Resubmissions

28/03/2025, 09:59

250328-l1brkst1hy 3

28/03/2025, 09:58

250328-lzqjcawn16 3

Analysis

  • max time kernel
    359s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 09:59

General

  • Target

    server.xml

  • Size

    1KB

  • MD5

    9f0f663c19d988162d23e986c9ea0e54

  • SHA1

    3d58087f65116b7f4ce634f87bd02631d3ef001d

  • SHA256

    01b11c8a98216a839b017eff11bfede8e96ee180a9c4eab75e11919b1436a7d9

  • SHA512

    f73431f256615d5e984bfbc79372c9108fd7f95079bb62fcc0838a182b9881e6b61cdc2473190a19fad3dfa10f46f41f4ac1d5777bf79d28dc82593584b6ef22

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\server.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0687b2be2422b0b8e32dcff0c6429a5

    SHA1

    2226145449c2fed12379663f820feb65516c88ac

    SHA256

    4fdd82def368dc6a00d414695d1ea478954ed4cbabc57422219700c5e1b6d31e

    SHA512

    b276bb4fecf50521612ffb5a9096a4f2164239a7e18f0479a740c22d68ac128e9bb15c6df5968dce8c8434bafd19e1f6d4d9eb12637f82981fd7f5257a941a8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03546e1664486abddb25681f5e8b0821

    SHA1

    7beacb7dd70a5d343be77579e26924ee8c8d1b87

    SHA256

    7c24e7449a36a5eccd23ece9fa62be65d61ced96da00debc7ab85bdda2b1bdab

    SHA512

    2cec718dd29d30815632391a683ad836f71aef4198a3cd8a071e1536e4f2400e45db73b3e2c5ebef9b5f60b1ccfa33fe10eb250d2cafb2c4e8370459fcbf0ae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c08cfe25c29c022824cd3f872253786

    SHA1

    97bf552a2cf62a45535849de7327c262b052b0dd

    SHA256

    e399e6db8e6d8dfc343eb9d6a8c3d2cff205aff744b9bd4581384b94c66a73e3

    SHA512

    e9db333c0ad49c753b5512e78dbea8d8c4411e5e891b6f305f7c428767d253e80273eefd1aee5fd25cbb92c5fd8165da330c3858b59ae9e4948905c0c10463db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35c7aa342a70f899da50d20fc0f0e780

    SHA1

    2b19753677af816e8ceeb1fbc73540d488b0c007

    SHA256

    7f39b653d741ea7e6b800113be305f671cad6d06f762138369df711442572e07

    SHA512

    cce43ec740025eb28b5c245a0a1ab97c9612f5a053187e5e4548aa65fc64a1f058c63b3e7c3d33d0e418d53723d5a41d75bb3f0ead7a9f52d64d0c23f755ceaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08f81175cef1bf7ebaf4d0a4798d91e9

    SHA1

    095249d712d53e2482dfece8b07fb85cd0f57c88

    SHA256

    2c16737fd0a5524910f47daf282bcd168676cca836deaab53171dcc07a37b3fb

    SHA512

    42642b752e7949784fc6e732baaef619f749a9700aec00a56842b6dfcb8d52c763590f410735c64175eb45d033fce3ff79b82db9ae02001fc70336652b1d2b44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39e8c1137a362c6d90fed5e194745ed5

    SHA1

    28ce2ce792364bb6bf30e582f3fddbe0d631329f

    SHA256

    cf5b1d5cb5005d00ed3728d1174f37aafd73794a4b8f29e193b008e231c821c3

    SHA512

    82c4694885dc14cb90145389e67b2fefccbb2a9f37f89052e240a0c65102cbc4eef196bec4e9528eb29892eb0294439bbe4ca5926acde66cb9a761b1f7344f1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5722188784df2227c85f1e7524f84313

    SHA1

    e23b563e4787147ac23d3fc9d9a39f72e9a44608

    SHA256

    c3e405a939a1d936f2493f3cc04c473976733a9418c5cbf9941adb7349548b9c

    SHA512

    f13999867c37fd80da25e2fa7201e6653c3719f9dbc33b48470a0e5f2d1d06b8e18969b6a6f90a636d012885c5b5e4044774aed703c6b0890f64aa45119e861a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f1c173897da27911e2e6e21cf53f201

    SHA1

    d1426b7d99cba92ca817ef73713732cb71bfa200

    SHA256

    fac978fdb240460e398e99527ae7ce4b486f606412b7c193ea1f502c636a7c05

    SHA512

    ae2f7ffed67a4ddbc6064981655396f491a2a31425a0d855af9a797d863832774b1f6023a7388f477b764ecd24cc637ae6656c95473e68138430d8e002a7fe2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13586a7f297c2f881414deea82061084

