Resubmissions

28/03/2025, 09:56

250328-lybnsswnz8 3

28/03/2025, 09:55

250328-lxrcvst1fz 3

Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 09:55

General

  • Target

    server.xml

  • Size

    1KB

  • MD5

    9f0f663c19d988162d23e986c9ea0e54

  • SHA1

    3d58087f65116b7f4ce634f87bd02631d3ef001d

  • SHA256

    01b11c8a98216a839b017eff11bfede8e96ee180a9c4eab75e11919b1436a7d9

  • SHA512

    f73431f256615d5e984bfbc79372c9108fd7f95079bb62fcc0838a182b9881e6b61cdc2473190a19fad3dfa10f46f41f4ac1d5777bf79d28dc82593584b6ef22

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\server.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac4c76c4408e979b1c75a4b64da88acb

    SHA1

    d9e90443c904751c7eebb30c7cd2d39948002183

    SHA256

    d85d36e49dbeed81b7aed843406b06f0b47a1b81f8bf288c2fcf5ece6837c1e4

    SHA512

    cee9811182a9b82ebb7483ef758be7748942be12d0de26d4969bbe2d5a80f7482f6a6c67cf46e7243556d73c72781ffcf42943b2099ba1caab868bd99d285227

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    700a750bd74f83abb72cb8b4b57cea53

    SHA1

    4cc94113321c8741be8e98a306105a05d3b7cdd0

    SHA256

    4a817c033e915eba8f0430c724b7d4ca12e51618e5ac2a327b514821578926ee

    SHA512

    d526c1300ba72ba85bf8ac8988ec2191995f215e39719a310433bce920b4e7e61b2742c4866097afc5c558382fc7e4fa7df818c26aee79d602e24838c0e8a398

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4fd434ca6259b476421a9493e256926

    SHA1

    2e029f25d1cd5a60418157338d5e7f0f01372ec3

    SHA256

    1c457e0ca073feed74b7c224cff1c7b6cd0d45f88721cbb5489e9c8a3e111aa3

    SHA512

    0c5e7e71726946001625fd8bd0da9faa5f9e460ccfe99a4f6c489f649eb0fcaa52a3f92d7458b553cd8e54fecc0975c86eac100dd0e4109f2b2f109ee7cdb0ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    022d327b9015169068cbd399ceb111f8

    SHA1

    fcaae1942d646723d314a49915483691e7215625

    SHA256

    99db8855c3bf78c2ac0f07ba5c3698adbf1f6515ec4e858737fec6f637e4bd64

    SHA512

    6336412e801fc4cd6127d7c23306e1df7763e946b22c578c5d3a10bf8f37cdbd83673a296cca16f04df1bc4fc74bea2e3c7cb6ceb6d4d7cb741015ef62dc6254

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8e0eb4855497826c66aa6bd336b15094

    SHA1

    69806c9d3525b6244456f1ab77eafea002fa43d0

    SHA256

    f79e9e8247fc50fe0624d0bef58985b0fd4b997df3797a04095ba9c65b6a70b1

    SHA512

    b82a99f4266a46c3415a18e8b87830c0c0a140d964f30188728ae26d52bcc2e742de9a3f16cef7f1fa260eee889d38b52519984bd80ff1739dbf2bd42bfe3347

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ad032f0513be84c9ae6f5afa660ee71

    SHA1

    63b893be4ccff566b1df8fe3323d72d6778c6800

    SHA256

    ae49dd2117fb637013c85c1fa9ee3a08065397abb83cb14570faa69fe7f79a53

    SHA512

    b2ca9b84fc2f84a06596f5a119c05f132687379b113176a5955d5eca22e978a8106529505308e9179245a18b876c38e8272378e271215ba739f343a1151498a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43b2f851643feb27e2d35c24ebb5787c

    SHA1

    212d8fbce48fea3440f3e3360a59af0b52c64c09

    SHA256

    14fa099efea4f74849ff11a6cb03fdafbff5dfd0f09bdc4df044fab6c2933248

    SHA512

    0e643f8ca6c8be491ebccb757a3e7e116da41303f5ed6a0e4657d10eb1aa0fa3aa8385c07eca2e8b9173b20fbaa5c4c98309be9397c39ad1ec648390f8d426e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d44669a89ae0acad4029d8dc40d1848

    SHA1

    09f4ecd968cccd96929d5254317948230149db99

    SHA256

    b383464d5649754add897cbe7576df122dfca463f76287412e89dc2c519515e7

    SHA512

    7944024f35d3d07a29421a846859c8ab196486f99fb54248337a3fb7240475c7bd773ab044a4cdb94a139b46947f78d00f21a3a9881078d3d1ebfba660b5f53b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a496c05f81e98e712afb385512c53ae4

    SHA1

    864e1f9468719941ee8a8b4cd9dcb4465580c725

    SHA256

    f6adf4368b41a572722eb4c04056b0fd11a5646e0f663f0798e57ab7fc41d213

    SHA512

    ca17cee7a5356c16da3ca779c444674397300be6de5a3d179a0285fb06d9534f2b65ca32a4aaf3e146b436a8f1716d7dd8e31adad04df17418ea14532e61cf23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1cc7372641f14dea3d8899b8fee4bad

