Analysis

  • max time kernel
    107s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2022, 03:44

General

  • Target

    ripro/assets/images/svg/jinbi.xml

  • Size

    1KB

  • MD5

    953797652e0e44481ce2f92de09b1162

  • SHA1

    9596269c729156ae42c93a4c09bf4d660e0cf19a

  • SHA256

    3b9bfd8bcad542c7cf6712dd49a39b19da1292da363b12612353813331b27ce0

  • SHA512

    3049ad655d6033a60ef346c680a5fbb0e02d3f67f0bd470e2cfe958349532caeb94aefdd1f769b4c4de8eea8d13e230eab4fa1b99a86e6142b388ef02bffd04b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ripro\assets\images\svg\jinbi.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I8EFHU5M.txt

    Filesize

    603B

    MD5

    b442367e81d611e5cb722bf87bed5ba1

    SHA1

    e6353c3ef28da239075433d7114bea1d6a138b9f

    SHA256

    0796895e9695069094f3db66ec2a2cef9f32ec601fe3b38777baf9e16f1e4f09

    SHA512

    8ffdb3f3fed5bba54bbefee26dd3d9f4aa54f553b99a5e689cc60f1a46e30660e00e6b47aa476dd2b04309295567fe51d07229e4b8d9affeb11aa3559d568661

  • memory/1036-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

    Filesize

    8KB