    SHA1

    e19b5456acb0e3d2bcc26712d94436c3f95fd773

    SHA256

    8894d4f7ce5591c083396e0fa13fc180598aebcaa84509f7e5cf618609b78af3

    SHA512

    cb12385a102934c93730755320ee0fae3203f1353ba41f98bcb089fb3e70e3f13bf36a6048989ed507f5bcbedf9cc2be8db26f0a5fba79f20fba649b27077c76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    756bb686e7ce19db4077749eba4492c1

    SHA1

    fe5a2d0b112be4702c5c2fb06527023d581e7c8b

    SHA256

    acf2db1fcc624a2bae7c05789af4d3f704cd119f984d59a3ddf54a7b05252fa4

    SHA512

    1b5c0922406ef4b153023147f3762123d814f24d07d4a28a0fa364edaccb5b9fd9941b6ff4db94b242bb18b7c196089a1a54d4a2ee37471ae8f6ffab4abbce58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33c2beb8ac9e025e9e4d1094c5d1b26a

    SHA1

    aa741698c84d5f06a71ba2f9413bebf92f3138ce

    SHA256

    4627eea4a9cc5e71a84c62a8fa039eceaed2fd298921ef9d509260893ac21cae

    SHA512

    9da8c412078fe6898f1bd4311fad268d69fa5bc6413d8b2775521ff6d19f7dc349674cd1094e01051c0a66a4e107d97696de003fddf2711486106b288a2051f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a357b53a26250b7ca90c2a3767a7bd81

    SHA1

    53f40a5d46faabafbc4a75c1fc0afa652de677ed

    SHA256

    11d96619a64ab7ce05cb6f11511d77c7f2524e6adcb14e3745cfaab725b6af4e

    SHA512

    8737fc36c4a9932be7be7b73dfe8b3ebf171366cfc9d7c2de14d55a6df2c7aa53f5309157a4bf5a8635460811569992f18b6b618f3cc6c723bf649b948465690

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f4058c333bfafec9255043902db15a8

    SHA1

    cacc89a8279bca14e9cff9cfbaed2fe3cdf26022

    SHA256

    a4c5910a9e20753bf5b008e3d70b2181e2a28ac76221bae8abab3071de0b5cf2

    SHA512

    cc91b90edbc3a25225bf4065563dce78e6cabdc9dd295b291455142078ecde5287e3ba83ddcf3a774d9429c38ece33db63f33c0985e015a0a9feb4e7592b5eb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13d28bf728ff618c1528748f241efe82

    SHA1

    2bf8220f1280ed33ae1d4d145b26d535224adf67

    SHA256

    cae316eaeef05587e488316fb79a331c0dba8d2aa614733b41e46ec37fedebf8

    SHA512

    5a42dd189e98e0bdee8e4721bed25edd5638105abf396cef329f862b3c9cfaed3fef30ac6478db8f3dbac26615ff897ad3130f836a274ebcf9fa0a7345288ea4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d38a08c3e3121d359122cd5e39b1e3e4

    SHA1

    dd8c6f3af8dafee0818ab4677b74f863c2dbd198

    SHA256

    d413f322630ec99e23933d189a5267d31586e1a89b70c8c470145e9a558b9d2c

    SHA512

    2a36ce8fa900a7d8a9c2670c03511ae643b0c65495c67756b5e53f19cfcb058cd5b1767fec2e95eda4d86621894e49f30d980e976a38622e7747718003c8e3ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8afb997804d374ff9dae7a3497d7a420

    SHA1

    2d871a75f4fb1706502762ca74dd587ca53d0639

    SHA256

    e4b68f50a34383858e5f80cc6d586055e6739039557ba55c78c5284c398e921e

    SHA512

    372f259fc1ec91467f2f7ce005145388fe8aaa84c584615dc4552b9bf7247d20b3e80bf83fc2542b6ee67add5d0f7ec917c041a4a5648ec2de1bf9412842b1b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd2e6970876b9238334b65e67f5750cc

    SHA1

    6ff022a3194860d8b4aa7f0d6ce0fc8576579e23

    SHA256

    9b318e5101272d7a4346669e4e8409adad8bed8099d0331923576fb7a9c21999

    SHA512

    3dba599883bebbbd409253f1f212875368e7a73992403e30723fcc700c2457d2daf08d2f3f62cfec9a668d8d9c973d9577504abb72e37301851d1654fecd398b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0af50171701a7ad1f91fb134c371fcb4

    SHA1

    99f31985645625f40d1c58254ed2c2115ebfb74e

    SHA256

    3d26caea8399dd4f9ae19dafa6156dba2cc33c7a16c7c56e7910b6365e96a287

    SHA512

    47bb031fc280e1895e53c6ee19516c930451e07ce903d1b2d0b4096d3ba8542617ea12cedce39a68b57c5c74e057c344597c15279a7d4dea84a12dc4ee830291

  • C:\Users\Admin\AppData\Local\Temp\CabDB62.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDC08.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc