Analysis

  • max time kernel
    119s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 05:46

General

  • Target

    irs/images/success.svg.xml

  • Size

    513B

  • MD5

    7ba2c7ed2d27cc893b31d1689324ed2f

  • SHA1

    258e44e65d4ad780c6b86b8d3df1d1420264627b

  • SHA256

    aa73ecf6d7a0055ee569c7d11e1223342bfd53d83e137830a60cfc99eb5347c4

  • SHA512

    5b4a3715e650b024003c5767e0a87dde375267f407eb8b0c0c3a1da7f3d6cc13a6747f2052d30550221832be74e16ce4926cc5a64cec2c3e3669689194dbef86

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\irs\images\success.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5SKCHRUA.txt

    MD5

    dafe24a5d64f93dfe665518069a0fe38

    SHA1

    a0ce3c653231db7e9d707f203c0873d901e96786

    SHA256

    ce08d8c15dfede35f656ce2e450d1f0fa7002874ee90ef6289d953c431311694

    SHA512

    6fb27e8e9c1fe59ea9f9b5742e89dc1aea3d69175fbe1f873f86022722a2418efd8684548774a98f6a03c4ca163a1141ad016eeaca5483879c0bd4487481a562

  • memory/1012-60-0x00000000769B1000-0x00000000769B3000-memory.dmp

    Filesize

    8KB

  • memory/1632-62-0x0000000000000000-mapping.dmp

  • memory/1632-63-0x000007FEFC0C1000-0x000007FEFC0C3000-memory.dmp

    Filesize

    8KB

  • memory/1680-64-0x0000000000000000-mapping.dmp

  • memory/1968-61-0x0000000000000000-mapping.dmp