Analysis

  • max time kernel
    110s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2022 23:42

General

  • Target

    RAVAntivirus/rsRemediation.exe.xml

  • Size

    176B

  • MD5

    07c7bd25442b92d5e654d2b47ea63ec0

  • SHA1

    4c1a65c73edf4dac58f7c6d1e0094ced79647736

  • SHA256

    8305f905b29a9202d59bc06753ac1acc00b3b4c8b951d820ca7ac850e7a4f7cc

  • SHA512

    6204fb64c90537dab7f64b8d99430e8bfa7d4759bd22b2bfe7959f59beffc001cfce1e3ea80fff21deeda91cede3c48726aff7433e6a9b9e32c1f239f53b909b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RAVAntivirus\rsRemediation.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RAVAntivirus\rsRemediation.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4752 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1232

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    07149bdd639826419e083a26419257c2

    SHA1

    a8e6f0b4f6fc6e51803f4c9e46af728969de3f67

    SHA256

    ebbe45f802e0679a14fc030c6cbcfa453183b54d5f26e7f26b40b377f97598cd

    SHA512

    79630d054c2da35857dae03406e467294128a69fe4e0ccf10976e3a2d01645f2cf6ce5b1b90110872d04ee82dff29103e8e14439ff38c6309ec84fcf171623ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    fc226c3fb64dce1bbb4afe276258aae2

    SHA1

    ef8ed097d8890ca34b86ce1f8a5c838368c45eb6

    SHA256

    40c7a800b998698e49c4fbf46fd57ff27e422198bccc4ec2ab0b35812a1b7540

    SHA512

    390fb38657523f57ea81f4bb9a74bf9a6f7b04c8be881761005a92a7d3de9adbe86075b38984fa6b9d8b2bff7a15993afd5a64a40f17375594e45db5168fac33

  • memory/4244-132-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-133-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-134-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-135-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-136-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-137-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-138-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-139-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB

  • memory/4244-140-0x00007FF9EEA10000-0x00007FF9EEA20000-memory.dmp
    Filesize

    64KB