Analysis

  • max time kernel
    80s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2022, 14:53

General

  • Target

    secupress-pro/assets/admin/fonts/secupress.xml

  • Size

    109KB

  • MD5

    3159371b4f91fb5f3256cab19d1e298d

  • SHA1

    35a8ac11569926ab9c172096814e51955a9f18ee

  • SHA256

    90cc75eae8e2de8fbb125f0a4805a40f13e57b1c40e25dafa6f82f2f5eb73dcf

  • SHA512

    4f25b36aa6bf6c30f8dc67b59b56484edd9f15e1c44b80cabcde7526bf94bb87c8e7a6f67d09aac504e1d569e8ea468eb38c740777552f35289a923777e00ad1

  • SSDEEP

    1536:C0SRpzeHmlNfMkPfZVxtT6dMpmTiVi0gWaODT:cJx+TiV/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\secupress-pro\assets\admin\fonts\secupress.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C7NGMH7A.txt

    Filesize

    603B

    MD5

    e8425a5ff95c2a0883c693c83b798cb9

    SHA1

    7f7ce3785e5e0806f42fb7d5c81b9c1be3a4d2c6

    SHA256

    81d4c83c393d3a8a845d77901077d2f3575a11f826259fa65370d879a7679081

    SHA512

    73198f65cba6b5d8cd6c581b7ab9b00f38284722e217c5e51b3244a068cfa410f0104368669612ea89b5ed13d6a7356e07bcc0e6c23f48e5dc57f65dc71f7dc0

  • memory/1356-54-0x0000000076711000-0x0000000076713000-memory.dmp

    Filesize

    8KB