Analysis

  • max time kernel
    116s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 05:46

General

  • Target

    irs/images/noti.svg.xml

  • Size

    656B

  • MD5

    627361e7f33ba48cd231cd59e2b9a309

  • SHA1

    039512bfcef1d44e22b5d4433f34bb713a9949f8

  • SHA256

    3780ebbc08342857b88aab9941cbe8158c0ba2e3eb76755daf3c7377af71be65

  • SHA512

    2a8b967d038c48e8d54c96edd1002fd4b08a642af87c39677123ff6fbe34b02c1a46a1e8e3811b3b28bd3389506a283c25ff9e5456ad5a79669a525262092980

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\irs\images\noti.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1UDO04DI.txt

    MD5

    672968ba3963e20fa6507d7fec878772

    SHA1

    b36b212c733fb98aeb2df110af239d2034fac749

    SHA256

    bfae90c53313d33adb0d9efbe23f29b4d7ef2e69783b804aa9eb50e3efbb05f5

    SHA512

    445c62cec78b3a84716cfbdfbc5611fc63a8e1a044f691b0f974206d959967839de31fc17d0737d885f082329e96624407e208ce518b9649c3ad2b1d48065683

  • memory/628-63-0x0000000000000000-mapping.dmp

  • memory/1720-61-0x0000000000000000-mapping.dmp

  • memory/1764-64-0x0000000000000000-mapping.dmp

  • memory/1972-60-0x0000000075AF1000-0x0000000075AF3000-memory.dmp

    Filesize

    8KB