Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/09/2022, 16:23

General

  • Target

    default.xml

  • Size

    1KB

  • MD5

    c578beb3e2999a3afa8f4842008f9b0c

  • SHA1

    2e3e8013d6989952b9a34b3f1fe6f1c722616dce

  • SHA256

    db6e4c7962271a6d679e120828998c5c7d1060bbcbbe12dbde29acabe1bfd1ff

  • SHA512

    2767e57d9d4b7cdea60f7da3e7c7eac18f732ae5afa72ae9493833b1603e9b4aaf2fd4d07e250c13516508d0c903ee4a9135aaed64cf776c12d3457bc3e942e6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\default.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\default.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    07149bdd639826419e083a26419257c2

    SHA1

    a8e6f0b4f6fc6e51803f4c9e46af728969de3f67

    SHA256

    ebbe45f802e0679a14fc030c6cbcfa453183b54d5f26e7f26b40b377f97598cd

    SHA512

    79630d054c2da35857dae03406e467294128a69fe4e0ccf10976e3a2d01645f2cf6ce5b1b90110872d04ee82dff29103e8e14439ff38c6309ec84fcf171623ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    58f162218f1ca5f603077fc0d4e4ec2f

    SHA1

    b927ed22b00e4dd86c42a2bd2f6b96d1806a6bee

    SHA256

    f0c0fc59d114b1028c7ccdf5f60d86a225dc20a3dca790093e45b3ba80ad5407

    SHA512

    61abd56fe043c42ac7c077166617f250a3f6493b00133d63247753db41977274d08abe0336c8c3b93e82ff730cf4ab44d6d19b48f5b5ae7165bbfe1f27a82ad4

  • memory/3544-132-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-133-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-134-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-135-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-136-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-137-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-138-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-139-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB

  • memory/3544-140-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp

    Filesize

    64KB