Overview
overview
10Static
static
Document.p...in.xml
windows10-2004-x64
1Document.p...ce.xml
windows10-2004-x64
1Document.p...ms.xml
windows10-2004-x64
1Document.p...at.xml
windows10-2004-x64
1Document.p...me.xml
windows10-2004-x64
1Document.p...er.xml
windows10-2004-x64
1Document.p...er.xml
windows10-2004-x64
1Document.p...gs.xml
windows10-2004-x64
1Document.p...ay.xml
windows10-2004-x64
1Document.p...cs.xml
windows10-2004-x64
1Document.p...ts.xml
windows10-2004-x64
1Document.p...le.xml
windows10-2004-x64
1Document.p...OM.xml
windows10-2004-x64
1Document.p...er.xml
windows10-2004-x64
1Document.p...nf.xml
windows10-2004-x64
1Document.p...el.xml
windows10-2004-x64
1Document.p...ay.xml
windows10-2004-x64
1Document.p...ls.xml
windows10-2004-x64
1Document.p...sp.xml
windows10-2004-x64
1Document.p...UI.xml
windows10-2004-x64
1Document.p...rs.xml
windows10-2004-x64
1Document.p...el.xml
windows10-2004-x64
1Document.p...OM.xml
windows10-2004-x64
1Document.p...FS.xml
windows10-2004-x64
1Document.p...WM.xml
windows10-2004-x64
1Document.p...at.xml
windows10-2004-x64
1Document.p...on.xml
windows10-2004-x64
1Document.p...up.xml
windows10-2004-x64
1Document.p...er.xml
windows10-2004-x64
1Document.p...ic.xml
windows10-2004-x64
1Document.p...he.xml
windows10-2004-x64
1Document.p...df.scr
windows10-2004-x64
10Analysis
-
max time kernel
478s -
max time network
501s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-de -
resource tags
arch:x64arch:x86image:win10v2004-20220721-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
24-07-2022 15:09
Static task
static1
Behavioral task
behavioral1
Sample
Document.pdf/App Settings/WorkplaceJoin.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral2
Sample
Document.pdf/App Settings/en-US/ActiveXInstallService.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral3
Sample
Document.pdf/App Settings/en-US/AddRemovePrograms.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral4
Sample
Document.pdf/App Settings/en-US/AppCompat.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral5
Sample
Document.pdf/App Settings/en-US/AppXRuntime.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral6
Sample
Document.pdf/App Settings/en-US/AppxPackageManager.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral7
Sample
Document.pdf/App Settings/en-US/AttachmentManager.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral8
Sample
Document.pdf/App Settings/en-US/AuditSettings.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral9
Sample
Document.pdf/App Settings/en-US/AutoPlay.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral10
Sample
Document.pdf/App Settings/en-US/Biometrics.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral11
Sample
Document.pdf/App Settings/en-US/Bits.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral12
Sample
Document.pdf/App Settings/en-US/CEIPEnable.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral13
Sample
Document.pdf/App Settings/en-US/COM.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral14
Sample
Document.pdf/App Settings/en-US/CipherSuiteOrder.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral15
Sample
Document.pdf/App Settings/en-US/Conf.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral16
Sample
Document.pdf/App Settings/en-US/ControlPanel.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral17
Sample
Document.pdf/App Settings/en-US/ControlPanelDisplay.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral18
Sample
Document.pdf/App Settings/en-US/Cpls.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral19
Sample
Document.pdf/App Settings/en-US/CredSsp.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral20
Sample
Document.pdf/App Settings/en-US/CredUI.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral21
Sample
Document.pdf/App Settings/en-US/CredentialProviders.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral22
Sample
Document.pdf/App Settings/en-US/CtrlAltDel.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral23
Sample
Document.pdf/App Settings/en-US/DCOM.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral24
Sample
Document.pdf/App Settings/en-US/DFS.xml
Resource
win10v2004-20220722-de
Behavioral task
behavioral25
Sample
Document.pdf/App Settings/en-US/DWM.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral26
Sample
Document.pdf/App Settings/en-US/DeviceCompat.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral27
Sample
Document.pdf/App Settings/en-US/DeviceInstallation.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral28
Sample
Document.pdf/App Settings/en-US/DeviceSetup.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral29
Sample
Document.pdf/App Settings/en-US/DigitalLocker.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral30
Sample
Document.pdf/App Settings/en-US/DiskDiagnostic.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral31
Sample
Document.pdf/App Settings/en-US/DiskNVCache.xml
Resource
win10v2004-20220721-de
Behavioral task
behavioral32
Sample
Document.pdf/Document.pdf.scr
Resource
win10v2004-20220721-de
General
-
Target
Document.pdf/App Settings/en-US/Conf.xml
-
Size
10KB
-
MD5
797657fcfbc025f92f896b0095d1f6e4
-
SHA1
f357f8b9a9671f711eae5beb7759a2ef73b953e9
-
SHA256
032f6bb5fba082ca24ea70f6cbdc25e913fd43b68a44582ab30aeb29509fc2ed
-
SHA512
9c90fee9737a7f66cd50b43c30a2ba05dc861a76618612dc744f7075d3296dde577589060d3cc5779e44ca14add42502420dcdf9a68825817795fc89418847dd
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308d4eb4709fd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c462900f48ae714cae0346dd4284bdb900000000020000000000106600000001000020000000bcee182034ecb8cc60b230edbb88d82fd9031706d9418c4fd1d29d71a7f20222000000000e80000000020000200000009190ed52d570800cfd81b3498fd40ff6ec59c80cfc8b7ebefcd27ccdff382efb20000000a3d6b84c0ee3a703aaadc3e255efd0c145ab40fa88ab2634b1ef003b175b86cb4000000065c53ea720121496ba2031ac11dd909739b5bc8044483c19e37d7f2f7e338558df4c1e4fcf60789aea84268d4cfd09e8a3fa59b985117fbbbf6b15d6d3cc0ed1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\de-DE = "de-DE.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "365440883" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407f42b4709fd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DEAA4C32-0B63-11ED-9263-E2D23FBA5729} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c462900f48ae714cae0346dd4284bdb9000000000200000000001066000000010000200000004b2413acae578ba9969034432c672bb2b0e423489401556187bc5c48a91c3dfa000000000e8000000002000020000000679eb6cb31ac3a236f27ef3df7794055aabf342f418a0aaf2114cbe325f7e41c2000000040ce1e3f0f5b38a73b3f39a5c731d23a33cf5580dc6af202ba3fc0c01715cfd340000000860a82f735a6ddafeca560b00fdd4ccf4089391543e9d2b23339d33765bba1c5db590d5c39f6e03282a145319545c2e442fa6bb03c18af62b9d7ee2d2e9ca180 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2432 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2432 iexplore.exe 2432 iexplore.exe 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2356 wrote to memory of 2432 2356 MSOXMLED.EXE iexplore.exe PID 2356 wrote to memory of 2432 2356 MSOXMLED.EXE iexplore.exe PID 2432 wrote to memory of 4316 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 4316 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 4316 2432 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Document.pdf\App Settings\en-US\Conf.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Document.pdf\App Settings\en-US\Conf.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2356-130-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-131-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-132-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-133-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-134-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-136-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-135-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-137-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB
-
memory/2356-138-0x00007FFF20550000-0x00007FFF20560000-memory.dmpFilesize
64KB