Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 14:42

General

  • Target

    Microsoft.Web.WebView2.WinForms.xml

  • Size

    40KB

  • MD5

    c09409aac254f17c1c648e6f0464b035

  • SHA1

    22acb08e12e6ccbc4005c393e78d78be4f64b28e

  • SHA256

    4b40e49aec5dbda597224f997d57a16645ddc2eb00f31a6329204d1853a2245a

  • SHA512

    53c46df0f24cafcd81ddedd195bae8dbedef7dd1387691a3ebf856b4dd239c3859fb58a1eaa9a31baa1fbb6e1986270ce567f3e70d110d1d88817f27c8a0dd5a

  • SSDEEP

    768:3OsdyK4aSPgPxW3uyCG4yCGdryCG/L+GZiyCGRL+P1xb9zU4QPgcRJFXCfPgKehG:3OsdyTaSPg5W3uyf4yfdryf/LzZiyfRI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Microsoft.Web.WebView2.WinForms.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bae73aeff2e07676b5b46b65bec7748

    SHA1

    5e733c25549e5350beaef14ea907c70d62c744d7

    SHA256

    60844eeaf2a247bd0f0a990247eac8ad1df90031ebcc8bdcfd2d339a80bf507f

    SHA512

    10668c4eaea6675bf40a6a8c57f9fbbc877153d3b31e241bb53b2a9d6c7f840478e9fb9cc11f1ef13c5e3df9a274db593ac754588f835ff33fcac06ea47c24f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd61aaa5508b68405cc8e7fecae040b8

    SHA1

    e22fd17bb46395ae04bc3c87950c17b90c1ff482

    SHA256

    e26899c1e2ba33df60c67ec313f122f34cb77680d2a73846372a02bf60dedd11

    SHA512

    6c7bfa797259d528a59629566b14afa2130f327b27c1a401158302a34f1c381b63ff930684360deb5e980b7dd2494159b7be1f343fc58eaf46346dfa80faca2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    150d192d2bbb22c00e719a364c788e7b

    SHA1

    b815eba11ff2a584ec239322a18806741b73061a

    SHA256

    d80a5a20e62f252bef0e2437616181c33cc7d2ee51011ec9ff7962c3087aff59

    SHA512

    7e52b4458c397c63e8c0dd38d218969b2c4e55a7f6a0fa592ceaba7ca4893aae775642340bc57d3c132ae0a301421050c55f785ed9023f971f9adfd4ce217b7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee0d7d89eec5ee3d0f23bef7ac5fdc58

    SHA1

    b85bd941619bfa52ee48955d3fcc0ce09b448fa2

    SHA256

    5db174ce7fd0e7c4364591a5e7a3fdfeb57ddf6ea6f13001fe8c33fa4108d5b9

    SHA512

    2f2d3431332ca5502275a37f690a645a76ecd59ffd1283c8d38afe0e88c749a32ed15f2963fc2b22db418dfc9d12016f845cf5b1e2112b198221b88419559a1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    376eae7a7ee79acdaa653e925d7c5d4d

    SHA1

    31310cf6b7935e44c5021645954de24cfd596711

    SHA256

    c2813823fe6aa7baff87336dc556a4bae775a6ef4fe97f74c60c5aa09fcf9149

    SHA512

    db973ba0f919961f56fc6f4b76ff694691e31e32ab02e39f7b55254c03be758267a4820faacf58d782131c2388cef83eb8cf50acb183505e7d550c326ce1951c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    147fcac0da2fe505953774abe8a23394

    SHA1

    c9a0b4ad5e89c9c375e314f241707f25eed35901

    SHA256

    8ba6ca745470e0c85261f43b6ac5dca7baab516a633b74a1fbca7c29c2af3563

    SHA512

    d7e0a3afba798adaa1b83bac57ad9aeb485ecd77a2a0e071294549ac8d7cc1ea64fec5cc4cdaff5d1113dd942cbfdf3f1dfe81d84568726c0dffa3bb8b926788

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39a61eb3a351f15fdff6386a47178e5f

    SHA1

    a5a4758fa0d1fe63f9dd770853ac67fa22e2996c

    SHA256

    5367d2b5021d3b89f05bef7bf86c541d53cc9083d57b60ff1fbe3d3f841ba9a5

    SHA512

    a997058917a54eb5e812c7405e0116d8c8894e0819a8829cc362fccea9fd33f9993a886965d9e0ef1b35d9ddc27d2eeece10528795d470d870b0f9586101d489

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4cfa7f192e4138fa9301d2d53974e152

    SHA1

    d445dce1bfdb56428ca4b332fed531f9f1b08316

    SHA256

    88383cb9777bc33137ddb1fcdbfc155db47a10309fed9f7f79527b260c899b86

    SHA512

    4b7199303b160f18ca9b906bcbdcc880a3367f261f8d578a0fbeaa118c2965abe3c6f4a3c79076892677a07ebeb24dbef5ca2089e9e9a82f82001e65bc9adeb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c5dce83cee62ceb0ac0e9cc1851743b

    SHA1

    1507f1c9758a56b407b81ac32cfc87ce2f4aad17

    SHA256

    087ad5adb7aae4ca430bce09be39ce6d936fb8ea7292211df0f158dac61705a9

    SHA512

    56546f3c0d2810e95b769507bbcf2871fc99c212eb9ce69cca259214fd8497845625d82a2c603ac6e9f83c29eaccca3a4b5a4e9c53bde95415accab9ecdc8cef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    735e891f508391782c561d406ba61158

    SHA1

    66de4cd09ee99813a466192f71e587f92a859dc8

    SHA256

    2242dc62b23cbefcee24f9e9582b66467286d99aa2993c5652a581d54bb3a0da

    SHA512

    e3d27260338bcc68b7f5ee7d0905faeb73ac7704d84484d446e3dbbd1bfc6d04543a07eef16c3a439d2fa4ec9e8249cb29a31a47db102560874cb0e61ca1ca73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bcaf48f1d21a536ae7667073e81295cf

    SHA1

    3bfd703db292c120695c1addd01a9160b20f6d1d

    SHA256

    c169c2546a59d9623ccbef2c9d467590b83c5a4c587aced611ac37c45edc4d28

    SHA512

    6cf5a02899b7c2433f979e285f85cb02c90403be3f31e0a5469d7311acf4023bf9e0e96dd4ee01a99766a145a36bb48b637c45a0e186e00025f05e1c38535822

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21fcb238c3a2971096b6fae001cb86be

    SHA1

    87e93ab5775ffbc6753545361397277f05d0f873

    SHA256

    b8fbe01ef57a7b5b8c0ef6904055d91cd4890fe952c3c4f707ea42b303696173

    SHA512

    12498f7ebcdc852dac51bdb8bd982ac14622b675f46c50ef0502db2dbb2c4e6fe3521f82a6602d16ce03b8f61ae90377de67d3e3b3bca9203badd264bc0ae26e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c0d76e8586bbdf7b352412940de7757

    SHA1

    d788fe009d7ec132ae531b8968666e7b234ad893

    SHA256

    b56e672990536fe17e18cf81eb8d500c07f067a27b89dec3c1d55713704d4738

    SHA512

    bcc9d9f5d7a44b0909e17dcfe3c82388c0f457b0fe379e878399a330f80d9e46fdc43f462ccc292c81da157f394f7bd29827a85545a5d9c4c5acea0db947d618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d2df3fc35f7717ed77b2d706903163d

    SHA1

    381d850a23c3320c39b0f44b9f33bf973c2c60f0

    SHA256

    5fd7fe6bc5da9e9497994b01a1939bdee52e7dd2404daa2c500929bd81080269

    SHA512

    2480b22d6d4e5bd6f71f9de1fe8d7cb09947f2f721384e63871129c557d698640fa4d4925eae47cbcf6666a21dc6cdae900e8adbac046a718c1a1c21a7672100

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc176589748373308aa2b1573917e420

    SHA1

    32b919f9dcbbab224d88cb1de50527ebe5b450c3

    SHA256

    26c9f9a18b3bdf1e46ae449a90eb22f9e2ad791a4e7921652defe92159480b70

    SHA512

    a1180f18d2fc3feb7e4d4ab447321c92334db7e5badccec65e4451928b9bb5a506533d98205286c8a7bb38f8170c08f5bd6eea7b41ccb675bfb5ea8420eb15b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    796f12a6825a2e1c686e9fde60601bc1

    SHA1

    64c0efff546b70e6e46156a4f94738d442425e16

    SHA256

    e5ddcc73061726d960d4af83b09644ed26a14bd059e886fa862fd0b4ad3a5ea4

    SHA512

    832475ba747ea174954d818c673bbee79b234406fdf6136a9721c6c27b1fc7397dc683b13e94a6e0dacfab998b53035171f5556d76957425a423d28fc24d7e1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e231761c6ac188b89005d6b1830467cb

    SHA1

    1122282703238e45bc0d27045906a832461c6916

    SHA256

    367153a1e41cc7ecd8590623cf2fabb41c3b2e54a298831c0c22446371d896e4

    SHA512

    3c26ff010e8d337b13098ad3260f45bc051a0ffb43b1f28d12a98022a649005b9736c86409e8489b2edeae817c8e9a1fcbe0c502a9ea97dbefc6bcb3df553ab6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea4294d3f7e41d82352b6d722a7d86b2

    SHA1

    3be1c35119fa621b7efc30bb2230fad82e6212af

    SHA256

    d8661604c22c87d187cf7cf898dfec48222d2a83392e830e27b9e7ffbfab3058

    SHA512

    98361a1659708835d3fc3400ff940213cf7ce4d1463aa230ad1f5a2644c2b149c3e63b437117cd0a91240ef163093c6d86d38c68d6c33f499ad9b04da5624b6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    954643d324998405927b4e856d1a77e4

    SHA1

    e5772dffa87a8d946dbc640a2503602d280b992b

    SHA256

    ef1513442ccd088058d4c5d4f51061f53962e5c04f8cdadc0dd2d449a2d97259

    SHA512

    4bc04794f5a47c9b8698c3cf077046ca720bae8bbfeb17e8c75a7aab777436fe52d1e9f2b6beed3fd1e1586f6b27a4795869c11c881c1340ea996b54bff4bc82

  • C:\Users\Admin\AppData\Local\Temp\Cab5CA3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5D14.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b