Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 20:59

General

  • Target

    DiceBot 5.0.4/System.Data.SQLite.dll.xml

  • Size

    736B

  • MD5

    8ab01db32f56322275cbd0864feb5d55

  • SHA1

    cbdb70f5fc04485af0d09ef7484faa7f8b3047bb

  • SHA256

    cde00e0a0f52ed121d52c17338da42ffd9656d4f81a76df2dceda05c88f783ef

  • SHA512

    e52a5e341309bae40a4f69d67226a92dfc42b08d4e815da3a7df7295d68da6dcad8973d32af84f269692bd98634c4657e1394366574f5ec299eb50fa3d1db468

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\System.Data.SQLite.dll.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    733163747a8ef0ff69edb453430f24e0

    SHA1

    816c5565cb80e03b82d6a8c1d460edaac95f1d9b

    SHA256

    966160d87f9fcf03c6cb9e5ba6387b2dcf00acfac8e743488b2e3d3d715e93ca

    SHA512

    ebac7df86bda1092358eb1b60cf2d8cdecb127d1781439cf950f2566ccb7e8b3c01a9d97f9d01f7b7c280431f549fef33a772550e4f4d9f2dc93cb7566ccff3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52988defbd6416fd2a2c5561b1ea967e

    SHA1

    31ef5d48936de7466ba8fd74f7f3741083e32b81

    SHA256

    8ec1be13f26b8039e01c35563c02888a6bc524521b136e7c59d65f4278978b3d

    SHA512

    76c1e9d911a3bb40a29affa4ed6e96a00ac643500c816af7e2a3e7077cddc644f507c1b13d7db4cd2b2f36ef4fa436b0a38eeb3c031409726d97030e4358c60a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b59277d1b81406bb7af35feb2862a9c

    SHA1

    7a68654eea76a2e048831860082c6496e03229f1

    SHA256

    c87037640da7310284629b95280c48a070da3402c1dd6bea15d33e932716e544

    SHA512

    873ca43eef76884249ff46aa17f1e8c3807747ac4c42ef53a3f7fb39aa76dc2a4fa1f40d02c580fd32afb54ad88afab6b992b2436251a7c4661e411f9f467dce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45a3afa39894ece41ccc082bc0894fb5

    SHA1

    cfbd5aa7569be3546cef23c285b49f152ea976bd

    SHA256

    38a0d9404e894edab0ae962f958d6a0fce07f635fff032c64d6944f865e74ae7

    SHA512

    0f88e461907221621784da3b3bdf27df681c9f7176b6cf0b1f71514260caf957299c572d8e5d7b9223891d8ceae7bc85392ff20cc892592f5ddd896eeb6768ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d34ab62b21584e05cb854d2e5342e56

    SHA1

    4ca64f18579e4dfc6aa91df16250bd2fbc23b3ac

    SHA256

    3ed6db3f932e19c59098a25cb720476ecaa2e385f61295498b619c143f71dac2

    SHA512

    4e11522c23d30304da265d902a94e325945c816fac115dcdcfd736f3a0de2b81e56bc8bc7d043777609dc18c329ab8b987cb748f840a84686c94156f133e499e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3b7312a634581e0d9332010cd8ede2f

    SHA1

    1a7b7cc18a898785a05d353b55684ea364c69193

    SHA256

    9378440fbd5fddab38f8ba6a68e51e74e14f11daa14870faac1aeeb0b957f549

    SHA512

    d1bf2e7fa3046956f565b2ca8144f12843bba20a1ea690874c9cdedaf173af088ce20b10a4c72e1537d4d4b944c4587f0fe0065bb3c5a31beb5ee1269f1df530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dc5c338cee5f2bc345af3eed70fe065

    SHA1

    07076320ab9e936f40a962448ad0173b9b11705a

    SHA256

    a7eaad9b005cfab5e522cabaf2b3081de39dd93bafb705729e04d5b72cc2a011

    SHA512

    534fb2fd2a7d27db566d27a4b0f94b92741986ed76b10b4c5aa7e12723750c80ff593ff37b9567c827440a3b22a38a4d25f88163465b0b370c746621b5e05a8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    442f75be3eb1df7624b60d9028a1f8f0

    SHA1

    7a9656d25ef3325931da5c4df3cd2089da2516d5

    SHA256

    88b003e9e6abdb0ea9c6a80c482319fddd9ddbd99c5e157dfa0ca103bb16374f

    SHA512

    b0030f46822a4d2520c77ebb4df7b3b127ca9befb81a12c1af5c6148a8cf777bc3b60daa5fbebb5ffa2a69b77e60c0506f02513a2e8d762f594dd3b7d2a342b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    776d2516696e4b13c4086d861fd9f286

    SHA1

    be1bf7e169dc019d4d0a8a30e12a01c15ce1f2c2

    SHA256

    ec613fe513e821c92b15a3fd5e9ce81990b4387fa988be20163d2aee199f3bbe

    SHA512

    0380acf6df9755da831d5556dd4d8ee01e071f46ff80a25bbeef7b02cb214802848d63626b7054aac969fe9dc09af48e0d5c3053474d0f1a7f782a3a1559607d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32d8f66a3e02ddb377be6f43c10ac296

