Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 18:32

General

  • Target

    .rsrc/MANIFEST/1.xml

  • Size

    726B

  • MD5

    98532ccf2df2c019bd9791a767c99973

  • SHA1

    8a1cb5e5cf470e6b3ab544bf8009132d87d2326b

  • SHA256

    2bf05590410fb6b30494a3251789f0d8a4b9da7f3e87fe89b64cace1bc0a02cd

  • SHA512

    2f3ae5393b95c33c17702d5d358c6545457112d96e2a3a8d7a2fd82bbaff6a82b29787d95b3c6f4dc69cc23373c8e129057f80b1e4ca072d3f4f1752067d664a

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\.rsrc\MANIFEST\1.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00b5e66e15966734ae06a8b65a5eaca1

    SHA1

    5fd447347e54f9d93c73c84f374a07fa6c7e7af1

    SHA256

    3fcc351195e5b2bdbd51893dfbdada29b42c45d461cb39d08ba5cfd42d812f51

    SHA512

    defa440d7a2f5cb6def20bafceadad8821c8bad2a004295fa36e4fd4c4698a5d76230088c6633bf6826b4d91f4e0ecab250ea1be300202bc8a7b2cfa58e89906

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a83fb756c4ec2807ecd65edcefdad62

    SHA1

    2bcd672a05bd1ac88de7449dfd9fc115fa84a95b

    SHA256

    abd1321b457d2f07fc31397539a69eea93b19d3dc8e622b01ff81c2389861c2c

    SHA512

    3565ad75762fe1c266db652bbddc1767bf1b615e85d551558ecda91146dab777be0e1547144007eef003fc4bb579e0e76ea9c81b8d67b3d9d6a3c4dec5fde10a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9eeb0e54350f34070758bbfaf7d5412c

    SHA1

    fe184f0cc3e9462627ee1a9750eca4a0f629f230

    SHA256

    1aed5daf9ff03eb27a8ca3ecbb82c687178476a9074bee318dd80b1c695317df

    SHA512

    a185cf1bcd6df4df69ef1e6c8bb4bacc2ec42e63c63a92de96c45566861dc2841826058baae12ad5a11e833f1f5eb12fc4cf6e625cbbeaf4c63aa2352c85a2d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a93d548df0c05d67ded9de07ca797a12

    SHA1

    857fd51e6b7f8b346531d65ad9cfa376634a2983

    SHA256

    456587798c5733520319b78b62adf0079356dbb9c4f69a03456c26a9171e4996

    SHA512

    804dcecaea2cf078571e0fd53a843705f5026967bbd5ef7bb1ff508e2d1b2bde1be60c7f1aa92e3a85335ea9ee3dc943f3e985f18f5248ef1f04e6671dd49190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b0ccfacf364cee6cce382e0507e936d

    SHA1

    4b1ff8024c991d38bdefeed30c07ba8d2e8d8230

    SHA256

    0a682221b9fd3de11a8499a7dffb8a0c8d95e334a592efa40f0407a494b94fd5

    SHA512

    e6243922d66a29ef4acca7a97b31415e8ee51232c1f2f744e200b43f8750ed4bba436a64d3f61dd8a80c4673d6523bd3476b6ed9cabe75b11f9e14f2dfcbf403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e527e4fdc4442d6881e6a67f5a3cbaf

    SHA1

    79f888bdddd4c369281bea2a3c66cb7f6fa54e50

    SHA256

    17fc7afaf3d5660316328941be5dd94393fc390fa629213229d0e056104e3862

    SHA512

    69b0a0b11474edd35635571e31fed84064fe6afb5df9189226e3c3e4bd29b3575b38ffd75ec8b38dac310b826223700f9d5244dd7e5654e4acc60a11bf61ef92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f82bd2b142efb6a073c14a18531d76c9

    SHA1

    d42e0558e1854ecd8f48753e4025415bcab1f70f

    SHA256

    f7df464e48138052bf7d114431d74c4d63eceb0272dc7972fece262d5b6745cb

    SHA512

    e7c62b770918d652029fd6d75f4a693c0c41490800869f1cd050e67141f0852f5729531825c036bde04dbf809156c37b330796ac33a2bb10912e8a474f936631

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f106cb0dc978d258ff23e2dfdae7af8

    SHA1

    8f3d2f37034ffdb1b5bdcb5f9e4cdfe022ee807c

    SHA256

    d3005c5adcd3b83c86e8411c5b90d759f2a9fb89209a2f6b12a553f880a51e83

    SHA512

    67a0eca77f5791e65e39ab7cc1b98b1f9f7f913a2f036b45441535464fdf59c5ea94a14e8db99adcef0c7f9a24c47bf0a6de1f1fd03076fd4243275c36ac19e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8703d5c9fc0ae5c550628afd66e3ff85

    SHA1

    eda264b0abeda3d2e97af0add18451c234eef81f

    SHA256

    67cbce5fc2a9837c31f6f5a7465ab814d4b07ced5c33d2c69f6adead2fded29e

    SHA512

    de207042ede824823e00114495e09f6265c3fd37f0e8dd5fe0541bce4ebac67f981c4af79d744f7e48fc87ee995abfc4bf2a11f3953d3987b3fc87de1cc58cb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3eb1820a0aef2ba9acaf49528ba62071

