Analysis

  • max time kernel
    132s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01-02-2022 02:34

General

  • Target

    cSi1r0uywDNvDu.xml

  • Size

    4KB

  • MD5

    eefeb76d26338e09958aae5d81479178

  • SHA1

    c400e10a8f2b5b62f919033e2db0a1f99b1a3c38

  • SHA256

    9d52d8f10673518cb9f19153ddbe362acc7ca885974a217a52d1ee8257f22cfc

  • SHA512

    dec10282cfbbbfc623f98576aff1a004627de3469ca780b454eccf365683ddfddb1975d5482f63ce6373267749706772b566aa8a219ec30d1ed7463d4a49da4b

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\cSi1r0uywDNvDu.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cSi1r0uywDNvDu.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3196 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1120
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
    1⤵
      PID:1944
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 3703d767ecaff4a17af39bea141a5d96 +zGoLHiLz0CrUmPjnQRisg.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:2660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3380-130-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-131-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-132-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-133-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-134-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-135-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-136-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-137-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB

    • memory/3380-138-0x00007FFC6EC30000-0x00007FFC6EC40000-memory.dmp
      Filesize

      64KB