Analysis

  • max time kernel
    135s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2022 11:23

General

  • Target

    Document.pdf/About/en-US/AutoPlay.xml

  • Size

    4KB

  • MD5

    935c602dad3f4335bd16c269e66dbfaa

  • SHA1

    3df4dc6d55af20f0593d807fb4fdefb23cc3355a

  • SHA256

    8773998440c8d534fa69833174d05d09088f07e6e5c0e41d7c04a229c7903879

  • SHA512

    05abffc0ce836f7438bc711a9d2b5ceb8f3f1c48be2ac9c1a91d286aed6fc4c8d740ae802dcd2cc65d066972dc8daa84ad8a10fa775d66cb5f3de34688d975ec

  • SSDEEP

    96:LeD5pmCRsKp7RqiPKhB3a1jejcM64iVDJaqV:ELRRp74a1AbodJ7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Document.pdf\About\en-US\AutoPlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Document.pdf\About\en-US\AutoPlay.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3692

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    631B

    MD5

    54f5dac59e9c2be8229dded05837d48b

    SHA1

    a3a4a2325439daa22af599624c7d07d7eb24391c

    SHA256

    81d755ca9b28ec7f47d0fd4627c55c42840fa294ab7e9987ef88a5f7b1e15113

    SHA512

    aa2b6b442f9225b621bc79b92d3fdbb2c4c2ea69dfc9a4325aacda7f384b36984878d4be71e9e556f2a5c36399fc3091509e7d0421b601ad1a381d8a2cba8d7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    240B

    MD5

    6160c9889ecedb4e7ad5bd224b14c11a

    SHA1

    07eb288a8ce1739367fe27dc897a604bec2f51e4

    SHA256

    26b5e8ff5e97c2e91323dbb17af3b5adc73ae49e65b32db9bb51fadf096fbece

    SHA512

    e525be25f4fb32d4350f6f70d82f74edaf79be7b73ea94270b28525b72b5d76e08d58248a7042be2b3af834b8a2f0fc90bae3483d22bc377fe0124b7d08547ac

  • memory/3664-132-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-133-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-134-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-135-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-136-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-137-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-138-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-139-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB

  • memory/3664-140-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp
    Filesize

    64KB