Analysis

  • max time kernel
    133s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2022 02:07

General

  • Target

    iPRS導入包/App/FCM_Report/App.xml

  • Size

    1KB

  • MD5

    c5cc9f821ce5b929332202b6f8fa0896

  • SHA1

    16f5364a58c75a56f9bfd4e0f19dd0c138734f94

  • SHA256

    6729193d39f39980b6d169bd0a6ae8e0059f3306ef365e19acfbc8a98554a00f

  • SHA512

    da3c51c2f28cb6e948bed96aa63dd32a120b0da1227277609b45a0de5ae57874a4599015e1cf5c5ae3bab39f364e6eccfe7642fc95887e8e7730194b0eaafe5a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\iPRS導入包\App\FCM_Report\App.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:840
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NDP5S548.txt

    Filesize

    606B

    MD5

    9dcb697c89f87b83b1561842cdf7f73d

    SHA1

    8cf998fa5f688d78662d9a779e65d38b21bce3f4

    SHA256

    dfba346734b1613b21d54ad62cc2b59928dd3f1c0e38281b7f11166992a12aae

    SHA512

    48538526fc5a79ff46b3f3c4e8cfcb2984c0f95c07bb613562e8e9d5e40ad9c8d23b31d197a8531ef0659532e2c2c0e1af86cf24dec24eaeb91bb4898c95cb95

  • memory/972-54-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB