Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/Newtonsoft.Json.xml

  • Size

    693KB

  • MD5

    f414b3f68fe7c4f094b8fe8382f858c9

  • SHA1

    66ee1b3266fcedde433b392156ab4a24262b2f34

  • SHA256

    2d46b37b086d6848af5f021d2d7a40581ce78aadd8ee39d309aee4771a0eeccf

  • SHA512

    19b2feb40c2e9d4d20d9a21f88f6ecea773060c056b8cbbd21a6eec41486dc5fc101e6c31129b0d53466d04709bcd4ed777058ddfb02532242b43e253a7b24bd

  • SSDEEP

    6144:XqqUmk/RikeaG0rH3jGHdl0/InHHpgVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QA:DUq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\Newtonsoft.Json.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10bb15cfbf2c18e9d3278fa6bb12a9a5

    SHA1

    45edcf32997de58a11fb117d221eea8fa54f6404

    SHA256

    08df1bcbc26588c777bdd26692346f1c47fba2cefe0b513c8c5c77368ea72e8e

    SHA512

    32d34ab3a01285b0d4e39021de92fa77d70ca3a955a655886fcf6d8816b13132e6cd43f1436de42292af6d5d260044f3f8bb317d5a7c667ef788bcf60f111981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99643b633df9ea962b0f1302c9f4adcd

    SHA1

    9b199014058cf0eecf3697f67c293f5619657161

    SHA256

    1a3751652614baaa135a3d33a7536941be1f3463dd2e65a36de90cabb212f67b

    SHA512

    b0624b527b3359d5620d331a01a2072bb619f2efc743ce879072a991a1c8a60640a4ef6dffb4b97a3c6bc72b1a05edc610c7d39b078d54f7f71d24a5fd0a068f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88713cbfb25fb7159d822542c999ff83

    SHA1

    79e3e35ff40f10544d0d500b297c77e15dbfe5ff

    SHA256

    1ec11c47c9eafaf625ecb60c45963dead2800e6415a8a35157098cd684e086fb

    SHA512

    e1b8e960f083c088ef9c6e9e6cfe1f999870a346f3ba57b30d49bafec907b2d262d885c82947d355d65996587f869b9a23b8e4dfa14217f95ed83c0e6696d2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dff0370a3682bcb13c86fa96404ee16b

    SHA1

    a585d7842dbf971131e88df014b473296b96026f

    SHA256

    812e04d356294096165fbc1c2ef4db85adc08e8dcc7e4c65133ae6ebf7396471

    SHA512

    8837b5c40e9068d0ef1f625a8264917fceb5889af12170ef0e9955c8d1b9c9aeee2404757af60a7252881d1be58e6e9755123ac329c4e0653b9ef6e11a71b6ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffb7e28e72dac0b0901d44fee98a90a6

    SHA1

    501efac033f8bbc9a009994b098cef40eecf9f79

    SHA256

    53d18d881ae240492e70bffb3b683af1555200b4e8a991ff1150cdd460b863a7

    SHA512

    0ff4cc1b9d4fe4a91d876b1c99b5edf68127ab9d2309c69013844483560f5fd3e2ed414b06faaf1db0b8c2dfa4623357017a5e66487e5c40e84af97d6df00c3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c47264b9f321eec93defc4603cbd3b3

    SHA1

    b72dc417a98115dcf3ea51a24580c6959fe349cd

    SHA256

    b228fd1c63c852823b10796675d274a133cb48908bc57d21762dc28552fcc069

    SHA512

    b28278d448f8264169d29baa75aeeea5ae491e6f984635423591d83a03f8765b8180b355d3fd0accb231b01c474af8bcd5b4c26d263ad5fdee243bd9f329c7aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eba457ac5cdf36a9ab7791991b86b063

    SHA1

    aa4ba305e5d401251e840481c96915f80ec6d7e2

    SHA256

    23897661ddc0d9f15a31a64058f3f205fc1619bbe36c5afaa1b1ea01b8ab9fbf

    SHA512

    bc9730f50b77dea631b253ff82fd5c410711333f9995045432e92c72e137c5308579335f5a93f591142855f84ff9232faf8ffde8b8096d9e50b3286b1267dfc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f9fce64390518bba9398f414a014f6a

    SHA1

    8f32a6067c656e9d0fe4fd3e877b4a809bc92b27

    SHA256

    384aca92ef97b735b65b4bd30f0545e905c98479f0869676b00fe6784a6ab2ff

    SHA512

    dc7ca72d71554f785d7d8b2220678df5add5008ac102d859ab929a9bbc72a32ec27492191af66b98997a2aaa4383e8bf635d739d66c75c6e987c973cc0c31e19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4f95d5b3b39f79311bca2a6523330f3

    SHA1

    a5cbf15228229768a9f425d35095a52bc0b404c9

    SHA256

    7356668cfb543934e1c270cc1762ac7f4ad3ecd5754851b85ba491d3ba5e365b

    SHA512

    adbb21dd908787f27c0ff87eec7fba6b23b7539fd57db1d886fd8babe98755edab098b08e11d5633a8be06944eab498e8e2c84e3dc901cae53c77c0700619050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d69ffa29d4d749a60631bf6b3101f19

