Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 19:30

General

  • Target

    Payload/CapCut.app/ms.lproj/InfoPlist.xml

  • Size

    1KB

  • MD5

    152472fcdce95c08e811ffc80be48383

  • SHA1

    f99686ea8920317b0c5808740d5c13ed2a055a88

  • SHA256

    8354653e1c6e5ffd2927d612bdac1cb33e5bf7fce9fe1e545c574718e4c5785f

  • SHA512

    6a26458dd9321c14ed1365de4341c4a273ca8e0ee14a6a2dc421a534944a989951c82e55d4eb5881cb47f806fae5d803a0c80cc43682d94ab14ecae3a87d1697

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\CapCut.app\ms.lproj\InfoPlist.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    090e365b4735c802dd480020e7a95a50

    SHA1

    3109dbd42df7e424d77c40f77e5e4f559fa6c8e5

    SHA256

    4d1d431d9cb722af8f2c4ee75f77820e8d14bfaf6c5aa79dab9bbca62085cc75

    SHA512

    0f98b1527ad44fd9aebf289ad0babcf39667fe251f170f36ab0417823d66b7d58b4c529c02877e9657687fe1a25711c17d701b0e5da5c667e445488f9fc8df4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdbe1e647d673d78436fdda00ab7ff73

    SHA1

    b234019f8fb0099c5909a35a2097922f14300b85

    SHA256

    386633eb2117adf3c68dfa0b06ed98761087ca6dc4fbc66271d952c70e072177

    SHA512

    54048840bef24b31c8a5850ad656983cf1d7787d48c39d9bc22feb271e9f661482fbe55165c56bf4b742f7d1aaf04f68378918c5f90b1b65defe44d4aa924277

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d36a8ba627e27bd6989ea24bd6d1fdf

    SHA1

    8d2a893df1799dc762142eda4780b8f4e5e56f3c

    SHA256

    4fefc93f80e79a9c4180eddbf34fecb275294bc625fafc2a0d6b6e8fe4bae824

    SHA512

    74d919f123bf731fe6ec00e630af4e7f294b83a4db3d534f1cf53dc761d3c7618c548f84085282f1e845b9bc31c966ca664ee0930a2da346aef10e8e9294a8b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6eb61a8ee0a13e66bdad4016383137c

    SHA1

    b7bdf18513018255243c11a5c6d2b56b0b8bc264

    SHA256

    389c4ef272edf615a3aa4881c3352a1f45014ef3c0233af03f83248ab06b32ad

    SHA512

    31f850e0280dd1327d8afd74f14204ff3673abd79e1a183ceaa1ed0fb84e723d66533531b2a0dbeae76e3f35b71dcfd5110372ed4b8037f1caae3024ee78e412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b4768df344cebb4e3f0c4e89d00e284

    SHA1

    d30deab79bfeeddea155d79a8370280beb79f13f

    SHA256

    708342b885f12442ab898f52fd4e43784ab551d23fe6806c949c25c97896561b

    SHA512

    6fcf3725a6a7b3db41df773bc6949926f350b1f30fd7973a6845c33711fdd74701273de258cce3b570c0d0316606de0f2f350a7f06763dffa285a8aa4861586f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c449138414b991ffb7c27ae2d872101f

    SHA1

    57612e95e4544dd0ee11a10df47b5b7e66c0b0f9

    SHA256

    d77d115ab3553068e31bc11a2804155142f8858968647da26806571692217a5f

    SHA512

    4a9c3afd56a0f88873420fe83a9572a6f6475892dba18349ad4f2331878ca8a2088705436056e190c7e6e7fd6f9e52375cb5d27599772831776c85ac1538ae7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2afb2cab65e0d160826a660446deca8

    SHA1

    1ce843d1fe62e1377f94ca0860653979425044e4

    SHA256

    7cab0a74ca5110d63030207584332809519dd189b3bb9c0cc10d5605d726396d

    SHA512

    98f522985853b56f1ec16d345fe56fbea5941b9f9f27eb7e683599fb3130959962bde9baa8e01d0b4bc4d70c23c459f4f16c4b16fca2fbee23b2615dde70e637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    062ca60ed55ed800ef93e1db38e73aa5

    SHA1

    b5600f8ba128398392b3aa6aeb60642c6f6e8755

    SHA256

    450859b61f17247aab7929de0828f029c232913655b98a8134ceefa5ab858e6a

    SHA512

    2a21d3fc95b57ea76d21c4ad187738abc3ff269fe44c7bfbe8dbc60af2c2cd1ef5bf8bac67ad16be3e7036a54806775b2a62b0d6d94ef086f6a0cb924a569adb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa86bb53c59bfc114bd2e017c1364958

    SHA1

    45633415fa942558289feceb702f398f90ed359d

    SHA256

    35d8e2201b4f6d1bb40cd194780a32ccceb130ce483e3f3061418fd40020b230

    SHA512

    649aab9c11254501d4736da44da07f62c17b2449acedad1ec920f6098f31a7a708ea644086197dd55eefb3fcbc3da6f5ecfed493b23a8b6565811fee5ac43a51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1299f0dc6dcb076eb2a247dfc850dc96

    SHA1

    e20b141e6d4c6a793a19b52d5c838c6a2fd3ec9d

    SHA256

    294c942a40edbe0205459d959d2a886bcdb247c8ff7652a9822b1d364b5f042f

    SHA512

    c2e23fcc46c00c91bc73cbda3e7a1b03b6432f2b61e0c9d13e3ff49a9101627ff386c772e4be63e7ce9f66ede011520cfd046b28c1701dc79c4a31a07ad7d6a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c12c05893229010d28e80117528a0fa

    SHA1

    b88277ae242d56f40c601de82909332df163d3ca

    SHA256

    1647e8bd160ea66ed7908f9eee1298e7b54763e0a113d4be03a6d84edaf52dd0

    SHA512

    063a6fe229bc35a0bebcc17215580a3b83d8e23a723f5b58406df1efdc5517b52db08e0ce6307798ba947c3ca71c07cf3faface4eb15341bdf9ea8ea157967ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c39f1b655be2ce2f36fe32a651dfcc79

    SHA1

    b97314c1afcb50026c52e3c1158571b6acf38ba1

    SHA256

    b830e80077567196d0ec34e6404778d49d3406faa4a30615c72c568e09d57506

    SHA512

    68a3d23ede0cf12f8f70f80f142912863faa53cdd4e6c430148f9e627e794d555c82b544d76b8a7be3b76373f8e0efb82de8a26ef86d940e5e0e8b2714ac13f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09fa4ff1b374816e7578d03609d641a2

    SHA1

    1119cf256a7f3b806d4284139dfd111461fb0b61

    SHA256

    bdc048cb499b228b9d21117f69e0e381010fb835dd2f38703576689f0574837f

    SHA512

    f87d247e297dfd3e7a4e8b46163360c0a6596bca321548a093a010f9b0b6c6c35e54993d76fca22cb131d7c736859d6e11232dac56443d863a9826a758e5633c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eac8db25bf4d712a763a51b44860ce4

    SHA1

    b75b4a34599658f9d6cb16f8bf41f68166f2c378

    SHA256

    cd65287712739a7bf2429ce307fa1bfe864f04db2e826a77d8c079b87e6bf39c

    SHA512

    ba3e95f11ed046948ea9a8a54185df1fbd39493d8993ef3827d9db81816cb70e47e8566699e72930fab0d0436e0c87161b8c991dc6e43bfa758e7a05a1b9dcd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    634e572be16989f71accffdc701a71b6

    SHA1

    3374a3eec96fc750c42d25643dbb4df5c696a44d

    SHA256

    194f76ccc86f2359e93fe261094c10b526c90fa7932ef83a82fadaa255eb8824

    SHA512

    535450683ba30f6eef1eea2174aec5ee7522e6223656d2904cae83c95dda23d327b5601499c1055824b5bd65a3da33fab52f85497c41d2c41700aef713a07469

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e122e68c1b3302900c160f4f35e797fc

    SHA1

    cfe172232ad8793fc0fa834705ecdeadf7944f51

    SHA256

    00d6226645b079d3aae8babb545990c334793faaa3b64a815836d531c3d1861d

    SHA512

    6e572497bbfc88cd6f83ee3c7bf0524fdf0c92eabafd09f86af2c95aa08dbc9f38fb9398c709fa243de3f48582589a770bd82bbd002444bb0806d1088924580a

  • C:\Users\Admin\AppData\Local\Temp\CabB2BF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB33F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b