Analysis

  • max time kernel
    106s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2022, 13:42

General

  • Target

    wp-asset-clean-up-pro/assets/icons/loader-horizontal.xml

  • Size

    1KB

  • MD5

    4736ab1e105207ce7d8a62d29bce9b13

  • SHA1

    6521eceda5160b4924c6e006d2dd2985abd1e1a0

  • SHA256

    55509258846ba5d7f4eb075fd4f8fa4c2c951b6fc6d9dc8da49728b0b38a3fbd

  • SHA512

    9a479c7b9d2b0b7d3b46711b51af7731a1770ce0ba06c4ce8ac6ee876b231be79eb29695f9aea5e5cdba3a95b57c4e985251b1139185584cf1bda0475f53a04c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\wp-asset-clean-up-pro\assets\icons\loader-horizontal.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\wp-asset-clean-up-pro\assets\icons\loader-horizontal.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4704 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    635fcc1aee365eda7128db61d981aa5c

    SHA1

    a35b851b0af54180a91566b2ec2e50f21a85a54c

    SHA256

    5f2300980b866ce4c808c8c5b5383a7777cff9eff3b5468b9a3a5d175f552700

    SHA512

    7f1400556575d86c8243c6be279d59fa35cdd400d7003d40c25852a0ad203aa053fec1b7f45107b1f66ac505deb47a2341a71642ad9f7f0e8c4bd57ebe43d918

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    2e9d1de33e0068121fa8851feefef7b8

    SHA1

    394cf6b4c945779cb42b4c3370eefe2c7dfe4308

    SHA256

    d51b121976bd1333ca112a7949fa92a1110317074e79cb1b9569c41adb76e2d3

    SHA512

    e4595a90dfa8065eecdb05b161f59044c8a3adb800f8e6ab2099a9fe805d6d7552ad23030425a92996d7d9896c730547f8171cc553fb228ceb9817b0bc3f4ccc

  • memory/2632-132-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-133-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-134-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-135-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-136-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-137-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-138-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-139-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB

  • memory/2632-140-0x00007FFC7DCD0000-0x00007FFC7DCE0000-memory.dmp

    Filesize

    64KB