    SHA1

    b2783ea6c5e3c80833ceb42394f76d8eb54e27d8

    SHA256

    9dacf37c0d2b87965b0fe5ad6094accb98526446b5a20e465e5806c18f928103

    SHA512

    d9df026dac1a750763e6cbc003763c9f75723dc7dcb135b4d0c627ac8a205b4839f02a0963fa13aae698b6f581833ca48da7b45fcf18a93874790658e66a1991

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8114603c5f9e652de4147b0c90e2cf76

    SHA1

    873e883c5afae0a72a4ab5723315127f287db659

    SHA256

    b22907ab85d7b77969f62baf3941e1c0b263eff5804ecf0d06af1dacc5b9b408

    SHA512

    4d6303ec6f339adb33941bae9bbec9c32c9f7895cab427a8261403a760c8a3ddc6f4b8b696d877348cecc8d8e04eb958261f856f78d22ae14bec3f31dc81ff67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c45559131cbdc12cd9d1de43f0b93f66

    SHA1

    6856fea1996c0bdf94ea2e97f004b1522d387574

    SHA256

    e9fcd444057feceb30105061a5fdb096b604dafdc5180caf6dc11cd9fcef12e3

    SHA512

    a5e2337578ea87a8b5f2d3d1c58a3fbc8ffb4d50c1082211356e680dc2e433dc2bc95fbce81566e88c1e19dcf516a7c31a9080c48a041d8c3bb1aa7ba008d5d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fbc530d4a23781fc95c29eae484ae1a7

    SHA1

    7afd757dab4b48b24fe6d4d8db7aeb9b14dd4fe1

    SHA256

    3db5dc3ff47628c26c14579ba74db02bfe37e4043f9dfbdc3e28ddf9eda05017

    SHA512

    d5bcb43f062e63de84a3842a15f738526326e22f82bcebb8b099cd41fd0837785cd7b6e5033f0696964dc7bb57805b00631bfff16bf1ca18ab3af2621daa6507

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6404d9d5d2e27b7e8a5aec9d974433c0

    SHA1

    ae78a4b58c67c37f7ee741273d51a4eab9bff38f

    SHA256

    2a871af97c5ddb779ddafcc4450f48edaf6df6ba465a6a7606cf8e3f5b177096

    SHA512

    2a161efcfef1788080dca665216793b86b0eac8f290355cd329213aa19bb6797f6ba6933546e88b86f46a7dbc1ab1afd72cd8876cd2f3fda2be6cc5f011b4f47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8619cb7a1a219eaa1c0eb44c579f15e0

    SHA1

    2ee9b9afcb631eec4bf4e857e623e30bfa4d78cb

    SHA256

    3494bdb80c54a1b1832c70a1a3482c8f91867f56530083dd7a73da2326a76d52

    SHA512

    616e01f9db9deb0b0f1df0e521b9eff69e326898e31de67cfe5182af30bfdfc97e9d8d12a9c7e5471560a9f70938e73b97d080499cfc708bf0d0f55790df19b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80fb8ef782d0e2323fca07dd348d5ffa

    SHA1

    4d50b899f77e943f0d34b4af2da8d47312ab0be0

    SHA256

    ed5aeedc4af71d71e36b26c4c924c0cd278e299f127e282bec1f33c052548af7

    SHA512

    4723188af824e939123ea3f766384943a06d5818f0f14da09ce9c2d8277d706a62aea4e00217072596ca1193ca718600029cb8e8ad97d822fe356013a56dc14a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a40c251d388712693655f4127b0ec2c4

    SHA1

    a39d2dd16a102c7db05817fd080ec4b2d103d14e

    SHA256

    7cd39572f2f0b61fb2d3cb81356d876678e24ebe2dca0c636874fdf72762eeba

    SHA512

    eab68b53dc738389a16ca32ef8c21db425873a78e4aa4beeb30d28981600fc49f374e41ebfa9a41fd07444ee65d616d67875312da261d22578091c07c0fa55e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3be4fd7508f7e003cd1cde3ea8604e85

    SHA1

    e3628d10625795b1801549d9f370f2e64826e624

    SHA256

    db61681be0ff3469705183279b64030a7a0443ce1f1297a45e42765fa3c413e7

    SHA512

    58a35b8e9689bab0983d96b818710afb6738f5ae1fafcccd5e4f0256be5b6f0213c7a136332d2651f75e7c7196d27d56a77e5c783dbcab30a9436340dd1db780

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1ba752e3992ef51724929c75618aace

    SHA1

    bf32b79054eaa2e3a98a5d30769c94362d230edc

    SHA256

    c0165f8442c6b11cdc05912c6f5b68577ab4e22b1b4d614cd2851f12d45f2eee

    SHA512

    58c7e12b583d2b87fcfc46a895304cbe9f79cc86f98cd5410a9a8daf6894bee7fa51d385fdeebf33cfaef994e24a2e200bc3d7f202295c345fb51d074a3e4c9b

  • C:\Users\Admin\AppData\Local\Temp\CabA8D0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\CabA94F.tmp

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\Local\Temp\TarA973.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc