Analysis

  • max time kernel
    164s
  • max time network
    281s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 17:27

General

  • Target

    Payload/Instagram.app/Frameworks/FBSharedFramework.framework/SQLiteSchemas/SQLiteDirectMessageSchema.xml

  • Size

    835B

  • MD5

    68f90f38e9eed97a3cd9c3f036ac1bb9

  • SHA1

    626ec47a3338305e05d9bbcc7f18f55783924704

  • SHA256

    56d00868bf640213e5bc36cf1e50ed4425488d3bf6b3b9f46f4b3d399f4b0e92

  • SHA512

    a43724e6116b30daf9b81e36628d253f635f610efbd9ef0b0262f9b54c8018e28595a0ece1f74197199e3f2d6291ee7795ce12bcf8a0b81dad72a637eb6206b7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Instagram.app\Frameworks\FBSharedFramework.framework\SQLiteSchemas\SQLiteDirectMessageSchema.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:632

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H0TRLVOS.txt
    Filesize

    608B

    MD5

    9bab34c8eeb4aea6f53fffe2c34ecef2

    SHA1

    461598208519f4984c02fc5dd35e58843611a58d

    SHA256

    a4178eca8a2aaacbb9ad85b72beae0073eae6142b8b244a3f4080ea62e0a22c0

    SHA512

    974dab47b2a887551c8f5dbaf5950ba5946e115a770a0e5da48eb2aa4f9a82027161622f6265a3d34b9536f2e6e285d22892e48d49f35df4df88ca81bcb9decf

  • memory/2020-54-0x0000000076831000-0x0000000076833000-memory.dmp
    Filesize

    8KB