Resubmissions

26-09-2022 09:56

220926-lym2tsadb6 1

26-09-2022 09:49

220926-ltgdgsbeen 1

Analysis

  • max time kernel
    210s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2022 09:56

General

  • Target

    xss_sample_0-per_document-payload_0_1664180161576351.zip

  • Size

    10KB

  • MD5

    77795754c6e2dbe5577573a83c66eb22

  • SHA1

    22e467e961e7d2414e1b4a5fbd03c972791bd9fc

  • SHA256

    42e5c27986288b6dbc6c793cdead17df325fe9b8320f8020e9307e2e596ba05c

  • SHA512

    489e878f8cb19178ee13e05c6187a7289fe2447305362e5f948d836e58dfdf7769dccb28cbcf35935fb9dc4668030665b042f8249f6c78a9f7dac746d8399d63

  • SSDEEP

    192:P1As/zwcdPqZghVXyDGjN+86QYZ0Lg7feTj51/OD/IroieKi8Rr5AcVPIX:P1J/yg3yDcIvZ0jv2/S2KiIdAc6X

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\xss_sample_0-per_document-payload_0_1664180161576351.zip
    1⤵
      PID:1552
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\UnblockMove.dot"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:956

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/956-54-0x0000000072951000-0x0000000072954000-memory.dmp

      Filesize

      12KB

    • memory/956-55-0x00000000703D1000-0x00000000703D3000-memory.dmp

      Filesize

      8KB

    • memory/956-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/956-57-0x0000000075241000-0x0000000075243000-memory.dmp

      Filesize

      8KB

    • memory/956-58-0x00000000713BD000-0x00000000713C8000-memory.dmp

      Filesize

      44KB