Resubmissions

28/03/2025, 09:56

250328-lybnsswnz8 3

28/03/2025, 09:55

250328-lxrcvst1fz 3

Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 09:55

General

  • Target

    resources/freeroam/meta.xml

  • Size

    154B

  • MD5

    c48e3b6f06707b8cf45c8a9947afd43e

  • SHA1

    0595df5c9b6ab7de8ad62eb51b8f14b4e6ade7f3

  • SHA256

    1e8c0c7de3a5248a737c21747b91aed731b9ac5e63be95a85093d550570af7ed

  • SHA512

    f761aa7c4c112bf67f8f4e6c0acf058c7b2384307b65e4598ff33de3145664f874cea6619a6f7d996c9c752d7fba7584bf7bb70c3c7ab22d361418388410ec87

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\resources\freeroam\meta.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4781aa79952246fc0ae70f8a08c80be4

    SHA1

    88f8140c49341c2880097df20d149c57b412126d

    SHA256

    55f7c3242646dc62e504cbfac3e35355837fe849d764f43eb4d86f971d5d55c1

    SHA512

    0098556d95c3b2f5021481376b754a83554e0bb71f0bd7897abf2fa2c38f48bb97c4d0f356eff9479463d4bca0b98196cac2bb2e0f2d2e6b3449efb4758d3557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d29da3c8dae246d1ebbc657beeca1a02

    SHA1

    d4c9cd1ad0b17318408968a4ade3c6d017356575

    SHA256

    3cd3147461c88a2ab69e855625623e23a3401a060dc5bd8636b942eb119910ae

    SHA512

    d5da268562b20a5c030c34b6bda06637326f78140735bfc163b236db9f7c4596d41cb4a36298b3636755ebff74b72dc0b85c84d45d8c6923859bdcb281442878

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75ab55d7d94fe2009844932ef8a9deac

    SHA1

    dc1eb2e42362ed03642e2ccadd465544928fa146

    SHA256

    38c9b1240d258910a4e14791719447c0277c33ff1df1504b35547f81f1be3f5d

    SHA512

    71b9823cac655e2a4946cbacac89e25ff73f550706c7e8237d9e43ae93004f677f160d369e54786a3a5e812de9463933871670d59aa2147de74b2c6c8980b78c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ce7adb191943e6a412615eb9506e1f0

    SHA1

    1ad01de9ba876e05ca6d64567a510cd875317c83

    SHA256

    fc82d7c29e46778d5e1b772097dc5193c1d9c1a43a4cc24bfc5f8a6992ea5254

    SHA512

    978f3b30c4edbabc01f9459f1b18d65e61fe15239d332dd98cf1f9a5057ae33e2223fb0b26b11e54c810fd40b33dc7e105ea4e2c70788f3aacdb3cc25a60de5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f88ed414fb825df4749ae9e6d68bd34

    SHA1

    8cd5d8880311dc4fb2451ca6d784a09418a1aef3

    SHA256

    3dee9d255ca6f22cb23bbd886caacd9b50ca072f48be7bfb0d643ea5101e704f

    SHA512

    a5283561c1d3ba191bfb2feed81d2091795e215be0a1c2c32c647d58c4ab2ceda168d108dea7b21c375393046cf0ebfbac9429f13e5b09b584cbe34f9af98c68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba3c9a100977f0d254096e1fabec5d2b

    SHA1

    4bae1c93df89e27d1a50af1f2b07b48f47ef1192

    SHA256

    14ad5714dad7159ca20ed2f7e61d5ec274f5e6e87e8eefff936b21e338eda331

    SHA512

    7546536c57c2094a976801b2d68b826a43eae148f6ea3b069c6bfcaa1f40c8afa9db4c7d96a5dd67bc405431b1748cf3905d97e3df8f1d649e26ed3fb6eab5e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    697b0012e81d34e02d7ed54e7bfc90c3

    SHA1

    97551eef6acfb32b40ce2f79be45e840a534b535

    SHA256

    1c92e090dd5cd7242dde3697ce277eb16760d08ca2fe442cff399c1855145934

    SHA512

    eb0bc3716566cd3d1ce585a2e4ffd4c72f2f38a16cf7f6b29e46dcead7c4132ff80027e6c88967fdfd090cd45deeee8ec9795a38bcfbe8263d175b9696da94f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f0e7e8b570df13f70ae17f4e973ea24

    SHA1

    5475476f68cac9030cc1c2848b2fcf3b1222ac5a

    SHA256

    7e90afcad902bbf0f0f9220ca2a6bdb7827286307ea05209cba5a2596098617e

    SHA512

    705d56a387596a70c3a157b039c9c9574b10b10f933c92dca1aa36a0dae53d312045deccae80cd217c96d81aacc17c524fa24e93f1f62039df08ddeddc2098b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1806dffce69f339755c8bf536bca0561

    SHA1

    4652ea4d65bb7641ea59b18685aa1e819fdb8233

    SHA256

    c76a54241ddf9f765783f5587bcb1c2ce7f17476c7eee817dec0df4ba8d51e17

    SHA512

    7296cef31d010228144da92f5286701d73e94a4cf79b09be94049883035631e57a1dfdc993c0644b78567784cac2540faab5bcb4337a48be18cd11bac790a8e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4355f6d3d221c69362ef5f237d1a28fd

    SHA1

    538f4c23992e3fb4a40ca2b5973372d69fae694f

    SHA256

    68754c8c6486bb2a083e26e1db1175ff76d762521a1d0e3b43aa20adb0fcd708

    SHA512

    c22cd475e0e5419d5dffb47a57ccbc2e8b34a1d20d9ffce5417107a90cd861fb614a9d87e308d96a8ff32495efde7095b4797bfdd7209226decabdc9fe04b722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cdd800d610698752b5155192ef7803d

    SHA1

    7d7790c558e9c0aa4c11cffcad5d8568009fe952

    SHA256

    b7e14f8edec731c2371fc9b460d0754066b81de88a37474d6f679cb94261fe39

    SHA512

    0f3b0a87652f4173b8ba14026b624b92f06cd523a92aa855438c7c3ce0d565e420d6773db488dd78c5e9571714351718e5d35fa831f51b0479d8be0e3da24434

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82dfa9cc62c66ddb7dd981a4bcccff7f

    SHA1

    29318c395cd6022c789583c6996fe48ff75203cd

    SHA256

    d111190b60ba7357d8a8e8997fd5b56a97b1097e990625c84ef8e6e4694b4be9

    SHA512

    ca2d4b4fbfb95a4e3379af389967b18ff1d774202fed26735f00a3902110a8ffc6c82ab40c93e6ac39a95d942117dd40e56aa59c4ed03a58d1e83bdb44453b8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d97892a15da6a2c30d87d903493ae6fb

    SHA1

    cad0090ad287075ec6ef64a44c22071c9e6a9fe6

    SHA256

    880dcf192c09e059aacdf6cea2c05dad24861d723858f92fc2fc47b2151859d3

    SHA512

    cfecaed103ed74358cf61184a0bb2deada8f34efbcfacde242e32a18a9d23a09e4d95f0adb1e0803b4445edb3cae54615df720e30ca2ef37a343077adde387ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbe11d51b34e1f3746c3dc4c92c7ec9c

    SHA1

    f649ae2c100f2b407944deeff82628d74efcd0b2

    SHA256

    2101ba5b41421fb3f196cea98b19bf66caf0f40d56ca4bb5880bc1761eabde58

    SHA512

    999ec5eaccf4f09c2af70b894aa4c5ff23ffac75e3dc1c5f413a8b895fcb5e0163e06c91d5e4cd1627166e826110a96718954ba513c03bdfe28329a25220ddbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86c5c777b1947ab4277654fe6ae89b55

    SHA1

    d88089d51a6bc6da0ca0208a431b3905c9011c11

    SHA256

    32542f7cf150fae2ab129ced57e7aef1b8b18e37bb8d491020a7c9f5595de913

    SHA512

    e633899c524cdadb1d77d25110d6322fcc6d5344868b9be35f6176fac76a64c5305f2d0046833c6eb9628f23ad465089604ec39818ad14f4791bebf08117dc6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b398c6954822e987f9caacbcae9d468a

    SHA1

    0bca31c7ae0f99c87fcf53f80cb5d2231c836153

    SHA256

    3abe3a43e9dc710661b0028d0fb856ffe95eeccb6313cf3600633b1c0bb4d091

    SHA512

    c336e034e2295b9e44de333db982e65afd9ad62c13e683892ac79b80df464bbb303e764b84b01629f5664bcd7b98c6d223dececa7ea44f34b42df0da2069fcb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e984ed402fa7559ee99df58d735ce7b

    SHA1

    f2a05b1e71181ce986eef424b9429cc212d845c7

    SHA256

    877eb6cc5e7cc77ca6949d4e5312933908813fc497fd164592a172045e866f51

    SHA512

    a4e3c408afe7e2caf2ef666f87c1d5a336749459651bc6ce0122279a7a6aa83b0f5b60bed7fe2edfe6dfad00f8a675502423d9e79fa880b24d2c110cfbec9645

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ff678f06b128792fbe0b5675f679f73

    SHA1

    fbf43a04fb31b9329c526b2c5b6b4e8066132841

    SHA256

    16a35869b1ec7b4a9d4ced1f7c7793b4993cf53310b7507dd96d73c8f29c6014

    SHA512

    fcdffbe7cb274b9e99479b43671a21aedacf0a8fc3a2db00f8fc55825e8d3ee0f5c1e552a350ce6b30d8b71935ca19a8204b865ab6123e589d66c6f9fcf306dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1a70ded436c5bc49eea1cfb92767d3e

    SHA1

    d4855f17b68c60bf1a0bbef4ac34f4db49acf927

    SHA256

    25045bb42d0e50cafdf991c90b44b88e875f87b8d244d8fd208f84a7710c141f

    SHA512

    799a5e516b045fec8687633a866e274e2c847e6019ed03c17d03457886f229c35e0b054f09cda9d5d61c8058149e36ac49a9a0b84f8281d8b79a49ce7ece6802

  • C:\Users\Admin\AppData\Local\Temp\CabA1DD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA2EE.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc