Analysis

  • max time kernel
    99s
  • max time network
    214s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    08-01-2025 22:31

General

  • Target

    Other/Environment.xml

  • Size

    15KB

  • MD5

    e7dd4e065af3cd26fed13ba93f37c015

  • SHA1

    730ed04e211997ccac7ef9901eafd09e4b4dfd4c

  • SHA256

    000628e5c2bd0e1baa6da1827e506bc7359ca68b18bd6d50b0abd5d84000ed5b

  • SHA512

    1a9e5df92b2373ba2f348b708108ba158b1fa95b7f4b56f7414fead48ca07c8f0fef93dcc0c50c1e7183e72243e6dad5fa4264e706c0c505c0706fea1d679496

  • SSDEEP

    192:bmZm9Dt39eaGuhcRgd334Yt1Hms0bymw1RCx4:pDt3jZcO3l15MW

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Other\Environment.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Other\Environment.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    9ff670ce735bcb3f1852fb17230eb4d1

    SHA1

    343b84e90eba5ba52ffde84efffc722d9aaef34c

    SHA256

    d5171888f2cf311802c4e02bcc7be88f684075e84d0665f44b823e6b6a5ead5f

    SHA512

    73e4531ae7a0273390be09ea835d4970b4e5053988f9bf48e55afabcf184aae29d267f31d43250c1d5baa721a23c51a0dd1c46d4acf3a747abc575b6f23bc120

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    8458fb136f647b29a5ab871617550f08

    SHA1

    81c4a5387b92c5eb18db31e2be4a095d9e88e2c2

    SHA256

    0cc23520a4fd1a84f17ca60a4b6d7442407913917e958445b7edd7a25dc2ce19

    SHA512

    02d797010095de884c016601d2c1d8c177494278525a70ff218356394d07d9f30ca320de6ed2455b57168ad5788217e57806270c66728607ea56e76228a7bd63

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KMZNQ6LU\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/4088-10-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-15-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-2-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-6-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-7-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-8-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-9-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-0-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-11-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-1-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-16-0x00007FFD47B10000-0x00007FFD47D08000-memory.dmp

    Filesize

    2.0MB

  • memory/4088-14-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-13-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-12-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-5-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-4-0x00007FFD07B90000-0x00007FFD07BA0000-memory.dmp

    Filesize

    64KB

  • memory/4088-3-0x00007FFD47BAD000-0x00007FFD47BAE000-memory.dmp

    Filesize

    4KB