    5e95cbccf4d2132109d55bef3bb49c6c83920a20fa99cc1a3c5e26234a58052e

  • SHA512

    7080facff2734d2c24fa1948dd60aec8a6ec70f6a252e8aee672b5532ee0431a7699a2371ea390af71893ae7b3c4843a57ed50fc4407b2632763ede713a91aab

  • SSDEEP

    6144:Bm9j36hRyWTBKcqsjYCGGEauE72mJjAD51GA:Bm9jLGA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\MahApps.Metro.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a69f115554956b49bb166df0f70e866c

    SHA1

    814d11b17376d3b5dc0a4ec83f0fb2778cbd2380

    SHA256

    636550b6b6840fff9792df3971b03c19b02aae93425a7f060d88eb4390fa5799

    SHA512

    8066db5d87c2b258f90174cedfafca4de9df32166a3610c29d1e86f04794a633959048c8577c844731b4de35810f342c4606464d4ab0326660b360a59f3f7f83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    234853b1f0ad7bd6ae6c6c6c0924de86

    SHA1

    9590748ebb6acb5ca0288f70cb72a2dcc4603edf

    SHA256

    75933281953344cde1849cc89a0503ee78c8664bf2ef5200f92463a02cf66f68

    SHA512

    12fae1999e4e18721ba8e0ed334190a16bbf1fe6fe4bff38c6d20e4c15509bd8928a5b4d896d072f5dc3e752ef701697591047ed483bcf2fa2805a16f19d92b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43d43d1d894bbc4a78cdc049a78c2b50

    SHA1

    e62e74275b4944b66fc3446712304e60a44e33dc

    SHA256

    1aee9acd83fc9c3cb578fedcd01c288c1a12e93be9b07a0440c8f440d14c579e

    SHA512

    a93305804cfd51ef086d9edbe9e38ac7cecf24971c617fc61b606beae07c6b3537284070068cb3bcbd1983371a2d3a5cf30fe40315b7c1fb08f40fbfdd269936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff3895a56b7484c7564b2915bef3ee4b

    SHA1

    0a216593aa97e9a4d0cd788e1b8884800c80a813

    SHA256

    7ab78103e62e883d4e37c47fa68c153959c264e44ddc2b735e13479d646a1b97

    SHA512

    d8fa68838f4702fcaa9332a065fd1c2b3bd72e11c069e216b9dd13eef64a45c3dc743ca4a2f8cf6824c1b091dc35110950e571eaffa0142e22c17f6259698380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3c51fe47e10e8307abeac28113bb0d2

    SHA1

    d6bdd7b52fe859436156f8597176f19b98f565ac

    SHA256

    e904ff4746f2ec61b723536823ef7f53de743fa1ecbb610e23ec781117407ed6

    SHA512

    89ed344ef382253d52cc7149f3a1ef6a26eae14e10340c34e02501c50f6cfbda52ee5c0e6f85861139c73964eac725b3ded2e598551c7d255db3e9835651a82d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43ee155f2d3589ff16ce65f81c879cd0

    SHA1

    cceb01b111604bfeb20d4ce9a173268fed0ac089

    SHA256

    a61377b34d29d907be9e650de8f26c56b243c9f7363224514660371e79382575

    SHA512

    a518d17248f78de942b22cebf3e8b6d9c0e18a9870608befe5eaf4b41bc0554da3e59beb384b3f65623302e1b573c5eddf0ffcc448ce88dcbc0adef793368068

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e73ccdd22154f7674a3f4867736cc21

    SHA1

    fd2dbf1bc2ee257b2a25019dfee65bcdc195d4c7

    SHA256

    5d57370b9322510be65ebc59ad26011e9345f0307401b8b7a01b0226c6b15afc

    SHA512

    722396a21d11cd0ee652d277fb76c2ff14666e188f71caef81c78ff40e885c2ee3f2e1a3fc854a1583039c181146c3c7da1702d5172ecd1a32df1acbd3b2fa1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3db626043a9fe07a8e44b09db9f53a51

    SHA1

    e6b4dd4d1796da9de16a31d25850a393f1fb156e

    SHA256

    cbbe352ce45ffdcad23004aee8542e61630d1c05bcc8553c3b828cbd2e20d990

    SHA512

    7640832c1256b35e7e4809018217f8d3927ed2fae2d65b8fd1962205bef58206dfbdb037992e74219f1f82b4b3d1c99ce4e55304c3621bf23c671561c4a7774d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8429672b2906a194139c0d0b388526c4

    SHA1

    98c0feaa4d048a15c2c7eb47544dc75be0edcb8f

    SHA256

    e0ad82a786dbbc543980a819d0cfea75a1f897d6ea98b551e529182e86275116

    SHA512

    70d3ab0755dede8fe151cf2e2480dacfe234d0d3926c89e1578fe0e8d184e27cb2f41fab412b2b8ea033e9655e68955016e87f3143a29f7dac12d24f25f19876

