Analysis

  • max time kernel
    136s
  • max time network
    226s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2022 18:57

General

  • Target

    WhatsApp/About/SkyDrive.xml

  • Size

    2KB

  • MD5

    a94642be85e83bd11fe2edc8ee57a052

  • SHA1

    cce07bcc7dbe8bfef8f9397c8b6e76b96ddc9aa9

  • SHA256

    da3489644a56924340c30ba06dca8d02ac68a772c1971ebeedfb07767ea6f1ee

  • SHA512

    cfe4f318b08c3924c51eb679541b3a8d8d36cb47ffb5ebd9d979d254c1cba8782dfd8757f748944967392608dcc1775fdf82b9324b03481314b1f661a085b733

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\WhatsApp\About\SkyDrive.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1740

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O7P6EXNS.txt
    Filesize

    606B

    MD5

    28b3a74ccb3d4df34a009748c525a7e3

    SHA1

    7fa7ea58e2b1f7d1b832fbaa7fc07d538dae8a6f

    SHA256

    03944ab487f19d1946fa232457f137c252f7481903fd8d8c802d88151177a3f9

    SHA512

    81d508f0b6b58d78afe42bacde1f683e65fbfe219df34373dd381d553cf9679ffa5b44c709b343147fc4150f93c7437fca4c0f516071fd9b8d502be0d4bdb1b8

  • memory/1860-54-0x00000000762B1000-0x00000000762B3000-memory.dmp
    Filesize

    8KB