Analysis

  • max time kernel
    117s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 19:30

General

  • Target

    Payload/CapCut.app/ko.lproj/InfoPlist.xml

  • Size

    1KB

  • MD5

    796ab8598e4d384279eab2c7a8ada765

  • SHA1

    be1f7273f571ab282f851b5e33185d8c42442899

  • SHA256

    bc2f7a3743ee3f1af58f4ff8a7205bfc021d47c494f8b2f576de15f2d10d7410

  • SHA512

    48c7a34c35174857b07907b3c683b9fd0c2e586896198bbbc77dcba2f855489dbe7af5e3bbe006b82148650226068be39fb0326e775f265fe911f3bdb5a4aeb2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\CapCut.app\ko.lproj\InfoPlist.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cefd25d71d05c0be1e046dadea6153d5

          SHA1

          86d71f4a40d1fd60193b14510fc89286dd8c116d

          SHA256

          5d68263b8249b005dbebd8c42677644e1abe8c2df408a32078756442da3f825a

          SHA512

          14396760a04266f5f0f0410ac03813a423c55698bb1a0f821faabe84385e2a9dcadee0547e9173405cbca2ae1deffc4ce8734d24e6ace408b9c8e6e70562f499

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          307269ee5f10d9969ff5dcf60e113dd1

          SHA1

          e052cf386ec5299f52be0ba5d7e901dd91a91a4a

          SHA256

          d3bd9fad1bf78e0b14687b951fd833174feaf1a6d736179fc295d87224f32220

          SHA512

          b8379629d97c3c02ffa40f72b81d5567988713f8849bee4f475de7a0dc68342a25a7170a424e6857282e44dda0915257345ff4ad165976866ae7be3a31f13ab1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2e4dbc45ba400189c467ec98e7fa3b5b

          SHA1

          75571be4d0ee75d922be5ef7b7aec87721b5dce9

          SHA256

          fa4fd39edb674772f740880647e36af1050109bcf5f9a2ad481c45c95c1e14c4

          SHA512

          0f01e6f2f54c66cf5c2084b477352568318fede7a7ecddd11ff4d18e26849ca2f78de6c69567677a728787978aca8e23ffa4bb0e0059ef5845244493509726c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4cf784ad038359e6adb66c034b21b958

          SHA1

          16e8f64661d24198e523c5fbb8c6d0ace7cd26de

          SHA256

          0f7b1193fcd7118c124410007ab1c0bdee07a5222139958300ef39afa04b74fc

          SHA512

          71dac2e3a773466b241429eb907cd1ef6b6eca123f1699b9b0b654c41d029a4dcb0540da439ccec8837251a914e01f5a1ffa3fa4b667d56d4bd57066ce4176a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          539fd886bd4ee3dc85b849acc5ad9b51

          SHA1

          ae6d577ed51b2ac379a3e028f636a7d4fb3a1b9e

          SHA256

          acfa806e67e0af8ca1c22c3a9c64c13471329d55868a8fde2fb424157341ace0

          SHA512

          6c54dca7471307c90e2474154b159af27422f37d31d9de0b0caa697cd6e288fcbd510f8e909d6dc588f74d952fccb8dca543821df39fe5c994147d9635b94da8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3072d9ab4d4d678536b98ac380d85fcf

          SHA1

          2f99970fbc3ae97f52468c08c1a1e02dcdcfff2e

          SHA256

          5f0d7440c5d853819192a265cf6c7ab1c35d01e8c3b038f8f6cc2824c924cbf2

          SHA512

          3d0181a5025b22dee1f38a6677dd0397b7a923dd2cec78714fc8643f567c52647256c6fe8da9127b2ded5cc336c7da5b4ebc3c0be9666da53eedaf88e4856325

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          17a45f8c50a40a06ebc3299f5d300187

          SHA1

          060d52f875d0836ef52da9b3319c603fb81369a0

          SHA256

          e823e090d374253d0fe02b80111188428d3e5945f1f25c77daae9c873f91f0a3

          SHA512

          957a870555e53a65e983c4f339a168096f23de901357027ad6c1abe7039d29c1dc9c05a532db6580d3b0a32c0fb5be403d52880e7c958c155fcb2f1abcc0339f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          27632ade2a76bcdb55b49d297f37a51f

          SHA1

          41ffbe1b50ac20963e5850f7d5f4336960ab67d9

          SHA256

          2372e5735c251f60c69028631f76913e4ea1afaad57bb728c2d009f59982df27

          SHA512

          ee89ca04e813af0226dbfa3543c73dd236440df3de861a32a332724ab13b3727fef499468c84ec11d22d42f605bf9af924ad6f4175674c6d49c9d0e94901d326

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7629cebde4ede04cdeb206492137df3c

          SHA1

          b3d5ed964602c3be53684340aeb764fb01aeb3c3

          SHA256

          8c37fe70bbb18c72fce5f8e4afec3259f86970ebc9bf7ad6b907ad69227c2e67

          SHA512

          bce014e4e02a04a14c22c4c6bf024c18210e53a6c84355002d0ff353661bce0b7f6f6aada5845038c127e9cb2b01aa354daa87339ed069c95ad41db191655510

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          63cd483fd36a2074497caafd6b7ebede

          SHA1

          f65afca67db94af4ef1f15b696a1a3139352e92d

          SHA256

          d77fffbc1dcecb64d0b06d9a63564b5df2dead6ae40a85d97d942ca2e923e9fa

          SHA512

          1232de9928881395ee42edb9ae89ac2f7e73402bdc38d44a8bed5802bfeb70009706338900dd532890b4f9b12b477fc958ab6bc5667871e83fd4f84e540312e7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c85a5563488e12cd15add1a27a5bb71f

          SHA1

          0928b7f28872d2acaa1f1b446bf9fc688d727007

          SHA256

          7c5a0a95b4f64884faaa486ef4dca654b34673aa1c2ac47f030e25f7b3ab3773

          SHA512

          4b98fa52aee7965bcd0623b56ed2279a8375d6b1844391ffef61284b20cac7fa14a9dcae2eaff11c2785739f53ce18ad9fb9612a4fd12f4d6c6a3ecb50d0945b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4c61d6e2fe0945fb42d155d9ac002880

          SHA1

          358ac893b0b551b1d6005e7f584decc6a98a980d

          SHA256

          1ea316d8f1221b6d33433bcc424b4b6384190f616821ebcb322a59f390298525

          SHA512

          adebed56419587c28e5e87dbabc9030846a1924c4d4e60af8857fda9c16625befc4be68b53cb701492869725f2533a94e4b603413e7593ea6f1e801a89499b26

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          53a92d3e500b3ede695527f23e8c6f6e

          SHA1

          26330fecca6baa8b68a72b7010dcfffd6dc9ccdd

          SHA256

          b99ee7c12e8f98cdd292388c4d25297c35f297f2060de1743c1ccf9a8ad58d80

          SHA512

          7b338b5405e9020b82b3ebf6e861d72fe75d1e0ff5d4c45dec00f1d8639f280aa9d5221ac34dae052a45400ea21f659ade2acfa629b6e2e039419a2ebc45d105

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ea0d3d6103d8981e8be69551592c29ea

          SHA1

          bf19744d29360bc1eec08f8a8b21528eefca7b7a

          SHA256

          8bd5dda81c213003960c73d1b9f8b05228fe3bf56adf75ff4f7b69755c2b9a36

          SHA512

          924a87f77681ed4aeab7721f357aaa48e13c727516d0f45af2c9145c7168e0a7f3a39821c072060933113427263b3b369f2aad8ec32e8166e57d513c40f0f5db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f5ba99e3f3c2f8192f73bbdb48e9a4db

          SHA1

          9c45f7df3b0e8068cb0fa3bc47039059ab8c6ed1

          SHA256

          36fabadd93dbc2c17400ccbc148a73e707ced0a8274d7b46b044005276ec95ee

          SHA512

          20a37fb206ef6dab85a7a72a493bf12e2458c862e44786382826d692ed808d50faca16c1c87c6868de2aac6fc8e28079ef2929cae1c743e106647a243c01d09e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c8db93ae28454e0490436122e71e3ee3

          SHA1

          e854d5dc97a5cffa56b63424dbaacc300648e0a9

          SHA256

          607971ee8cdd5a1198efc4b317c0964bdd59c201d9a164f548364bdddcc08239

          SHA512

          230cb93a08221373e0c39025f29583ed9b0b57938a5ddebb4b5a1c991655b7d800e8a2fa98766bb55fa993fdbd57897329ba9dc2fb1dc186de9fb411b3ca6b5c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          706f7e1bb35873ee7dd0df162fb38515

          SHA1

          ae43e4674252456406c73e786aa30ad7c838e34f

          SHA256

          fa6874c5c67b61ef7e9eef5412d047b2f607d2e5a6a5106f98a9094e07efdd8d

          SHA512

          56cc60983b55dd4e892e355dd5843f3e850cbb7a3a9f1d7a870795f3b4b0f7c4306b3c08b9b131a2167f25ede0f047470e1d0ed858afa7ea3b6340789474a7d8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          80d5ab6be1bfe30be0cda4932bce42c9

          SHA1

          67ec845a874aebd4ab9e7ee54fc5d15e78af79a3

          SHA256

          962835162524607ee4cc9efdbb6508ddcc47c1b2e5ccc025eda370289c4034b5

          SHA512

          49534c45a9770891cacdc815856456de3559d800279a8fa63baa67c780495ab4fd649d4d242362d62353e6a9d6dca9010c4b4ce6d556be8481db451413c670ed

        • C:\Users\Admin\AppData\Local\Temp\Cab513.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar5D1.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b