Analysis

  • max time kernel
    133s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:33

General

  • Target

    Release/Ookii.Dialogs.Wpf.xml

  • Size

    175KB

  • MD5

    d74d6de4cfd3f9d8793c83fa20031a8a

  • SHA1

    645092cbbec4fc9194a13074de516e9d47913927

  • SHA256

    7b518ab6d5f879f63b1d2f0dd5e0859f7b93fbbd77914713c9f4d43079ff906d

  • SHA512

    9d7aed29bdf0cd04424b82e44b8925d6cd5a36e52b6b82cdedda156ff211ee78550d87966036cfe3c1c3b40740a2547b3d009e56ae236b8dee02acc47596b38e

  • SSDEEP

    768:XXPUqdZgrZO7ZbkZKSZzY4gAPZooHDiDbDfDNSDcDLjDZgSZGw18WZdKBNGqBF1E:uZbDiDbDfDcDcD/DZgSiWnIF/H0Tx

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\Ookii.Dialogs.Wpf.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a948a5756e3f1ea2c2780af8739946b

    SHA1

    aecb213fa2abbc224e275fd96d72a7fcd65a0208

    SHA256

    3acc020ab591f2dae99cb718b74bc647123a462be3d4488c9fa22403dc2bcd0a

    SHA512

    59de9a57f27e1b5bd46c49f8e9966501d9290ed2c6edd35afa1f05849650edac1f54bcdfb1bc835cfa3ad4fa338b31d4a40095b0f6e18fa84726af5409e4d641

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2449b1737f0e60b5bc84f0db95bc7f70

    SHA1

    c8ae363c2ecc76736fb717bd8e0d947b2378acb3

    SHA256

    90657376302372a517041d2b1a853f03fec0fe542a5dd64fa20b70721bce8284

    SHA512

    2adc15a173999c4a1df4cf2c29e5c7db833f4608377e40443f8ae567708ff00cbe175b5c55ed3c8fd8665105bb83833be29bbec54d110f79228e24b7c19beb79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    008b8be0b430b480f1f77298aee2913f

    SHA1

    c69e88df7ca295f7879441a10e753af76b99f185

    SHA256

    1083bce0c4c396f58a107d734dacd09cdfbb292f6d2be547d5c2e58fcb8ca8ef

    SHA512

    a3d70c446bd93b1b289573a39c2ab1b254325def33577e918173e80a77c2fab4c76673bbc8434f0c9683ae9b566fca096f17673f6edbcc6a65c2db224fdcd8bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d21a50b582e390ff210b5a23057ef34

    SHA1

    f674c92ba9262982d22a989048452221a49cf542

    SHA256

    cd7acd0e54a98c9e18348ea5784f0429f0dc704ad428a85dab95a090becd12ad

    SHA512

    5f7f269746d7c46b29bc41f0b9552f78a4d4864a628db18bf864fb762f68657f4f09fa318400d4dcdb8ca27ed20a609ccf4803c8f0f53ab5780edd4f3ce3b466

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d91e608153b662fabef6d7155f467645

    SHA1

    acc1eaa109d80d1df8a73a83e076a49d189c31dc

    SHA256

    10f8f0b226db2da60b27b999d3d5a2ee5ed606c21b0865d111b6a05c99bd41eb

    SHA512

    0b348f429e724d383a8e52a6e8a55aaaed04ad130961c608ab22a3c260461a3ed7afcf9ad52cef24b4e7521848a695b1fb10ab218ee1046f6ad3d2f4f0506bff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e90163754453b0ba4f7cc5096582c44

    SHA1

    4f239cfb93cd17cf290153b034deada9230ac568

    SHA256

    dcdfeec59ee7865c9360a32ba0ba1a657884479c0a11d51489f876a60c3aef0b

    SHA512

    2bea7e22e11e00b75aff1381b1f5f5a2a3a983368bca467e2f3dec0aeacb20a233ebeebde5bf52aa1a4f55ea89446f19d011addf93e234ea5b1d9f6cae8fa0e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    066f0a3b22c911ad276c26c22a284483

    SHA1

    fedc8c8e99e0311f58df038c73eba80c92e282e2

    SHA256

    db7cefdf07a18aabd5876b55ec9c5e289b45181d79e80badd12d68a8d30f8935

    SHA512

    03040b436d0e06a9f7f4e5aa642ba40d7fecef50a735afb4cf950808ebcccdc621a84ded1bbcc6ad228d9dc0fbf25ad0f85d281de600ea5ed5bfb76f3a695b66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    748091b43fab94a1838952794b8f09da

    SHA1

    31c2d17e0291ca2589bb0841a4a2b633d5bf0364

    SHA256

    d9f9a1ea654b76736ab27143cf639f715f393efadba3453263fc4d4fb3b153ce

    SHA512

    6f5228b0240902a06e42ea00a1869a94964116914b5609aebf162750e15b9beab32118dc68ace31d0cfaa06509612e038bcc53f910c20d348361744ecc52ddd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    410037028c171b677fa544b35ec0bc41

    SHA1

    6575b80ce81bf812d94c66e180e09ee9748c395a

    SHA256

    60cada19bee66e376e798b32fb46391878cc7f49783bc2900810e61dc66e4e17

    SHA512

    850cee9b1717e52410133ce4667d8450ddb6f7b782702c8e700d0f700ce24d795cdcca0269750069574f4b5c8ce7fcebdc385a55a0b0b6aa7bea873cd4bcbfb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b12afdd8005eedc5253f622b5921404e

