Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 10:15

General

  • Target

    lossless scaling/language/diagerr.xml

  • Size

    1KB

  • MD5

    25b86b2ab956de39ec02eb0697599100

  • SHA1

    58e6b45cab0e49adb2d62ecd86acb9ab1e7a76ca

  • SHA256

    507dbd9e93d64dc201894839a2e61a3cc5584696d2c35531a8f5a689af4c582c

  • SHA512

    317b1ec23b04d1dc05869934d94fb4f6d20b1be432a2c9b082610f24bbe4e1f33d615be84cbde7443fb5b393beb8f4f08ecd066b80af5317c8a9b085e3cee4bb

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\lossless scaling\language\diagerr.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f05f55c99dc7adfd1bc01cfddf35f305

    SHA1

    1e97891ed59bcf7b96798fd92c26184471ef8aca

    SHA256

    05ee34d77e7554909917530044d6cfdcf2f4cb36120b0c9f5871572898bb29e2

    SHA512

    31abfa96f4a5bc8bf514f5c1dbe4636e79fee828214774ed161c829979dac683a2d2c61341b5e9501180206adb91a2f63d0353566f1429693f7c2e54135e06d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e4c5a69db55b680f38bb136b3c7d711

    SHA1

    2e16510044185fa27120d3ad3b7dc1056e2c28b2

    SHA256

    bf10c9144fdf3afbab759c90a9f87165dd845eafb8534d8304e744605522a064

    SHA512

    15350a3a3f4869730aa868d67f8af2a7d38ef283769f4d5eed26cc701b8a583f434ddfc966c94c2833538d20f8b4299664a322141d99c9b05af2dc7fbb8223a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b542d215aefcbc0cd15acd40ebad9cc

    SHA1

    68df934964c834ddd9f58e1c26d1b6f24d0bc3aa

    SHA256

    30d212388c21a4a1f1c8ea696de1c84ca07aaf6bb0c146dbcc796e1dfae8d20b

    SHA512

    1922cad8a109e13c0ad9661f41d3db7eb55a6e35bcd7b8923832c7ee8e4b39cd0099b2a19ec47e5d5aeed756d556d077c60356e2ed271babf61d06aafda3118d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9beb36a21368897a04dbcdb388ab6ae

    SHA1

    31120b92ca2b664beaa386f87315f90191d69221

    SHA256

    14df972c6b699cce2557fe1da8dc3c8d509f74fb23a47570e1fa6668a6e3d785

    SHA512

    1920d5de3c3c9e91a1a8ccf4f3f1d2f773e0b9b05faddbe8485ceb7c62ab63cf14eca4ca26d58fb4bcf7a11f64b235001c33ab384a37c9c6698cf65845de558e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a4f5ded3c22a7d8cd24ea70c943f6e6

    SHA1

    8d56e4fb1ce8a49ef4df45aaf3439e7e929f48ca

    SHA256

    e41a7d3401bbd176c41805e95900057df91351a8675ff73ce81bcd1bcfe9354b

    SHA512

    45d875020ec386ab2e65df9a8c10cf35b79f195ac3252f89bd2271378280eb2de661de6f7462221b63bf8d7752f330a05d34c1ebe9341e96f5219e69e6e93452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ac436f29ce77ad05007d2c99927352f

    SHA1

    dc9b5ad6f7a5305222fbe4dab0260bb5ed0ef8a7

    SHA256

    1c085a5d1a487826561b14a6b056cccad42ef4a76e465e349f035e1fa3c5dbf3

    SHA512

    8735688fcdb1238c779b87331d58b47a0af1080ea4ad040c7dc5acf6baefa3072f7d6d94f9d051e2331526338a3f3a5141dc25bc4850dcb421392b4ed29effa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2e9ee83a052f5b8fd36db33dc8c2a66

    SHA1

    5b275b14a02e9b2802a524662f5761ce7034f9b5

    SHA256

    c4a7a1fa3a39063592f79869cfb914b1d03079f82b6e20daff3fa4630cbad6a4

    SHA512

    c301b74641ae07a8923465e7dc68001614761f95980c3e55ce1a5b1d6a2c7f301df8c9a5b265ba98eb2d99493365b535548d687e963d8a18778f1e28739c1cd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f61bfb2c2b05ab4b731dcf9a0940d266

    SHA1

    a6a82b455de782543e651cd18c29f855647ff8f2

    SHA256

    470f8af5c7104400949a4f756f7279a79551c836d8b7fa27d6bdd7b5c2562f86

    SHA512

    907431d4e926562550eab57b33c042b962bff29d4318b658d38d29ef2d7ae64999bd6ff535c4a605b1ea21f3d22a67503064a01f81af97551815c29849c36b06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a875bb1367fa070e4219e64e6cd68121

    SHA1

    1600eb5104dca43e22c5e28ea0bb5a2af5e3fa90

    SHA256

    1306ddf9fa38f2b56bd115b3da87560ef54279dc918af96cce7648f20a53637e

    SHA512

    258d49f0b176417ebcc165103cada590b4354199d438843537a987fccd8972a348add554e6aad3b86bdf0ba55180e02c9cf720186d6b9cc3b096ba8b4306f01d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a97d47ba82b1bc00881759afa7b35b8e

    SHA1

    80fb2b13057a46f9673c8309181cbfb8809a38bf

    SHA256

    d0999b37d5c9ee76e0c9ae769cf2e0a39073d9befc4e0e0e4e475355b8373f55

    SHA512

    56a9d2b2e299d4ee1d04502957ad1b8509f7b4a8a31aeab1bfce7ff401183ce8189939791a76270906f6a94cd048b6ec276c30a7a8bb77a7e30b1639c40ef8f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0ce0776d15812cf1b155dff91b9a00d

    SHA1

    24bcba9f98820278dd50f80548ebcc282f99219c

    SHA256

    342298e5841b0bb49a2d185341e8bc7fcdd9f7df95cad92ae4f6c64bfc0bb283

    SHA512

    c64289d40054f4c24ce251d637dc55ee414913faa6b5a1fefde8412b9a2e9ddc53436644fb9fd86779d13ef7ad6669a9e964173e2a85cfa30fd2e7fdef13cb4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4094f0685e5d1dc0b55e1edcb3850f9

    SHA1

    272d09eaad33d9f673ba1939e66773c97f8e86f5

    SHA256

    6052802ee3a06f213ce585a819252dfc513c2beb1fa4a0b2ce416562722b0026

    SHA512

    2eb5b0ceabc511c8a9ccbaa1981e4fd52dba65c9352ee8c4b2bac914ca6b0d91f5443a85764b815441d20340076749cd653b3be007df0ffcaa32c170b42c5541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88c41ad92cbee2ef9aab5057b061b068

    SHA1

    71617cfec33577375a3d28122b8ab0e42a6f3b96

    SHA256

    cccae5f0d0d723f728b9355662e810fdd1c0aeb18fe24df862b02f2dd0b78d06

    SHA512

    b074fe56199f7e31efc4a44255d087d648338aa80848fbc21a211f49ad40d348882c68b2667bd51aa3a012d4213b2907e4c4fd13d3432c1af61aff60f91fa957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fe1804e4c6ccc86f6f32b90fda584b9

    SHA1

    9f80bfb8fe2a711aad6087566abd413d8022923d

    SHA256

    d2bf7fbf45eafda58ba2afaa5b418b04d58807d9f029232bafe55517d5589153

    SHA512

    a35c1d2b84c6e69aed4be79b49e56497d6d35b9ab504e7a916276dc34f410b9f812743f829603e3157a1ca32b18ef68df13aaa7ae448c296a116beb15ea2b113

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c251d74303a8cd05d8a97bed2ebd7a4e

    SHA1

    5e4894709ed219c93e41aa92963be8f1cf6ba446

    SHA256

    97241651c8c5a637cc3540383385996ec4ae794f48b2e80ee614bc9df5d8436b

    SHA512

    d14f7894f4d74ed6e56c9385c9758430b255c05b9a3786f9c20b3cb36167cf382d7905dc607c174094fb25effb7afaf4668c5490258d0f5dc05de46527daed06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84901b1138becc2adb56b61d7f8cccaf

    SHA1

    8d04b41cf063daeff82912b27b710848a611000e

    SHA256

    0c1925b39ba7962c6046d0b82a206d5cc97191d60cc4d55817938a58c6c1f297

    SHA512

    9461324480ea05a239c47ef7f1d2451dbbaee5341bcbea7a9871bcd7f990d6b00f0762be315f7b1f70e2e29078319a7c4da7ce0d66dde461e1153e3320b363a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9c66b5058e6c584dbd80deb36bcf040

    SHA1

    368bb9b960d28ab61a18093bcf07cf002c1ecf03

    SHA256

    ae5f0e0c98d843e229a5e821264610fbded32a89bb41d27357cdecd08b951050

    SHA512

    91e094de96a49c37d7bc93d787f31df79956af57e7ad752ab4b15f0439f7d1e9d1d124ab597aacf245bf501c7a4de78b5502b2110a971172e86bc6d923cfe1e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50ce6723ccc1e64d1170cb49f9cfb8b4

    SHA1

    481250e4356e7d5b6e35636e273b1b5d76e3a5d7

    SHA256

    b8daa5b62d674182113b621a886009106fb04ca1b335b4bd9e8d426bf27ceb94

    SHA512

    392853581bcb8f7be0c35b446da27cf189233a258bf3bdb3da5af1cae520674a94cda00ae49ceb539c868893e5b7c66aee37bcc7bd072908be0e5438f4ca55ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c0d9a3e8d473de2e40c0b9ee4656c5f

    SHA1

    f504aa623406023fc10c2dd51b6c3998574a7a2f

    SHA256

    ffef559bdf384eb29b59f12cc1feaf92397cd483081b55e2cada57cc749f1d82

    SHA512

    c6f7af994c1751a63e7b41748ca65a74b1be8ccb949d931a30ce5375079f4be4578374cbb9558562c0be8eb8988666ea03610c7d5d09e6ef39989534ce81b2e3

  • C:\Users\Admin\AppData\Local\Temp\CabFEB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar104C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b