Analysis

  • max time kernel
    125s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2022 10:16

General

  • Target

    Document.pdf/About/SkyDrive.xml

  • Size

    2KB

  • MD5

    a94642be85e83bd11fe2edc8ee57a052

  • SHA1

    cce07bcc7dbe8bfef8f9397c8b6e76b96ddc9aa9

  • SHA256

    da3489644a56924340c30ba06dca8d02ac68a772c1971ebeedfb07767ea6f1ee

  • SHA512

    cfe4f318b08c3924c51eb679541b3a8d8d36cb47ffb5ebd9d979d254c1cba8782dfd8757f748944967392608dcc1775fdf82b9324b03481314b1f661a085b733

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Document.pdf\About\SkyDrive.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:656
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:756
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1716

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NQ5XLY06.txt
    Filesize

    608B

    MD5

    de98031503f58fbc3a1fcb72ea36cd30

    SHA1

    cd95e6b6968237120e323dbe8f90beb589cdcaaa

    SHA256

    5b287ee2fc5f76b3277f607eadf05a543f2801869f29067e78f19e6a533a3b76

    SHA512

    5b853ffaa0d8810e6950ddb7e681de08716db82dfa12176ab087e333c358fe2542d6ddd5a06f176dbd58fb1143793c69498125b2652ffc803d384f6301ad5230

  • memory/1596-54-0x0000000076461000-0x0000000076463000-memory.dmp
    Filesize

    8KB