Analysis

  • max time kernel
    125s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 17:27

General

  • Target

    Payload/Instagram.app/Frameworks/FBSharedFramework.framework/SQLiteSchemas/SQLiteDirectThreadSchema.xml

  • Size

    1KB

  • MD5

    024c64dd34e00bcbba12671378f49e2e

  • SHA1

    a1061744ec27a8a7e43c73a15728eaee35cf9596

  • SHA256

    f6975e6775613d9ef382004e7b437e650803f04a7c821f74209a1070c62d4bdb

  • SHA512

    edbcb3ea5c211ae96b91ff440c93429494cf7d126273b184625b7862a852b3132b7d3995221f1314ddd137193c13cdb044a1337245ec2f280b4d3eea65d5fb2e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Instagram.app\Frameworks\FBSharedFramework.framework\SQLiteSchemas\SQLiteDirectThreadSchema.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1724

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9VZYABAX.txt
    Filesize

    603B

    MD5

    a7b5d6cd783556f597c643d55ad25e39

    SHA1

    b300a046517344fdf893455b1a50fac3f4f1167b

    SHA256

    8e144bebce580f5906a2f9892260ba0845427f529e8de72609477ae544d755f5

    SHA512

    806af31ae40f9a0861eb90d4e70020b6ab1764b21488d48763738b2c3866ed3435a07249bcccb7eef9699d116f4dcb3348f2aeb7c7e2d7d29be8120bb688d59a

  • memory/1280-54-0x00000000752B1000-0x00000000752B3000-memory.dmp
    Filesize

    8KB