Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2022 03:12

General

  • Target

    supportboard/supportboard/media/apps/aecommerce.xml

  • Size

    2KB

  • MD5

    fa621e37708cac3d7ca8d8b258734580

  • SHA1

    9b94865e58d7bcc583296d998063b3db67cbf1ca

  • SHA256

    4e03e082ffc2c4c66ae3f7541bed41fc04f6db49dee72d1403d8ab889c83f7bc

  • SHA512

    70c5681ac86cc35279526e7d39dabcb3286ad0e1313f851b772ec49cf1075777899cfaa54d7dd163836b148af4518f8d776ccca29ab84309bb56a8c693acf1b4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\supportboard\supportboard\media\apps\aecommerce.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\supportboard\supportboard\media\apps\aecommerce.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4844 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4868-132-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-133-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-134-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-135-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-136-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-137-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-138-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-139-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-140-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB