Analysis

  • max time kernel
    118s
  • max time network
    259s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2022 05:59

General

  • Target

    package/Program Files (x86)/Microsoft Analysis Services/AS OLEDB/110/Cartridges/sql90.xml

  • Size

    95KB

  • MD5

    7bcb78a5002bafbb8ebd1b3d3ea7a56c

  • SHA1

    27b495895e189bb26ba5bb884dce933131485acd

  • SHA256

    a0b013c7d76354298b4b9c5293634da45ef971b8f013e0e2d49ce1c6fd326d18

  • SHA512

    482fc566d875bf08bcc554907084218686bd8f4c8a2f395db509fc2473e8a5f56577a6a6d9cee6a8de6b31d4164d8e32babc22bad327a0c8747d90cde1153d41

  • SSDEEP

    1536:9ZqkdcyRoiSHSTQf3GlDTYfq0QKUo1o5omoKomo7v2FAv:9ZqkdcyRoiSHKQf3GlDTYfRvQAv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\package\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\110\Cartridges\sql90.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1960

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C0O8X2P5.txt
    Filesize

    601B

    MD5

    693f8a611a2b6b85d503b618e8c62016

    SHA1

    fb2a3845491086ecac74f683b73e8629db770389

    SHA256

    24f12cea2f8fb530ad5f3b7dc593defb7f328e05c9e84f89f8c3b93d13460c7b

    SHA512

    b9f3381d10e0211deea2e57e61d8dd5a0a134ecc4a10ffc54286ecf5632a9dbe223ed2c7fcd6b53c3e2a541d295033e38fddc41d6b4caeeacf4eea7e85de719f

  • memory/1948-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp
    Filesize

    8KB