Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 13:50

General

  • Target

    idle_master_extended_v1.5/IdleMaster.exe.xml

  • Size

    4KB

  • MD5

    1ec131ac66f6ad8cd1575a6d71004755

  • SHA1

    5c29b6f19a5567a71f762555ae2c4bfbf2f44a74

  • SHA256

    f5a6b3a57e72fd19ad0eabc7119804b5b8e5f629b2cd0cb2455d1017fafd4241

  • SHA512

    4376c1edacaf810f24024c066019d635daa358b007204e4839612115bde3556343aec5bcf7a1ec8a664527a45503bc24c3c95a4b1fe2313769b501c462bad545

  • SSDEEP

    96:ur71t7KhmTUD9AvmvLAvjAvUAvzgQZtsvOAvPognbAveuBvrivOvOvfMAvZQnLQB:ur7376mBlrf

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\idle_master_extended_v1.5\IdleMaster.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d130ada3bf7090a0ba275952311bd6c

    SHA1

    8288871c52684aae67feafdb3748abedabc63b38

    SHA256

    ebf16f2bed1fcc8a4b3dd3ede3de72cd64e4ec4deffd2e9c3207991c7651525a

    SHA512

    bc24587da7cec6b45fc9a37114d1b33a8ddf32c9a0fc0760c60d9f49ecee7209afc06b0fc16d55a4b07ad9e233262a0b4c93809b42e8aced1fcde576510ca3df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d40ed5daa199ce92d283b77c10997d20

    SHA1

    870d1cfd6583e528455bd833180b817b630225a4

    SHA256

    75781477715b42b78f7a92e7b7bca872b517e311fde6e912b9851e284779bd7d

    SHA512

    0f0d7b84e920a4c8b70a7cabfe9cb5745ca486a5ceee0790fb29b0850507443815b4cc9090609f895f38af02775bd9b599e5cd2d1741300ae355a10a2cd0b860

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2769feaad594bb1594bd47551aa9818

    SHA1

    34d65c0b03b19c8049ff7399bd26ec3eb0cfbf3c

    SHA256

    f12a359004f617055227b258a4e90eee5d3d0b7da776f259ccd38d8868a0294d

    SHA512

    0ba8224f0287c3044889bafb41a3468f99009945323c2bc70eb22e6a947de498484ada17a023e1785f2cb1910871e54edc1c08d63edaae050bbbab89bb938daf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4164df56474877b66eeab23e34962bb

    SHA1

    64f6d00f6d5e23d2fec4d1492b65bd6c16e51b3d

    SHA256

    aa1c88d85305a9e1b494435e6ceea3be158ff5b44fbb7290af26ee4c3934a264

    SHA512

    b38f504f604f6db9b3b4268c8db1f5a0aad85cfb21dc990934b5c18ac45f89eae6fe286f57dc4540a232fb83d3e4baab876770ea5c6ed0897a229ab8e56c0f5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    733b1de0ab1a47c963815da6d4938ac8

    SHA1

    264139e19a50d447630c7b3391c49cc8ba324bfc

    SHA256

    8aa3b7442c8d9dde3b0de7a4a03e25b3ad3ebd25b1ec197749e07e2f862c91c4

    SHA512

    9bdfc4060592833f22c8efb3316188dc2388e892d0b3858b296f9152e1cf210b1a9317d64cca413b772bcf6e26a583987929893296afa8d1210a9c0973f7c071

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b483127c82595f33c7678f1b6254c85

    SHA1

    f5fbab33b0cca4209979c46bd96ac971d61765da

    SHA256

    9782214d152354c392badd7ec7756aa53fd96486bd1eac5002e824a25535e218

    SHA512

    a2bc6dc3fa265f40aae8491212de69f6e0f2acaee10e96185b2faadf60ec85abfad2499d0342ebd042fb7277c52562de5d4c2801a13aa91877e2d785f8dc9afc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d535e8278e83c080d620499a7af9b90e

    SHA1

    6d70712226f6c8a8c493ebb6f2d3ed9b96ddcfc1

    SHA256

    644738ce03c07cbf4c94d98ba7223b318f1c4de2294bec0220bdc55f66b8bf12

    SHA512

    40832a33506e1177427dceda39918fa11fe53c37cbc57a9fbf16aa1c76470d74a076ba73fae842e35f2235ab745bbbce9e115f72a34a6aeda87497ca479da3dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43f877b3831a29bbc10f4a9fbfa61244

    SHA1

    fe814d4907b3e39f3bb6c5b5fb7dcad95d074043

    SHA256

    06be2d3049e581c491ba009f477f320598daf3d9bdac02965192a315e2434fc3

    SHA512

    d9a592886d9dbc3d07d7cf2c0aa06a08ee4094abe3ec872a194110f7aec28a89dfc1b12262426316a11e894c2c437201f83c33e9fef5aec48bd06df5c1d1d706

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec083b7b402ab648817758c9f75dc1f4

    SHA1

    c4b9cdc8b741a7492baca9362707d9d2e4e86bd7

    SHA256

    1870d0780e629180bd55bfa8916ca170dfe76a06e153ca1d21730949b115ce81

    SHA512

    f13b3eb48628fa4a254793410c614f8a65abbae42ec31fb68da56d16d753cb46f6d60f888d0e2e3b58cae179278b22a08f9ff15a320c64090c2e00ef286cd2af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac2c257ee33e93c9f26462f47681cb58

    SHA1

    a55b762863d467ca49a77779c2e21caf0a3cd558

    SHA256

    16818e07b3f5920358a8d42678d08e1423a45b2320694769ba3da8d7731fe689

    SHA512

    1bf89c2707a5caa4dfd0de5b1eff739ffd2b6a1a92182905052c9bb0d50a84c61463559706ad7fda80f3e55dccb0cf7b9f60204f490a0a1509c9d07efbc2d9b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b0ccec0a837a7af889d0a8c457ea817

    SHA1

    3bf9d734c68e75102e12406a705c1af2b4a4099c

    SHA256

    7a0e699b7ce919987e5cafb9413681c5e54063cd61caf4e709673e15ad78395a

    SHA512

    137f113255925b1b6979a7d3b4c2ee6b993c0eb133962887a54c24332b3a16e48b0f6e6783330a06e3de6251fdf146643da111148a9ab70a7bfe0b4fcb6563e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7608ae920c412a6abb2279ea33627d7

    SHA1

    5cfa207287e873465b9c980bdf0d00c0a2a6afc1

    SHA256

    313daea49eff181294bb7ee7545b51ff31a33ea9d1115983173f2ac52fc4e03a

    SHA512

    46c6364e5bb5c92651c2c20c4a096c0f96ed67fff22d47feb718f60fd1fff0c2880afb0a9c1e166d189be4559fc3192b1441182bb01c4d9dcb0e2edde0e1edd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11670a43440a883b0765cfefd16de776

    SHA1

    407e52f2e136c3aeb560379fab40aac89723400c

    SHA256

    5d3a31b5985c54a1120c9ae55d90ab8c8ffb061ec5b0d0a322c3150d09c4ca61

    SHA512

    167aacd10731bd838c8f0e281e65764a2011e54904c03befc77e5ca313f6c531f5ae29eaeee43e6c8649f5b10d1a4970d93dc38b68c510c8dfa5f5f060bab185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6e46c94906ca84b1ba721261f534506

    SHA1

    69319e486a71593a0a7a904ca1252c8ec6599998

    SHA256

    b6040ed62a00f049e53305c8cd4498ae11223ba8810afa339f39bb30ffbdc6a7

    SHA512

    91efe7b664e99120df485110fc8cfb10c96daf1c4dd7dd571831aa2466470d193d413d532f1211a9c70a049cddb60c8f47e1072e434ef8059d040f24d9bf5d80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5af198422da061dec21b1c329f7a67f0

    SHA1

    731fe75ed2b2ac57e6ab6e603773fadd4f0801ec

    SHA256

    0eeafe23194d6d0354c997a8a0846e40c5ea896231348bc018c7b657c02f1439

    SHA512

    beb8f7dab26095f8c154e441bf66798030946ae87d0c499b90c28ab6272a0d6b8e5c5af749b9b4fa6cc3a904c0b4ca9dd276229dd0925c580dbb8b161fcc26ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10fed9ab27065e8ce21c227c26de51a5

    SHA1

    399a67841656fa083f893d2dae362db169a7bbd7

    SHA256

    98ca6b233b1e1c15b005fad2bfd9323dc582ae255f5987ecf0b3ddc95d9b40cd

    SHA512

    76c697a2f98b75953eae00fc213abcebc67738780427c3ba3b781f5e7b7629713dd60e99137dee898bcc7f86292421a1c04cfe1a84e8653905812f9e7a0b5baa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d00097ce42817d132ec87b74519ca7ec

    SHA1

    f71f3a50d5ed3b59ac3b83525ae9d445ef9c9be9

    SHA256

    dc9100139d0618e73e39c373fd1e8a005700305319de78153bc05f98352f2225

    SHA512

    41a7686c6391cf14c2dd91e88e772a2a840f2982d77751ae23d1d8e39fed636ac3c94447691f371ca2eae7f2613ff40a653e62bc8f4fa45dd100af5ad7a4138c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de1f606826feb2831462fc22552b1d69

    SHA1

    9d45adab11f630e85b805a1278e541cb7dcbf7b3

    SHA256

    788ff0955f43f002ff73bdad96eb83afd28a2e480f487b263468d6311d2e6afa

    SHA512

    b010af45143c2c62d39aefcb1ae4d288f8f39510b0bd6c81267ffe9fdd86d35f19dee12c2aead6d2afc335bd4b41694af5b61324d338746158dd89ca2a0ef293

  • C:\Users\Admin\AppData\Local\Temp\Cab6D47.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6E05.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b