Analysis

  • max time kernel
    135s
  • max time network
    216s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 05:57

General

  • Target

    dhl/dhl/images/img.svg.xml

  • Size

    1KB

  • MD5

    3fecc9db35d5d2a9e6e71ab4b02d22e5

  • SHA1

    628ba2f505b480097445aaf08649a08242bd6847

  • SHA256

    362bcaa42090e36611031bec6bdaa0600375ef847092cca195c58d3bae9b4419

  • SHA512

    c0d70d0f914d3d9f29366c9886f174580675334ec79ba77158c4cf184075540dd7d25b3f35f7129c1fae764527574daec29f5fb8434817ccbef6951b332cdd5e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\dhl\dhl\images\img.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2CDT8JKZ.txt

    MD5

    9234302c54efcf95b2839952f9864733

    SHA1

    96b42a765529aecf344bee3b1f29436788e90299

    SHA256

    ec105a323a5190f37a9a96eebf8584e437cc6dbf8c6cc7f21b017ab6ff1b5b59

    SHA512

    73cfacfc7f36c1928c98a166b358d85c305f9f806ca07aa53c5a88a75420f3da3bc0ea746d0758a2337f673e83cf4d85b083a583f16900e5a9cd3882c43beef3

  • memory/520-60-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB

  • memory/1680-65-0x0000000000000000-mapping.dmp

  • memory/1680-67-0x0000000000D80000-0x0000000000D82000-memory.dmp

    Filesize

    8KB

  • memory/1748-63-0x0000000000000000-mapping.dmp

  • memory/1748-64-0x000007FEFC051000-0x000007FEFC053000-memory.dmp

    Filesize

    8KB

  • memory/1892-61-0x0000000000000000-mapping.dmp