Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 14:42

General

  • Target

    Microsoft.Web.WebView2.Wpf.xml

  • Size

    139KB

  • MD5

    97ea2301be18aefade073d39302154d0

  • SHA1

    30f83ae731adcc4e79598c2c21644cf02b909928

  • SHA256

    e088d2b21902cb8479f782f327925f9e3281b7ee8406966735dd932e5a58e3a9

  • SHA512

    92a6ce81f5b3f4c7779bb9589d7b6548bbfde0e2ad59d1f31d190c9c75ef95e1dc31a9c763eb11fa62803d997b6af79f4f6e56dd31e3bdff8d0ba4f84c570e5e

  • SSDEEP

    3072:xOsSyTa4PgfmLC4uyD/D4yDC4dryDJtLryDnLfryDYO/LPm8RLP9R3Ly1vb9QUX7:xOsSyTa4PgfmLC4uyD/D4yDC4dryDJtY

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Microsoft.Web.WebView2.Wpf.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4c10404c2651408e001f54a267afd2d

    SHA1

    efe81e85658addcf15509fdcead6168f678b0782

    SHA256

    dac4a7e51327e6e4d4716690724286cc92325f8cfba84175f7ab832511babfca

    SHA512

    fa1631585cf0c5c799155edd21610ad2d5bfa1ebd9fab5c5d77ea79a2230ae1c48bc49ad23dd2c503c7b128776294a59b48dbd84b6f22722b8edb79b988a3524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c02dd8d423b9af64a3a309a3d45b916f

    SHA1

    1ff4af8f143fb6dd1e72320adf51e9bcec23341c

    SHA256

    f487e2e810fed1ac838ad47467da428f2537acea55691944d9b6e3377e18bee9

    SHA512

    7790fc1a1fdef8c6d77211f21919bab272a1b2565b7dbee4bcfe46616634b429356d2332a0436f1ad979b1fb36c29c6f2502d7e2416f3e37e5407d31c33884ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ef1cb9ad4b1f99c91d59150651ef655

    SHA1

    c97716f9ca22cdaac78bb1285fde4e8a8eeeb353

    SHA256

    1202084ffdb1265199df58419968f6b1fbc893c2c9be835f1f66846d7a2c4764

    SHA512

    2bf2de305280e2d0a23477790711867afd865dcd09893cde7f31fdb802ac629c4c7b67560f96204a9fb89808b64e776e873806c37f1ff42d0e69b1be1df54bed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc2f082be3eb861d3bffc430f51a9742

    SHA1

    f0a6d619d9499f7590d8ad153fe9e73aa1a1a13c

    SHA256

    f605916c9da09ea0da38a046638739f8e7f81a2d197345fd315ba62de4103c12

    SHA512

    64b210f1a80de1d8d4227fe9393fb9341ee3cc3cf5fab80e3c3c49086407b6480bb40caf021c0d5fa363c56b54ac85f8267657013db0c1e185ec12838de7bcce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1af5e8a3c35715d49ce3942c7e5095e

    SHA1

    5090e362cdd3fe2768216131160862ba50c72f4d

    SHA256

    54e1ed8d4fcd5ed7aa0ccb360c2bca8b249cba57999fea300808c08c2c363b2d

    SHA512

    e5811b3f4b6acdb87fa34362d1309d7b748a2fe8c9b665d4fea6361e6d7a0a6b9dfd42c07e7e332ef87905a44f11a0cb399beea79812f3508bba7671ba2f70ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6898f3b21618751aeef60fa96490c769

    SHA1

    8eaf4f494ea26c63e2466baf356625ddd99ede3c

    SHA256

    96cfa4ef251f81008f4cddbeee5165248c4bacd623ff52998ee7c21d14061377

    SHA512

    3a9452201e0cd217b1b69e8687f2d609ea5a88278cda3e8879d90f081bff52726204fc1405a6168df3edd5d6d9e96451fc4ca462500e956a94adf7774e72609e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aabd5b983948892909eac366cca948e7

    SHA1

    5df52cd0cc655eba7a493e36e30495a62b9b1da9

    SHA256

    e518bab0fa07343b8d9b4f13684e9ab395d3c1c100b5d7a76ac8a23741d6d879

    SHA512

    bafc5c3ab31a218f3cb6b9a8546350e8a34860a3e87549c0df7a8fca69cc2073c1d8c3c2ee70dc86223a9fd3d84f6c741b43af7ecddc83eae62f854a9f98dec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f945a4ab0338c34301f2df83b62d8050

    SHA1

    61f114bc7d3fb76e0a445763edc8980dff8a5ae9

    SHA256

    e55e4ff4f4899c91c64606db4a1d2bd050da4f57118439940cd957309f476381

    SHA512

    74b1179978ecabb85a2fea37a233a6ae5c0af2a6c0dc13f9d35cf59df9004a0550aa5c578c1bc30f3345c4ee0d1b90fcd75e5737372931d8269e5a7b3b1e9846

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ec2f616cdc92772d83c25d9ed570863

    SHA1

    9c57460356ea9e1bfbc11ec39c7eba0ccb841ac3

    SHA256

    2492b976f7b332bbc8f0f9e6011a45939cf56ae6284ff74550d8e0dcafccd75a

    SHA512

    aa54c54f9cd5f8578c25b9b940a82184436bf846aaa803d842c5b2c86f09d61f45e3e74dc015980ef9ef833132bf331d8308bea9e1fed596143cf923eedc5fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b53c53d3936ed8dbf71ce8b5b77a6369

    SHA1

    d049653fe6f8273aa0cfc445965e32314dc48796

    SHA256

    643c97845ec4cafb750c9f2b30b4981207ddb026d8c5af24f71e72bb7fc141ef

    SHA512

    92b035eb86b45158bd8fc01add5f1f75c032f386bfab99eadcaf653fec7d8f6598a64a304237de46fb90f5a4c3c78ee9e24b75915e3e1a1abbbb933f6e24f0b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c160a7bf34c5f7c161a8d4d354208e64

    SHA1

    e937c45944c50e9ee9aa8e8c42615097660089b0

    SHA256

    790fdbe648e4be33aa4d55d71e807489b5e061ba3837f8375702513224eab701

    SHA512

    8a4e33fe9a72741f6c0cdaf739bf7730a69fee808677990511a15b53f03c7f3b289b3f216fcfcbe451e9d5a62c62c66467498f265f403a20d455e3bbdbd44a75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7b998fdb5a4745e72ec4a4fc5215789

    SHA1

    498906a20a4d8ef4bb8e4aa3a829a53a11f9733b

    SHA256

    3556bfcd38f4b8d73a25fbc570fa98ad02e4a245b5b0a17f273bb603933a7a6d

    SHA512

    f6f37f10c3a1bb90e833a03fb2bbb6f2a98fb7434f349d7912d58be52404f8aa1beb25dfe174f499bab90b9d483c1d5c459f58d30dd3c29462eb721757a4b86d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4c4867742d88d01f03e454c6cca2cde

    SHA1

    7083e367f031ef57281b6c9a0e0a1d7c1c569dad

    SHA256

    ffe55ff4c7de945d7c8f4f02ba4c99c0d9b90a519aa8168ca70ef657d53aa8e1

    SHA512

    06bf694cac84ae2a162925a32d6499e085912d4d7a8219d40f43bd68588d64ce4ad5c09b33247da3944ed300c2f09de90e494d6e7ae98e0b8534e8dc974fc807

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7580015fc538caeb0452a5b24f6d81e9

    SHA1

    0465151546e9bc256d0aabe2422dcb3c1af38fbb

    SHA256

    206c526173169d75ccda0c1e80e16062965ac8d6610f654714b18867ac96dee0

    SHA512

    65917de756643971341319b0c89d237c9a526a76fd89f35cd5a1c313cbcc0ae4b3103b90abc696628b7bb3e7e5b7c43b269f0865f5cf94b0ac1dff4b1f133284

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29d50836a58551d986100d23287203d9

    SHA1

    de3d864d909d7f51a5463272a5abc09737d8cd31

    SHA256

    8c28708fed4b0d0bd1378c36454279e5a5daee15922276a11ec1c6a43a26671e

    SHA512

    2259787d17b8edc7e803cc8334ba80aa1ac5f3ff67f2ed993b17c433e3c93ddbc46b714534a37e94e95bbcae5d3f2e27cc6bab500c61390afa348f615ac239a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e1bf86f986d4c92b1b34f1c01ee14df

    SHA1

    7d9a8c72641c195754cacba9306af819dead656e

    SHA256

    96777c9fae6aa6f3d653a27e809928239256c01c931748c1c573f135fc6f6e26

    SHA512

    71fd6f1039140f32600d7478316d1c28b091e91235ee761d83561adc615db1e4d77961e5ea294aa192de30f5738a9d98d1574805522d999f96ac66666d6c2517

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79cd18166d4c28b08bbe12de37c1c6a1

    SHA1

    39ef1d12364c83ff9c9eb0f92101e3e4c5d2e4e5

    SHA256

    bf0afe05939cc480a81ecb0e77bbf96c2b3bd9f937aee465caf00ca79748ab19

    SHA512

    ec684acd086496e2f822c49bcbd8c499fe7a336effdcfe946b5054caacdcf51d6e0ec4b9a78acd6684a03de6a194ec1ee9b87d823353fe86ebf4bbcc2b717a69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff92247c6a78d45db04451e1f87c04ed

    SHA1

    4f2a9a43ff8ed1c25a8fe08f75e41110d30bf187

    SHA256

    ff4b53b1b7179fa5254556b51955e507406aef0b38ac2ca6f67c9c4c571f83f6

    SHA512

    b31cc12f60615fb5b6fcc7f6b93c299389b8b33d52ceea4c566459af08fe3b4f3d532f56e09f119783272cf403dbefd6024b2fccb0f262f73d3ccd6af6c93ed2

  • C:\Users\Admin\AppData\Local\Temp\Cab1F37.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1FA7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b