    SHA1

    308313aba9ef34a6957266b8933026ec6b9f7efa

    SHA256

    864b96cc80d51ad2775f65a3e84bc2535c097ccca5123feade6b3b9170657ed2

    SHA512

    59320c99a147e97ccafcea98e964390faae6eed434fa81b79d7cc42ba84960b8a64593c74cf687f1b665fa48113356a36660ee5d0ae7186b2a4690fdad7b27d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d06af3f3c33ebcfdaa1e31f019f0826b

    SHA1

    c8ef01fd25ad4d68d667d47bf897ed91927e69e7

    SHA256

    b2d19b1c70c13ee351a46f51b1fd948370454ebd912f3350aadd539255ab1992

    SHA512

    64e06efda09e588214038ad9eb4ceb0caf50899969291241149ee5a9e10f39b3faf0757dd7fbdee793469a39796106fdbf41de0d2dad183dfe4cb612aa560e1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45a2b302877219e1c75e6f9a1140ef16

    SHA1

    7af0a731c2c1d48e6c38ec0479fc1a09e2961743

    SHA256

    2e00edc455b28dc903ce9fb7a79fef0e592217fcb4d26a11669958e641de1dc0

    SHA512

    6ad68e17ea172be04288c42f489ac6d12b258774a160dcd28f1ff2f498924ec6ac9abd18cb322139e84429bbd5df4f89b3d370d775695ee858c25fcf0821494a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8d2ecb14d93c6d1888149128d0f31e2

    SHA1

    77c2231e7dfe0b1f26dd04e7b310e2850073691d

    SHA256

    7c6282d50a00ea08b3fa30d09343b354059f02828d480696643dcf2668869f07

    SHA512

    afbf675e7ceb6ed4868efc059fec11d81adea7e3b926a313a5e04dd08e345c8567c56e1757f4649ec94e86839f63c8ce1855983eff3f77ce2f6f05bebde9c044

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd82cecacb8208fb8a8d25609d9fc1a8

    SHA1

    1d74b9f851bea089f84693692c810a68b024bdc1

    SHA256

    d0b29d6011b5d87976bdfd69e313a71ec553828dbd545ff3a384089208e76b4a

    SHA512

    a9d211f6c5024cb540070f3aa3f4c75058183a9b94ed83ab6ac4d6b287362124e6854ea94b21c63f8efc5936f380e3a5fa729782ea387d27bf5957a95a6d70b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6ce430eb52e7052e469a90b33131e5f

    SHA1

    9d975b890b32d2a3375e56e359466284f0641ec0

    SHA256

    add076d6fdf32bd33adcc96b143a30ab18ef43044eef3341460e1cd57e419f52

    SHA512

    80769724bde23180607dd1b28def6310e1b79288f5a4cd3962ee1734ef194842689de218a2a6b8f4229b06d8e64b333a45bd851433e160a3599fc4f0e3f08c4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f17ef9f3453fb0e8769ef7746d4e7b5c

    SHA1

    2da7babea6a99ab365146b291a98ddff56a68c21

    SHA256

    3f2336d9f38b9fa1b3e8924a7c3979c0ba5e8350b999ef168d84bf32137d1a0b

    SHA512

    e8defe919fa190084a66957321a40caab63fcd01f8b90cdb7040a3ee269dfe4ac853ec7d97dd716be7fb4a1f2610af73223824482705c2860cbc6a87a1f45b65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    191ea15ee310ccc22441ad3f0c4f8d7b

    SHA1

    4c0ee9e87cafb52b4176906d246136f25cd3edc4

    SHA256

    b1b47328dbfab077f68d019bf190bcdad1dd31478d9627f941a62c7f47665061

    SHA512

    3f22a2477a4ded86c856276b7621043a68eed5c15663ea4a0bfa50eba009549a031d91f9f72edde75a9a0b79c66ea6002b3c23860e3ede0cc810ac4f646131bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    756a43bc1eb682a4e0a6e8f5ab334f56

    SHA1

    d40780f3b0e91ad0356f21abde2c554d15714281

    SHA256

    6cea9bb2fe0b4b1656d8a08328ffeb3903688264c3bd8749c0d728717b7722b0

    SHA512

    fdb8876b1dd826b2ce9cf6cd07c677082c3b61ed67689ca6652fa5260989682974eead8613e2e61e85b824732ad14d723b71ab1faaf2d4b71fd57060905f1286

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be53a46f567446f7d328e4b723cf0850

    SHA1

    7c0a514b68431a09b4b42d2f67acfa28d17a88b5

    SHA256

    ccdaf8ebb9a5d91b46b7c7b5bc8855041e8002efbf4a825bae352b21fadd82fe

    SHA512

    f0df10632734cecd870281fd09c2bfb2be57ec1eb51001050a2b7f576a7b53e6d183336a2754681645e00700605306483c50f1eb000bba94109b3f7abccca8b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a880154ad66499f560cfae0f8ddecf3a

    SHA1

    2afd181c671e3426371b1ee9faaf3d5c8013a34b

    SHA256

    9c06cf90d544f7dc32fcb808c043199a8da3f700ff48adb53176d59f10aec083

    SHA512

    b351f001b14256ed9108e9c95ce9abd6fa5651e9c28fd182b46b4b1cec65b05af304761bb35b1acfd36fc2ba0954fb72a2adf644fa9df02d2f0fb692c918a997

  • C:\Users\Admin\AppData\Local\Temp\Cab27A0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2810.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b