    SHA1

    77c790e8fc01239a164cc0481b5a192a5bcaf766

    SHA256

    290d62e107d215201f7c90126474ee7c97228917336f559ea92bd9cbc392e657

    SHA512

    b473f5766517e780d1b24caa9ac4a881829666d5cae2c3ed110d706273fe2b2e838966dddd8653ba6d8b4f2b857c258ec421ab6207bd5dfb6c930cc4edef9d3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95a51f37929738391da06864f4d64ef2

    SHA1

    b01d5bca79a3e9204a73ca71d3dff020a7776e4b

    SHA256

    5628d733432be2ba96f6f80ddd54665a2b6e6191450eca67c5a2b4e9078907a9

    SHA512

    43dd6172184d603bc67028313812fdd4f8c09fd7653a1490ba118619b92d20a339eda5c98c4512c4a722e15df76040f0068febb469765165f64cab0b2f3dcf70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6375d9b283708704d7866131e5881fb

    SHA1

    e8c71df63c4175bff949d5605554e25e9eaf2091

    SHA256

    dd8fd659b930ea794327445e891ec317a802d2234c7dac3e2a8c22205f776a5b

    SHA512

    2721d28d36072dc2a7fa95578115f2b9749b0e8c05055920d95191f4bd7119cffc8b031b716ffad7021962a94e075464c2c14b396d47560f66f9422095f7cf39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d7d67ef9e778681124fa71c8d1543c1

    SHA1

    b5d148f1d4a61d3bf37f2b534460bd4c9b23406c

    SHA256

    4b04831fafbaa5d0efe795cb0ee70765f0f6a8bebc4ee941f9667dd9cad4df98

    SHA512

    60c81f2d4a6a67b9e1db77e27072fa3bc9a4fe37840159bdadaff1c21bb735da25d9b5f6a31a2be4a9b64d9bd6363a42ef0f2595681aa02e0f00ccc516a430fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5397fbe62d0c77dfe7faf3057a2d7169

    SHA1

    f11e4bb8c58b400981aec9a53426d198338b6419

    SHA256

    3a0d6bcba67619f43bac14d779e34db238afbb46e9cae5014c6113f709f399c0

    SHA512

    a26842da60308d2ea089800b94b80e7f09b40fd5b6f4e88fe8ebe8d613203f7e73c85f0649a61d41ec19ffe8d48b01cb23f5dfa8f67ef177846bab8fb5edc4a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ad28eca0a22368fec5ef3297d7b5acc

    SHA1

    29094d774bf1a6a8187d7b476680da3df8158e74

    SHA256

    ea48e80823ed6c22be7689c5289b080aae18d6a6391be4df0a7c7c55aa8ae5f3

    SHA512

    f7d93be851c5fb0af4ba889cca6f8c5b44689d26449a4a56200f1ab94d509fd78622b654d405f1e015411a83f278328069d185a2eae0b20a534cd5c64114041e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    410098ac4ec2fc487be02f381b8a948f

    SHA1

    6f19ecdadf769fb1a12013776ed7f6f9247bbd9f

    SHA256

    bab0461e74c4dd14898968a339b89d9a71571208b7d938001a1baf5b8bb74ce9

    SHA512

    b588336da9cd0496e360ad600047947c1276e21e28817f6890b8d6f6a19be3b1146b696e31d52f47b9b4747b68cf4ab4df9bb06af73f9856b0f07f8edd8d55d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65d2463b2e6dcdea5ed8379d73eafd84

    SHA1

    a8efaa6762c967d23de5029bd35d754417d406a2

    SHA256

    5202e9951b26cb44386217f3bd38c5b203a8979668da3816cf3e0f0c787dac5c

    SHA512

    489142382ffe6a128972fd6e2e41049fde668a5e3b381ba68d1e6938373ead11c7bdd4fa5b2cb6cad0e4b912aa33f0f758f2e47c84ac0ed56c07e9a711949618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2eb132eab31a1300cd343b293d931bfe

    SHA1

    d3b53a9a05d7deec8890257feb4c09d8880220f1

    SHA256

    00a5601a938d0cc66539820a60f3bb189d704cb25a6a174c25e144a4f3bff1a4

    SHA512

    f34ab4ce3fcf45bd4de8a547020793bd9b2eeb530a8c673c48823df12a4ad7fc7d72f2b69de8143e99653733760d22fa33592e760eafb1e26ee0396595f9e838

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a7a2c1762af05d7141a97703d44a6c3

    SHA1

    37654d9abad617c6be3295ca37723d9e9224b0a7

    SHA256

    b15588349b6074f046bb4f535a010372977509eaa5397153560a3f3f82d67181

    SHA512

    b7950932c0dae91c991dae1e5df89deec73f1b624c0e6024f669ff629398e84e9b5a13419c4594eebb4091e43b215fd23c4e4a849a9f8354293ea30bf924c0cd

  • C:\Users\Admin\AppData\Local\Temp\Cab55B1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar568F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b