Analysis

  • max time kernel
    150s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2022 13:50

General

  • Target

    mxstatic/image/backhome.xml

  • Size

    16KB

  • MD5

    17236715c4c14583fc0048cc6c1322d8

  • SHA1

    8fd6ca1b2e487d37020b2744dcb447ab8b1a3114

  • SHA256

    cc508f161ce1478dcba8691894444ecda9acb6e58a69e7c03166f257002a30e3

  • SHA512

    adb6e701187df76afcda9e8b8b0495c818f3209d106b69fd60eb99f9df76d58ef7bd063ae19e500cea82e8fa94483db002abfbadb0a98f7804cc8edf14e38481

  • SSDEEP

    384:msZo5oESEKmf4CLWU6kToryvCrTWKm0F7FZbUpCc4Kr5wHzLix9dF0:1Zo5oESznCaU6kToryvCnWuFBKr5mOxe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\mxstatic\image\backhome.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PI9L9P8C.txt

    Filesize

    608B

    MD5

    61dce42e4ee6241cf9b846918779f854

    SHA1

    c70ff227f52dbe56bbd60f819588d11183f6d74a

    SHA256

    04e0d86a9c8fb0f8f2063323e1ea9e3975d65aa6b2fc3b733e9052b621caa106

    SHA512

    0b2f1324e90e70e516dd84bf9259ba306ed745f4b22cbbc91a268510976e872513a557d6abe6f9ad7f100b58e1588b4a5a0ac6ef8404418858d48eeb9f91385d

  • memory/240-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB