Analysis

  • max time kernel
    384s
  • max time network
    681s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 16:41

General

  • Target

    Data/package/Program Files (x86)/Microsoft Analysis Services/AS OLEDB/110/Cartridges/sql2000.xml

  • Size

    32KB

  • MD5

    ac29c853a64282340ef729348b8f1d67

  • SHA1

    302686cc7c3fe0a66a3ed4256a962426ea9786d4

  • SHA256

    e4ab45c17b706f7689e7c854f7b95b14ceb7f445344253e1e062498b19196bfb

  • SHA512

    a3abc6c6eb93ed3dd57fb144eccd5313f4df5622db337c5a6151c752aef2befe21aaaa854d2e84d083e6ecf4168906f568380402695231f44bafdd4cc3e7f797

  • SSDEEP

    384:53l2bYjk3EfI9S6J9S6KS8Y542cyRANEffPaWlDGAYwfDjY/AnM/0wz8b2:5l2l3EfkdcyRANEHPaWlDVYU/wz8b2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Data\package\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\110\Cartridges\sql2000.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1740

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7VQRBHWN.txt
    Filesize

    607B

    MD5

    995ab2a51b1bf978f86b0f364fbd7035

    SHA1

    758c82bf9f59c621c44e9066948af17140c78a23

    SHA256

    40eee38db5f32bb553c083e0aa29330e22331fe8f5ec45d799ef19cf214bdf4b

    SHA512

    19e98434f05264b32816eca1707c3943d5d14482bc512c915e84a9b626469d9b4303dc91076cea49755eec80fa5e839cd84ca99c004beb1c7dc5f1a5ee3999d7

  • memory/588-54-0x0000000075811000-0x0000000075813000-memory.dmp
    Filesize

    8KB