    SHA1

    ba3ba5e32d35ada07e3a58a07f9f6a500391dea5

    SHA256

    b7582b7df10a95281c9f8d3ca8e0a4ff1846880494555ce97271a9ea61eaa6e3

    SHA512

    d56c4609daaef9c77d697f69a665a381021a6613ec3a489b21ef781bc6de5c56cf5b6c6813734784ce79155a29bfb1fc662338d642b7bec71263f5fdbdba1f9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25cb7f012246e3c282d199146583b8df

    SHA1

    36726b3dc53e893c0cde4d9d5369436fda5f8ff7

    SHA256

    b955520b030bcf361c3859d862d17f645c0ddb6eced84f41ee3957d69c336517

    SHA512

    8b6920791e54a15dd5bd06a53d0429f5597f063f865bb48684cfec6b0da7e269bad9d899ed07c414da863e6a726abb256f87163e06b21a725dc2460bc1b8d0ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef910be08467d361438e635a0168f479

    SHA1

    6ea03a4e7953d2b956515b276bbe3fdbf10d83bc

    SHA256

    3bbc22213818df1eef076dd7b362d8f7792e80da85ec74264dddfcddc56ee01a

    SHA512

    7d8c126e0037716448032029fe493c4967316a69a01a7e9dd25c9a8a43d54e4911dfc6b16a6307e145244a36762e5bf299322df5fa5993b3f9a8f79fda481468

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb38462f5baad934d2c8ebd9fef08911

    SHA1

    e6db58966f33a48bd672d6da6ced2ae45f356c61

    SHA256

    2acd9f88b5a062f148ba72e549384f5ca09713a90d459cd045fc2a22dbd79ae0

    SHA512

    7a375e10ccdfe0dd38dc81779249da8169474ae34e110534f2cb5a0c77ec77d02018ec04ef2afbff12ee26bfcd95a95932e8e997a6a23a9d54f3a58cc98f125e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd8225c9b011d059c9f76aaf6c882766

    SHA1

    dfa010c992ae6eb8d54d99592cd06044370e24a3

    SHA256

    bf94ae0b6d632843a61865e396d684d7f40041796bb29034b630b6f658b86e6d

    SHA512

    ed42c02e4f521b5c84705f99f39e528749fc469e7ea65228cf0c9327aadd9728f550ab78d3d8a4f7fb6e5ac930bd08b3a131fc308dd9660c9a8fd5ece591db0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47a2f7d6e413e3058026549cb6862a8e

    SHA1

    8c3f69a4849a79511c4c0593da6ea01f70d62c88

    SHA256

    3a567083667d97101d04d812f2886e351edb71e8f0cd7ea69e4f7b7f95674552

    SHA512

    90c80c84372b6813dd25ff9eed6d77461ffa80f9847f4ea48c9d41e899933472a8c0e15a020e38d43325c9532bd34157679c543a9df35a7dc35d4aecf72ead64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    448ccf82495f058292bbee693c7f318e

    SHA1

    814778318c88318574883793d7ea5d688dfc2a6c

    SHA256

    30f8abe239708ada5bbd6ccd8274a61b311adc89d8a9ca83d2a1132282888668

    SHA512

    05761dc63e4b804bdba4f37828398fa1ff60334dddc1ff1af54babfec9192379c33540970cbf70a3adcb30d806c10ef8d146830282594ebb2b5cc6b7f68abeb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a8d8b8ebb2e8218f7fcfbbb53abd4d2

    SHA1

    31c1aee0a2f3e078affb5575834c17de596fba19

    SHA256

    a6f68d1abe69f61728afe12a234b7daa9027a0bebc915afaabf8d8316e811b86

    SHA512

    51d0d8ee478ec6d031c48b13ec47f3b1f91888769d92cc11d5afeff10b254b488211f945c83e34cc7c64a0f01f8a75e54554271e5c5ea2c749abd71f8d525045

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7a0c3bb6eb53f19ae4bfdc2d46ebc2b

    SHA1

    b837939df9848e09a1ad11f9b92917eaecc7e2fd

    SHA256

    fdd1ace3682415d4a833480500a2ee01d04af499fd05666befaeda01a32baab9

    SHA512

    c56ad48324811608f6d16f403385ee805bf3c179af254b10fffce8bc1a083c5ebbc1f3548a0fb827cbb0218f95357ee85a2d4ea2dfbee13704479bfe2d675e30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2243ceedba5051e8afcca66c2902f41c

    SHA1

    a01cf5354dfb1b0cf65792560e85c1c3d94931b2

    SHA256

    5fa553b1489d2d5598cda668ed7bce8e72377dc75d69307fb160b08188dbcee6

    SHA512

    3a1ca7a7a35b83d6a299c390ad021029231970bb8e316f5500fd9b94be422321c752f81d58a68d5a89833caffee3a8969531c793b58d503051cf866c99d80ae8

  • C:\Users\Admin\AppData\Local\Temp\CabFE1F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFE90.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b