    SHA1

    c9dd706cc516c9c4447962db7f3327a8b93dfa75

    SHA256

    8f7ffdfca6451b653ec18e21ceb91e83ab3b21477c1458e4e32aeeb1d398ba16

    SHA512

    255ec25f4a6547d860c4c68078e8acad13d56bbc3f8b257bf4b1c872097ae86459ba3d1ae5ca2551242a474866209d01163bd4ca07a993d909a74242b73f8822

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acaf5a4dc2b397bc31b5bb4d8b0d5fd2

    SHA1

    fa3608c7aa8514acc94e9e8bdeb226c3c0cab0ed

    SHA256

    354f2889fcd689db8a3c570b48737e8d18a238a8caf5a36217b0c366f3d4901e

    SHA512

    a8229736431fe27ba8b1580f45658ba542c06eb309ed2b5459f3ddf2c8f6db962f92dce15576a59b44401ebac8d930b03dfb6435459c5e284378c73bd8ca8efe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    160698c4633ceb46f04dd861b30e6622

    SHA1

    8e1680f0e97d1f671e517fa2a8aa7f9ffcb032f6

    SHA256

    74a5a543760b6c867943e23a943dc21c61f228e8c9a4b57b199fb4f94aa733b5

    SHA512

    dd7fe0822da3e41b28bdf052dcac38cfacab7c71142c85b0204b41eadf0c3a76986b3d026d5fc45b86644198e649324a8ba1761233fbea9cc773e7ea3054d43b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    121072f71aeb95013164fbc0492b8611

    SHA1

    4b71cfb1a87eac45e2fd492f24f834ab4141231d

    SHA256

    2ba80aca62e42238ff82191221fe6131ed94e066f9afd16c3dbb5cd19b2bcbc0

    SHA512

    0dc57f81b2240d63adcd9221f8f31b84141d152a0374410bf106bb42c7657dbd0b7e937b5e02759b3e1839ee02a80a1ae62efcd406794bfec92ffefa8c457af7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96b8a20da04ba3bc8cd4fce3a9b90715

    SHA1

    ed3ef5b2839de612d0786711d24d57760ee4283d

    SHA256

    1ebe73e802f3e8cde942b70c6790f9a13d7432a7da281e04e3b08cd804f5336f

    SHA512

    68a787d2a1b316bf15796413ae439d69d262aa75e6c31e63a424d868bf2569f76e186216d8adb5d4b1807105714b89c35d21c954b24adbf3d32c47c4a9199aa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fb85c3d8c9a0fa96216b622a0aa0788

    SHA1

    f2a4d39f2d9078acebbbd1d6f9942bfa847593a9

    SHA256

    72ceee26aa61b88393dc4b525c0beb1a605936a18aa2d4d3ae04bfb5dc8abc6d

    SHA512

    3ca29fc232c9e163c1467fcfefb76abc8ba4be429e89a51e50015c51f71ac7fd007a6a7ddadd579c60f198634bf7ec06831ded0ee1464ddae98d59562068ce3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c81881e1e2c81591372d9aa0ee180458

    SHA1

    df10f78083104e4ae87a9c456de6af3ff258cd7c

    SHA256

    29e33f0dbce99266920a94db4033a441b85a7308f1bfee5fd998658cbba227d0

    SHA512

    b4aa26694876144e37241aaa96d61a775a50d5cc2f805a338fcd5c8ee7ab6a62c00d6b4aab3a26a217d833108c170f8f456d8b15d504637ec9140c0b4e30698a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    155c56b538828c4a223b7ce5091939f0

    SHA1

    c8b51c6f1aa3b1f5f53d41e9b7f4717b442e21a2

    SHA256

    bac3c943a23c2baa61171b9b7ae242723eb1030ee975fafd8e563da6828f1337

    SHA512

    3b651961661cf4750d8cef7eb68f19e2183cdf59a0682f99a47e9ce9cf776d40a9bbf6a7105ee3c2649d4fd0898de69e1c07e16d688269bf054e932b6200bd15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cba77e24eec3ba99fb06303e1c7732df

    SHA1

    fe69c0595479db185aa89201b6fcfd8c2acc9685

    SHA256

    2baacf758093b00242619b22d2c199f2c17e20228ea7b561e063cf1e53402d74

    SHA512

    a4382f431ff29806f81f5a62996d305e9da93febd9f55ede91ea161a2f88ea34f0a3a7d9aaf2b434feae33253bcbbacecdf7bc74521c7bfdfb4cbba317ce7704

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f25ca4c9549fb8ac688386e30b64de08

    SHA1

    e98c77a49534d55f9b695867f0616ae805c181c4

    SHA256

    54c551e18b960367545a797c1d4d6c17c175a36c8f1c9285a49a37e87b78327a

    SHA512

    8e677f53af0f03980306b4b2c96cc46cdb00415ef48297bda52adb4b6318589118a37acf11f7e92164fbe4ecb841b4b05031d216ea38c4714b5498f885499561

  • C:\Users\Admin\AppData\Local\Temp\CabC9B6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCA28.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b