Analysis

  • max time kernel
    471s
  • max time network
    494s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    24-07-2022 15:09

General

  • Target

    Document.pdf/App Settings/en-US/CredUI.xml

  • Size

    3KB

  • MD5

    1c00f0e54b646baca8571fc0b7be9582

  • SHA1

    0494d0849b95970d96e480c9b00c3694e4d50029

  • SHA256

    625371bba40530a9a4a88e167b4870634f7583bb601d16954ed8ff4a0e5242e9

  • SHA512

    99a2b51a6addf470b15dfdc2d3d32ca305113c427cdf7c3b85fd3bd43f17b989b5bea38ba78821da5a8978437dd3e484ccb283d9b01b737c05c4b7d82288d749

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Document.pdf\App Settings\en-US\CredUI.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Document.pdf\App Settings\en-US\CredUI.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4532 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3480-130-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-131-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-132-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-133-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-134-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-135-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-137-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-136-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB

  • memory/3480-138-0x00007FFA91CF0000-0x00007FFA91D00000-memory.dmp
    Filesize

    64KB