Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 19:32

General

  • Target

    .rsrc/MANIFEST/1.xml

  • Size

    726B

  • MD5

    98532ccf2df2c019bd9791a767c99973

  • SHA1

    8a1cb5e5cf470e6b3ab544bf8009132d87d2326b

  • SHA256

    2bf05590410fb6b30494a3251789f0d8a4b9da7f3e87fe89b64cace1bc0a02cd

  • SHA512

    2f3ae5393b95c33c17702d5d358c6545457112d96e2a3a8d7a2fd82bbaff6a82b29787d95b3c6f4dc69cc23373c8e129057f80b1e4ca072d3f4f1752067d664a

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\.rsrc\MANIFEST\1.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf6e6e9d72ff4aa4eea51beb256ae137

    SHA1

    a6bef327e981d3878978c1d49aa227062c162aef

    SHA256

    567155f041b9ded783165e5e5c844c6e10ea9647eb548f88d8ce920d5791011a

    SHA512

    80800ce0ccd870f82076cda2e525177954e197c46056748124e5f7a661011c76aa37e968be38a53d78ee6c80fa33189eaacebc9c949a3929dcbdb5436153a9de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f3be17263d13cb6a37174deb36b85dd

    SHA1

    4385be1accbccee0ddc6e29499921e66d218796b

    SHA256

    2342ebf48b4e19c6a83f57366ff51065fa47c9550b5ac7eba177e64971853bc0

    SHA512

    c056163ac3e9f694908b7d7ca9a1fbcd044b16e6bffbda28e0219d457c3d278a76b9d844cb9c9f0e6ea227b1ed4b7767d002d57c5b5ec389dae3fb7b6479c571

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bea2d4c9c29facb67ca88ba15076ea2

    SHA1

    3f7b597b80ba412bc2902032d4b40021122cf504

    SHA256

    baf7097f1ff6bdcba5a3d30435ec1f7941ae5e0467392b672ee18a0d702b389e

    SHA512

    de65122e422dfd47bdbae6e6600f188aa2ade17b1a9f8ed1b66875d186badda05c772e4cb07bce3db2b7d0f95bea8f104ea5b16d5587e264ea466a8304e3b6b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae18ded9f63365dffe5a31231087ff2f

    SHA1

    14f173a4ad3cab777cef8d2784ac8af60586bb9d

    SHA256

    a820d52281794e111024c1dcf0af15a7a913060d2221d2ada775b440342711df

    SHA512

    9d297f2b4d1744d954a5884ebbfbf4ae8932f9f1b937da6ff64096a4e6da238b86cfebfa43f2949c5a992e057fdf24a08b9565660ceb66cefdc7d6f9b2703b46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d178d8fa5c57766c1b2cb0c34f8f881a

    SHA1

    c9355254e38515de2f7855516c713736b5fa3d78

    SHA256

    6f248d7a58222578fef74adc6e5b715b547e9877cca244b49761afac575a601d

    SHA512

    2dbb5b8133fc61d9edf175832645abf997776c20d4a492aa11130f9d873638e327b676532d9107f699d4dd462d5ca24a6a5145ac73d6feaf10ff5e09b0740c66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ca3ae60180d84afa5a211bacf333298

    SHA1

    4a72c3170cb05d7992070edb0bb02d8e347f4246

    SHA256

    b7db6b681248d4b46d0241f01797588804587d26c1a0f16eb9a75fa19078ac17

    SHA512

    266f2f2a56aa9d6395ab7b52acb113678629314b767478592f6f3c351e68fb80e1c3aba79389f6b978099b9cc450d28501baefffa8a68f092b7a9deeb84368c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72f842fc3ae32f7b6e3a91cb4ef916dd

    SHA1

    3a112bae367a60fff59796e22f4df58f23e21caa

    SHA256

    f69368e8c4a9e3425c9df9a77cde81bd4a1e180d8cce541431e2eb4bf43ffa02

    SHA512

    e256f262bff1895f8504b8bad8ec7936bd4265f5585348cf932ae79829035811149695a6f5032f1010fda2f66d43fdc1dc9693fda6d92465885ad20416ea9443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fa76e7aa8129a62592b5aff21433ca7

    SHA1

    078aed4b05473f32440361bb88aba9407931a08b

    SHA256

    36d11d8ae0811217eff645a15c0f28dd1a38a3d654d0343978c2240d61ce2f7f

    SHA512

    057b6629e39587e6ae14ce16a254f078a41b58308886c06b14f6fa62b7defd450cc03060c6186e9fe9fc08fbcd707d3885e50c870183a421de8752b2d1bdfd5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba470397e490ba0c267641484e711257

    SHA1

    cbc97e4bea5fadd7c85dd36916c581db95ef0229

    SHA256

    6d432a338d985d1a992dfcae5780eec0e15773f1a7233027fc18ac21c0d6f8fe

    SHA512

    a1a7207cacc3a542022b12d91678591c3b59a9358cdf319456c4cf269cccdd665368b7a8614f21e155d4c653e67231e37179f3dc67b97d7b5a90125a4311abd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    604b6874b7191297e58cce354a38a50c

