Analysis

  • max time kernel
    1562s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 11:57

General

  • Target

    ManagerOfficeTool-main/Files/ODT_ConfigXML/OfficeConfig2013.xml

  • Size

    628B

  • MD5

    1dd35ae53b86eb9928af102f1b8dfb4a

  • SHA1

    0702a5893e7475deaeea1df429f67ce4aea7f9c6

  • SHA256

    4f44b88f3e8b5e98051165a7ff415528f7c88d051c9d192405f013ca05c29cae

  • SHA512

    a8a46a4e72abc21c1fbad5a568cb2533efd479c5780fea654c84f7b9560205ff3b58c933f88d1ad8817928886c212df3681d3da73028e2844ad054ffcd2111c7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\Files\ODT_ConfigXML\OfficeConfig2013.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76e63fe0658f0299f5cde9f0bcae8690

    SHA1

    a0fde03ff1a00d70305234f2dff74832a7dc810e

    SHA256

    dfdf0394308f9afc2df8e3effeed832090fa1d21ad87fbd938216668657cdc67

    SHA512

    23171907b7802ae529717f11ddf4f3bc7783b8f9b17e31c22812142e245fb98bbdc083046aead1d94602035107b9f7ae381c5a9ebd7653229673ce749c75cbe7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    356cfd535d6693a5e16deece8fd31ef5

    SHA1

    345deb377e9a5b456d42b3c4e12b00642cda6be7

    SHA256

    d0ce533f2713eee585172eb11c1853edb6acb11025b0eb32e723d0e3d20969f0

    SHA512

    4a38842b77c6916d0abe47fe5814b71b25d6a7a211ecf2446bd8f83f82127d0dd82b4ad7af2122412d20ab576c69a373ec7597eaab9e3e97acb968696ec0d033

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a182836e9bc1ea9e6c302bef3e15d8f8

    SHA1

    e0ec4f39dabe8a66e281153f4cdec072ac3ab72e

    SHA256

    85af6e261449e2a954fd8d99bbdc19b3f7883ae2daa00f437140c4cce4b8c52e

    SHA512

    f57b7211c01b52b67564af2e647e5b6b6ff73757b3e324da7801d3969994cb404b047decb766ed205e7eb629b76cc0d2e8fda297d334551fa480ab3507907071

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0952d9b421282304808e55ea90667836

    SHA1

    1c41e4baa1780c6eb34c834b93101befaca877b4

    SHA256

    a3cfa2896e07ecf7a25bb611052170f2fe31ecfd2ac500cfde9d6d4232fc635d

    SHA512

    c793591ae2cf659fcb60ce6b0c648c9ccb80dc0a1e67492ca8aedd5f2f91a5ab351e8f8fba666daec5c74e0e863c30035111acaab2789669b09089911ebeff4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd464e9098077755602e543a083a263b

    SHA1

    ecb894a30c3586b8dfacff2eb490a5e1f12a9596

    SHA256

    59c014467b26c248d49875442fad3262c2cd3ca6a13b15c6824984353053bcbb

    SHA512

    92cd320bc29826b074e8f75d0914c19703f05104a8c7d65917b277dec4bda53d3bfe019582070a40d760be45db83b4546f73f2c1d413c191d7d1ecaceae93081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dba184ee230ebe85dbaa1b24ea294fd7

    SHA1

    dad22af4c325ac1564336adf54b38d123b9398da

    SHA256

    fe4fee04c6365350c07ed21a604de8c827e441be0e840413f141a8c596f1dfa8

    SHA512

    323b23992046545cd7b737fae42ed8b66244830605049ed70f2d1ceb9a5c0e1d65c3b065f71d8e5993f91c86fe00b803d9ae7917ffe1cbf57a6c6f1b6294431b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d1428105112708a2f23e9f7b2485ce3

    SHA1

    52e359867f562827b9d69c7c3793014f400b0765

    SHA256

    75dd1c5d876ac434b318749d3b5b3f0b2ce610819a53c167227cea2aed0ceed5

    SHA512

    6cc25693b116077b9ec8044a27f15ba03145287f5222be8bdec5478ca5d23542dabc39bad8b2d325ccbe735eefb511866bb5a49b360b1fdc43e6859b67dbbdf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faddcc97b29682f9f8005d0cbe5788a8

    SHA1

    6e291211eac615d0580b18e582dc013956b500cf

    SHA256

    b4bcc0f60fad9baa614b15305a3db0acd00049b20e6aabb085bd0f7e759738c2

    SHA512

    3f0ff6942859033e9d22f630bc54999322de2fcc2d2d32b223180dd8286c860ddf8d0b3536846e8fa47121d7a0c4e243026e4f88b42839871867760f87465e7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7906c3337945cbd864795a1593169402

    SHA1

    b89bd0fb5da229c0f857821ad5f012d438dd7a3e

    SHA256

    4f358e7e89f252c0c192f196e4b1fd31a671b1d63eb4eaa07da600c67fd09db9

    SHA512

    154b41d0f9b491174eb58508f9c3a87ecbbd1c1cc69d0fe11f303b9e4f2318288afe0adeaa8b5e277fef337daff3a2dbf386bc36fecdd6f87ef88a97220972b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58e64ed015bb3776bacfe3bcaaac8cb1

    SHA1

    e89de8c9029a1e34a30737bf70794df8150ce6d2

    SHA256

    72a8661a3662c6eda876ef042ffa5557f07fc427ce5aec17be7c5141901e6864

    SHA512

    75c32d91a9462b0e9028833e3a8c9fa77da6dfd46dbf66dc525256e8664f42c611c648088eeaf94c7a5640ff076b1d9ebc59137f2907b84ea7290a813e94cffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05521cc2f36b43fac7d0ffa120c4056e

    SHA1

    de2df35ef0cbdbe8f16bc67b4d1fa673a7719e4a

    SHA256

    f3b415c4515cc006e97ebddd377ff929c2fb1ed14bf4f1792fea4ebd65994739

    SHA512

    76e93e7a1573c23ce7e469e0be6e0796c6ae1e1622550fbd57a73ce8acc5b3cd9ac93bfd7940228adc79f57a4aac667bc23accbff5a15eb1c4b66729e0de77af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ae61263bed00e4c566bdfd9e2de32d3

    SHA1

    034746c0d5265a48448e7c4c303e90f34a020df4

    SHA256

    5ada013614841ec8eaa5775aeb824dd1eb5cef6709c0bf123d90ecd9c8bb1bac

    SHA512

    c9ab6484c071296942a6e481d4dee03dfd6b45a8c7b0524501ee1878b148b7869bb961ef1ef99aac9e44d6152e4ea38e6c091d6c2f45197ff58d9c8d52c9a865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fbe928e7595050d249ba6678f3636d4

    SHA1

    8bb70a2332721d1a1cda2d9ae61e6179e65bc2ef

    SHA256

    9e538ac73b62c486d9288d9f4afa6bebc34c2bc2030da19ea81a857742aef08f

    SHA512

    95ad0ae3d6503f78b4205922ead084ba2d90d827ef5d20f492bf1767af50823cbd0d6bcdc534163569e9a6dafe2672dcaa1e675a1abb47154b9669f5f646771b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c73bf8f13896ad3da110c82da9dabac5

    SHA1

    9a40827a4f64ea8c6256d206e2146208a65aef64

    SHA256

    359fd581ea4537b002d9a3cfbfb3e7d4f29099a21a29767760e4a11cb9162916

    SHA512

    6a8ce27e4a808bbdcff4488777ad5e4cb27fdbc2204983818f8d30c780911f9bd9549d939ebf84bdaf09aa788bfeb538aa7b7cf7a2c956272faedabc51dc9a83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    127aaeb4a7a2fbbba0f29204c94dbe16

    SHA1

    a8eeaf5d8167551556a94f161879969b8d7db01d

    SHA256

    e018a0eb29b69cf25687a3c96f419fd93809fe3ff28ab6d7436f16d649448b38

    SHA512

    ddf6e7891bd7937880d99fcb1e5becbecd129f65042ef68305751b19205aa8f06d365d3e2c141d83d0ad0b47fb178dd24ca7311f8fa791537f981ed28e3913ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37c1aa8a857269ef90456baa98467433

    SHA1

    0aed303e504e5123782646307e2845c4a80992c5

    SHA256

    8ef2b01157888d1ea5ad013c9ec00644d9ef4c9e4487e5412e8187542cdf9a9f

    SHA512

    d64a7a20321a24e3fe4374a4838a34eb4455ca69a5105ee5dba2955c5a1535ffc4df7d98083f7176c724297e0fe4e9c1147b8369db766966f41270113f6176bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f16f70fd4ccf0e4d7638f612f5ef74a8

    SHA1

    893f9b6468f3d1d031dd1a4aa64441dd7663a2a3

    SHA256

    b5b3e0aebaefc5cfa06cbd84af6ada7165192718bde092c452d95f01f15f1a41

    SHA512

    39b1b80213c7bf24c334aa1b1ce8232fa37fe1e9eb4b67502681d26ee0756aeb24137f489c5b5718b814ecac0fae38b4a1558b9d7d0b1b31839f874d96a06b4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f62fc76584805c0dd49bfd1110ea67ed

    SHA1

    6d1ba1202c5c7a83e76102ee6d6bc6ef84f46d76

    SHA256

    6a32c14dc4fa94ee8bd117f99a13805e8f83127953858e56c2005b8c2ca2e886

    SHA512

    05599f251a26f909e2501dca35065dc4dae245c9b3b152afbec87020ec4ca52de6401b30ee404865bbca305dc99f55ba259b7d92b067b91b8f1ef9ac4e685011

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b5fd343c050a075695dc3de981410f6

    SHA1

    5e1c3e4ebde8808dd7afb57ab2a643b5a3621459

    SHA256

    3ac4db2e096350e41dc43afed2c3a673d017794d7e9a2ff829864e27e04dac83

    SHA512

    5e5153182321c0f61c0691bafc24026466b64efca35e05b129a766899b4f32b8d7b2f270a43a1444706d75c4301556b77561138f4b8fcfb3f1d6ebfc86b67bb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62095c7c86892ac6e04dbd2d1ce1e08c

    SHA1

    ba87a3456e4961ee0c82a5911947118db3190c1b

    SHA256

    d19b3d411b5c84f3b5c57c1e9c2a940f6f82547d2483f54d9695554ba208d757

    SHA512

    01bfab2a5f86affe145928062ba73a471b50e9aaf6cfe2a68fe3d7217690ce35f05786f12e333b73287a427eabb2944aeda94025874a45b55c1f10b0733d8a44

  • C:\Users\Admin\AppData\Local\Temp\Cab74F4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7565.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b