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb7600e9c4e5587cd937f33cc8faaf2e

    SHA1

    2b6ae12e2b0bbc6cb339099dd975867e97219690

    SHA256

    fc2ecab141e8735d4edb864c42a75c901fd22ce4fd9d1248e06972d2a3924b24

    SHA512

    1237313183087ed360818d495fb1850d1a728af0d0ef8d9b3f664c3bd375f069f9eb07a67c981c030299c34df43b340fe7721f794fd09544cd38739100fd45e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    119db1551bc233bca7afc16bc88bed6e

    SHA1

    49417aac04c5ef289acc727631658f01a4bb4159

    SHA256

    0e9f502055d8a3baad7e93205e7246911ddb10f34259ab1bb2f091bc9f6dd8d5

    SHA512

    791b849ecb25c1f4a23af2bcacb5b3763c1344cacda3bec8c06b0a8a44207ce5bed88cf5ea80b434eba712fdec43d6d5cce7103f242bbe467a1880833ab54ea8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3bb782bc906ddd6f0064a3881ae0260

    SHA1

    d3abea5a20d68bd75b442f18c0f47d77a5d8a42a

    SHA256

    6aaa5cbc13780cd6e65f690dc3251b96b2f877a9e0b9b0859ff1eccb39ce2f91

    SHA512

    03cac63d7c9ae0ca4f15ae55397c2f9e3ab6a3c8257d615740767dfc66f67f734b7cc0e3d515af5985ea2fd70741109156548887333657749aa891d41410a6a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    762015570a1a9968b677843809dccd3e

    SHA1

    90a898c311420a65e6d1488d4a45bc02bd6ba7d3

    SHA256

    19e003479e74f8d83124c6d06409ff42abba7c5f7794c33f387cee8c55b9fe07

    SHA512

    bff79c1e66cebb9087c8025d50043c7041beee5c7b17b12d8b9dc023701c1c6be4d3e3a53f88ad1ad8da60e50ebf2b1effbf8bd13ec6782521ba27402f19ce04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42a154ace60071fb835b4910a5c0dbe1

    SHA1

    bf5342fe0680a0b92e17402b2605dff3f5daa589

    SHA256

    95d4dadb8295dc9940eee978693b7bd973e26ac717c61663c3ab9e8e663f5fae

    SHA512

    7d62db6008a6129df1ef047a8c40d99110b35464e1d4f6c77c1f42828819cbd60157a5b19925971b3f41efc0c313fb5bf5c0733792b125435c2086afc37d3210

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64ff93710fd4c6b477dd2e477a725cc4

    SHA1

    d1f42644b099e1f2c991b818ecd2f988a651fb3f

    SHA256

    143dfa0d6d8d0f4471e5bd915ba899cb864ccf7ea9a2131535fd2fef882d7160

    SHA512

    e6b8ab4e73d33dfa60d73b90cb39e92012d64b4b07b324c4a71770aedac2266cdba6753b2cdbccb511432ced2f631e3e441988494d665d980b476c39a8c15a1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    993f0e0a15dcfb364908ceff3aa2f85c

    SHA1

    00bb7af6f66d3c84595f0b0cdf7b1f7ae32bb493

    SHA256

    d7420813e2216ee17ef6fd33f38d38b7a9b9c6bdfda6d1bdd42383ae1cec7e00

    SHA512

    8094129dc5d75258da37b37e7456556e54e32285cc5d1268f0ccec4452a5a63e981a0b4212e2080fd6420e54142ff271f4016fa5dcead24b9ef8d47005766e38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2a2999280b2037a1c3a8d6e545fb06b

    SHA1

    f183141697a956d0776461882d156d1d2120c310

    SHA256

    7f370d49f7c3545b8c2dc2d5a54e062535f78d8419abb819e49cd59657dc338a

    SHA512

    6956ebaaf1e001f9f077a8954a485458720ea4ba96703a9d88e237913fcfb3e52486a31af2464f5aba2a0ed50e678f9d0f2404f5498ec655c82c756dfbc3ccee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1bc96ed6020e3c09d35652f76dbb11c

    SHA1

    3b8966be783c37a110595439295196ba0ee77971

    SHA256

    f09e28b6f712c8f2672232d3266d55db7c2c5b5dfec4b502001b3b5c8abf87d0

    SHA512

    6282929657c7a5dbb689cdc9896fbda03f67a5abe5f2d45b8b18c25203d303587545755bf2aaa6bc6ff163573570fb92cd7f1fff462a2707bef6172f4654e158

  • C:\Users\Admin\AppData\Local\Temp\CabD902.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD9C2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b