    SHA1

    7b9ba60c09bf145740616615a7ca0bf5b14dcc8c

    SHA256

    83cc02e5b6acb7d5bcabc74e62d12c7ad9fd7e38045acdf6eab5d4862d4aba25

    SHA512

    4301c83f3cd491d27d1d641f5b844a14a6c83f8cacff5c9eab826a05a3139c53ff6e1a367ac8cde12f8d7de2c80651da0e2e017d431c149a24b4161162fec762

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0dc51ba752b7aaa0a78195a9ece7ed9

    SHA1

    607858fef972e8d60c6e39edbf28a48bfd35658a

    SHA256

    1d2b8ef791f13866be7d9d0f909b7306a462c42235174f47ae5d1c3c11bd7208

    SHA512

    89c18e455bfe50607b05670b2640307cd946f15c8a1c82604f8ad26c630f08ea0c55c56bb14310cf651f681e0e76179b939fd75d7217c115aef4116d9b005a6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    660716986d34f6798a3b93d6f5c61ef4

    SHA1

    a4420ff09a2a639b21216d5e0b07563f6802f7bb

    SHA256

    c3d29f6294eeed593172f0a9090d55a346ebdee662090796404fc190f1d28a5c

    SHA512

    14187f24aec5a9b0a4fdd66b94e7a28032c5167d8a1b2f962bfb162dc893f0c95b16964c7b3fc9d8b14b03fc97bfeca5180d9112a4ec0b294bd95f198400e8fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b77881d0f355c743a2d7cc2005bf4933

    SHA1

    6c2b508128774bf2611e2323f3d55955c8b7f941

    SHA256

    ff15589e786b81bc84469e672e3d36d8690085653d838dfb8ca575a3a8649ccc

    SHA512

    948d87a3e1202a45528fae47d90920ae760fbb1af924d9e8fad6004a0101baa09c9d419d2158fb4c98b7095b754fc9138831f25c838605449a662276d3eda2e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c73f999774bc0eb57299ecc16e5d8e6

    SHA1

    b49c7f959991bc9c7231fe323486da62ef4901a7

    SHA256

    d0ed23c1f6d497e00d82668d54c6c21e5940df2d4c9a70eb0a9abfdc5ced8e8d

    SHA512

    9bad7220920d5a1d41a4a9e240d02c7ef9b72a53535851b428e6f6bc17d053ef1579d3bb7667a87382a5a100b1086715063ea75d3a966b27116b4d68bd05b1d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fade7667e2b603b6aa48f714acc8b3d1

    SHA1

    0f9387c52baf777caa5de8ebae54e3927a9a324c

    SHA256

    5a246417d7cb170ab94feb495b8a9511ce8884f8e41a157ff1339fa0a71d890b

    SHA512

    e045408133bb156e49d6ee73ccd067599c164657564a60bf12306ee863ada7db765d817a82cf703fbe4b8f29c592168d25a4f1892bf9ef3ccc03688322e19396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fdb9735621f113c5902c0839f6d2ee3

    SHA1

    4b96f5e25d7450eb0a98079c82131a619449f64d

    SHA256

    ff3cac24aed9a6f0b18236adf67f12bf4294af861c976ba0cc6b97d26d37c8d3

    SHA512

    b399dd9b6c7b0061c4dd137a59ebf145ec156fc93e3e5f287a2859e867ed4594d0d3ac32a464a55936245461e598a04eeb5bc4276aeb1893912dfa500da1bad0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4f308cfb506cc34d971c902880e2459

    SHA1

    c0b200de2a030bb5aca50bc09abbfd74965b0d01

    SHA256

    e582072a3dc180289dcbce209bb53cefe71ad8791dc84845e2a9e17a5fadf84c

    SHA512

    e04d0d4cf644994c9cc311a02d1046c34df255fc2d9847f747afdec48560f901557d7a013c97d50cee876ab4150c767b3963d64a3d4271576b5860f2ec5a3e25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa8950627b04a812428125da30f7edbf

    SHA1

    eeb365dced312b76033bc483f7d69729d893c43d

    SHA256

    e94dfa4293614a7ad21eaa12da3184a7ba983a53290927cc4932ab0a1a49afdd

    SHA512

    f8bb66159b08085202b1677d7513a796c14dc7507fa486899496f6f9e7deb9c05d89987526aed2e0a2077094279944784bb39c8e6159d0c335b3e508e4754982

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef566ea243862fe2252578c337aca265

    SHA1

    2e007684c67f122832762bfa82ed46e38169342f

    SHA256

    caa07aca68ce3c2e6ea5f66c4a6145e9ee9347ca9bbbbb32c4dfda1b9e1b69c5

    SHA512

    562a8a9e991dadc35b1c2f050b5200a34037756baa0d5b023e44d5830c91772c524203fd3cba36a49b7fd57af939ed2d98f7d7ee27e2f1c0f6ab11d12105d142

  • C:\Users\Admin\AppData\Local\Temp\Cab6C6B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6CEC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b