Analysis

  • max time kernel
    110s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2022 23:42

General

  • Target

    RAVAntivirus/rsRemediation.exe.xml

  • Size

    176B

  • MD5

    07c7bd25442b92d5e654d2b47ea63ec0

  • SHA1

    4c1a65c73edf4dac58f7c6d1e0094ced79647736

  • SHA256

    8305f905b29a9202d59bc06753ac1acc00b3b4c8b951d820ca7ac850e7a4f7cc

  • SHA512

    6204fb64c90537dab7f64b8d99430e8bfa7d4759bd22b2bfe7959f59beffc001cfce1e3ea80fff21deeda91cede3c48726aff7433e6a9b9e32c1f239f53b909b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RAVAntivirus\rsRemediation.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1588 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:904

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W485SVBD.txt
    Filesize

    608B

    MD5

    13f3ad860e2c202c15e39cdea92db6b6

    SHA1

    f7259e8f760b9e653d4f7d6a3848b5964828f744

    SHA256

    1ea9f90ab14d142be7dedf94a363c24b16bef07b829619dccfc6814e56097d8a

    SHA512

    92106c66b4f8f49af206e04a0cdf73955e6e15a30648e969926598b1e8b9fabff9157399efd2c3581463a472f67f7ba97236ff798cd0a519cf69b2935749ae31

  • memory/1808-54-0x00000000751A1000-0x00000000751A3000-memory.dmp
    Filesize

    8KB