Analysis

  • max time kernel
    135s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2022 05:59

General

  • Target

    package/Program Files (x86)/Microsoft Analysis Services/AS OLEDB/110/Cartridges/orcl7.xml

  • Size

    33KB

  • MD5

    69efd1c266511f8ab64385235c3d54b2

  • SHA1

    94af77e0d2116c263e5798e0fbf7410df4333eb3

  • SHA256

    0374baec5b67bba27b929ce1bfadb009cbfb10d67632d158fbaf8b6b941d5b6d

  • SHA512

    956383dbf08fa9d9618f403ff55052535b946c261afaba86d3fe52651c409b05789581c231091944f803eabcf26870b6de86aedc1fcb481f18ef6633caf476b7

  • SSDEEP

    384:5xrkkbx3AoEXI9S6J9S6KS8Y542cyRyH5kr3lDGyYufDjY/0nM/hwz8Da:b4k2oEXkdcyRyH5kr3lDJYaEwz8Da

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\package\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\110\Cartridges\orcl7.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\package\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\110\Cartridges\orcl7.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1716

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    50e10d0c1d47ed3dad34cfcd6a9d764c

    SHA1

    7ccc215400c6c89e794dcf3b8d7b7ed006e94fec

    SHA256

    4e194f75beef2d97e3b4e3fdf4a49b5ce0b5f7f112097d3093b33d257b2912a3

    SHA512

    7f67c1ac984e0f2de6cb3e12fe856a86a0e6f1d690ad668fa11c94932c5846f12008fc375187e0c93f40026613096184e36aa4804896f736aeb1bec27fb265aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    0cd5adfebbaffe4f7734afbb551cbe0e

    SHA1

    ab352e8f9920e9ac405983eface9785a8b9c3022

    SHA256

    a7f95f9f996a11efd616cc777e1cc72b0eb173adb043d4af1c4cda9c391e9f3a

    SHA512

    a67195f36547409a32af9d84b42758d2b039cbcdf4f9fbaf1caf0cb57cb344068bb7d3cab48d1764ae389102339df476c977329a8332448aebbcdae7d8d9e700

  • memory/4332-132-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-134-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-133-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-135-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-136-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-137-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-138-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-139-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB

  • memory/4332-140-0x00007FFD677B0000-0x00007FFD677C0000-memory.dmp
    Filesize

    64KB