Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/Microsoft.Threading.Tasks.xml

  • Size

    49KB

  • MD5

    fa83e973ba2842c66deee48be6bd5167

  • SHA1

    7e5e5d1fd31400b24ca4a6bebf818eaa63c2515a

  • SHA256

    1b88c8dcbc2b8f05571ff63af36e10ddf6f4e348ae51d54565dc8a7b3bb487e3

  • SHA512

    dfb3ded8a0faebbafe2ed1add4bc6b2958de833a4a6cd4b405d6a6967ab8a34d0d9680717d615745a8a516d80b78739ca37e1fc78212675f4ef70bba008fa02f

  • SSDEEP

    1536:9FjksQsKC8U53CNkgZ3a+HrOC0fxvHUiQJYvBvck2PkmcDQ2Cb9E28:9FjksQsKC8U53CNkgZ3a+HrOC0fxvHUm

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\Microsoft.Threading.Tasks.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f3ed729924ed287bf4c46a5607f9a94

    SHA1

    a3a753568705b068879ba53cf8519e190c6a1e4e

    SHA256

    72a6e596178cd6ca246bcce90557ae9186b6cb95ce22713895e83796f31a869f

    SHA512

    e86807050983c06af7ef72aa0f720780afc53ae70300942fedb715ce54f6c0c4d12503a6d928ced5c38ae5c63c51067a5e78da43bcbdce27b5aa4ba7e2ef42ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a07807dce4a6407e2403fd0a98e84af

    SHA1

    3672f639191bf8aea6948eefa63a276ae552e20c

    SHA256

    4ebc8130f7b1d9ec527377fb5de4c1a9f70af325d3f8a446958ec5ca42ac88e0

    SHA512

    30fc9825b4a40489359d9b39c0e0c8b2be14fc478debabc704474c261a2db2daf59c90fd7b63a61e44ac00e408ee3715bb028cb6e6627f3e7ce9714620c9d5ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18f0f9334a06ee9e8277d775cae68d66

    SHA1

    5cf142fa7c092f4d434875bbabeb8da0245e9cb5

    SHA256

    c39238b46997a00dc8a1231e5321ca8bfe7df10ecce1b72ef4715697023671bc

    SHA512

    8f4a4b2f30f0cb9b2768c1a90989c5a39598c70d90b489cf058dcd9615e71d5b8bef0683e0e0ca66396f0ca422362f14890c84e752b315604f244ac4b64d474e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a15a3314da10c4b44177131fb80f3989

    SHA1

    3cfb153d2c7a6234567d522525d224afd07c85e6

    SHA256

    594964f697deb41f4e25ca9576f7598856b04615e00ca9be26c1c46590e05f37

    SHA512

    451d8e950d45431910ce391d98dc76d55183db920ed961b4d6411abcea7a9314377e21fc186e097340670c3730d8399a94b0a872ecc78003f37d56fee349b31a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bfffa402bb58475c0eb747f9dbc0b41

    SHA1

    45afbacf2d094dda56cb629b0af16d08cd5ab0c6

    SHA256

    7f05bc77fea98fd7d9fcd9af5c513636f1769fc94261979e170d96467e45ef3e

    SHA512

    7fa33a72a8af0f752d9c51d35f3cf0d3c4e5756dfc83c03a1bc61f61c25d5fbafb97a71c19ea700e323553c37a24c54616396065eb182b97fcd02d6d5f291638

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e27b3107c249aea84ea79fe1960b9e75

    SHA1

    eeabcb6305ca59643f2428d0d1e677f1a98438c2

    SHA256

    2141fe5652436ccf6ba9dafed5e4d5c6f1fc43cb7c0ffab0270f13cf43c74fde

    SHA512

    d3030de093988edbb78084073720bd174936c45e41d120aaedd50dce01e870d7b5b64b8237e8b930ac9c836129204d32e401851cfacdfc36f4ad1e5c46913852

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18ab01ebd7b5acd601ab088b7af3561e

    SHA1

    05da0fcd31bb1b09a9491376af8a179f4714fd4a

    SHA256

    51c65d87c3d7458364de704579cf378b7640cc16470e43e291ee0743851afa2a

    SHA512

    c9dd4fca533b29b40a07ecb3dbb2e142981bd80c844bd934f5529cd38f4456d2db783d5466987c923981958478ab43f7a59094181e125015744cc6c90dc1cc93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd52c92847ac910ba8d3078e4d90e314

    SHA1

    15f6c646022df9b41abfd5f0563831a553ef70d3

    SHA256

    8854fee0f34e9da81b7e481c53229c1e58ec9e60fd8561d4be6dde70966bf0df

    SHA512

    751e69583f650197a55f6f23cf38fb044f1d94fb7d323d68ea74fad1927bf4baf9b27a14e8e4c4d39baa91b6f403adba0286aafd17e523dafde8934c1ce76590

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e079c9333d44ae6c5bdb042d178b105d

    SHA1

    4c3474c9d3f54fa1b8d5c425c384dd3a658320ca

    SHA256

    4870132f4ae98be7c4f850f16262266bee5eb609e53d4c49f8574859561cfa71

    SHA512

    6f02955bba4fc4af09b5f6b7657da2002d6134ab847bc5ccf5ee8ca28658050eaf5c550191bed6a645879d1dff3a761e2fe41c892ad94be0a97712662af43cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4aac18d6872da82f816f99a2be0c0f82

    SHA1

    c8982b4b8cf691e466d7b13ab4a9fc0250e44543

    SHA256

    29e2da8efad1823a22b5dd9b01df0a3eb35407fb41a9aaca1f1366a6bc30d00a

    SHA512

    04cd5626f4206098c8c3925d9d0dd7a5a9e0856b11859f72d3da7d8e119bc85806ae0a91b61eb2adcac4dc3c332f53a3601c310e0abe4a9390b0182bc9cdd8e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de987200f44a733946f76eaa533cbcc9

    SHA1

    536d0d89a9343ffb3705c49f26a44afd3fd186cc

    SHA256

    a4b638d549473c74af18ec137f60f0c217cb564e3e53e3ebc491e944da609999

    SHA512

    810f99046181c614bc651157f95507f29fa88914688999eb86c0f47c0d82212e2416c425519e1ae5d24ca3a9f8d5b7ed99fc76dea53c8b48e68e74bb42d55833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ccae27c7c7fff4e0f412d3123306aab

    SHA1

    568712c1397654c6670ed416bda0f6e8908cf335

    SHA256

    b552073b859e86072503c716ce995133dabc2a755781effa275ddb274e180069

    SHA512

    583087852454e2c5dbb954c9857c363da5eb3064caf85490c39c4ec91f6e6bc5b7a113c81729b717d54f182259e0d12eb4ca3a1ae4ff34e860b4b9f218ff76b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4002229c246c66ddd7d8e9c89ba774f8

    SHA1

    9f2a44e8c8737735f1b737f186334ecd07015708

    SHA256

    5842a3b4405456a15b280f25dc591d48e9d0c7324231675a58aa2a12cb3ba59f

    SHA512

    ebf393019c9b6e6cbb992716468fb654093e90ace4cbc841fd7372bd38fc9d73efca7c667b3ceaff5ce52ce82e1c2258613bcce32b942cd5fb0a792796258951

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6258c32e75379c1c5b4b446a39735c1f

    SHA1

    8cfe8bc2f809665842b9431483f901c87bdaa53e

    SHA256

    8859b7af9cea0f4bb63fe6fd56e372fb75709805ca9e3a75dd987affec631a92

    SHA512

    0d119304baf45efd4d67ef113ae7ab20779d728db3a16e3e3bc431208633d76085db6e4a3b2a34ff34a159406c7aa80097534dfaa94e03f2eeffd60e7ebcdd50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    375e6de2391c888c2f81919eb1279ad3

    SHA1

    5471eb5adf34dc1510347627e8ddc9a59c041d4a

    SHA256

    e60d9fcd5d37abb34320c992cfd0aa2405dc505165c494daa4034079440f7822

    SHA512

    87d680220b42cc71ec52c7fe74d81ef63b3584ef8c9aed2c9927e055fcb534ea8d7987be0d4df24716ff28d0f91b7b91f6e50c3f94f43269e3c7b4d6c13e0424

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07b78b274d28b41084822f1833f3d1cc

    SHA1

    47310472c1371046b8bbaed9e29b6123f56b6dae

    SHA256

    f23bf8ce81583f98893c8605dbe361ee1d707677bfc8e5f3b64299708bde5f67

    SHA512

    30e8ee8a3018d921c5452b8ba4d25100993f94c9f36eb8c6c3cf898f69850c3881032f3258ea36551ac1de68f6245322b12615f832d227e051c5a5ff629432a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31f8d56fe675fa731171f009d5a74b3a

    SHA1

    8ac8c1b17a0afbf67468788ca866362e408794d9

    SHA256

    25f6e67fe878b47a4ce76f95f3db0e576b0abfd73f0a8da06dfd423b26c145f2

    SHA512

    bbe3c95418e0341acf4472aa5a20b207af3f88d2099f4ab94c2904887d5d16cc37514573f3ed47f753c1466006516cb8235b017e233c67d3c16a94febf926500

  • C:\Users\Admin\AppData\Local\Temp\Cab3E9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4A8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b