Analysis

  • max time kernel
    150s
  • max time network
    261s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 17:27

General

  • Target

    Payload/Instagram.app/Frameworks/FBSharedFramework.framework/SQLiteSchemas/SQLiteDirectThreadClientStateSchema.xml

  • Size

    659B

  • MD5

    edc049f2e19347def1618f1db5524c28

  • SHA1

    bec895006a6023a879c89210be508971c4fa5738

  • SHA256

    3ac3a89e3835494d1604e37cd2c350cb61869b8d2e302818d9ccb91132d68b7c

  • SHA512

    ad475cd800d249cc258e8bb924252e53caf0895b25bfd6c20bc4759b3ff5b45990fa75adc4778e143c4bc51465141a0c806999c0a9f7189c52fe54cd5c1811c9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Instagram.app\Frameworks\FBSharedFramework.framework\SQLiteSchemas\SQLiteDirectThreadClientStateSchema.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:520

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7RXUGLX5.txt
    Filesize

    606B

    MD5

    1e4ac53a54f7bee1099af4c54c2706b0

    SHA1

    d977469a3ae5e55ceb3e188ca17696e599fc52cb

    SHA256

    01ee2eab3dd8fb0880aab9ec33e9fb8231aa805f17eb9465928c3331da5db2ab

    SHA512

    099ae6810e4b5bb0466fe84011d6a5d3da35ebf6c6be780728e9be196bc32b3a4ea6cdcb39d617ca823c556d9d3c4b4aa7b610d385c4f18f0a51e33354593c28

  • memory/1868-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp
    Filesize

    8KB