Analysis

  • max time kernel
    111s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2022 13:42

General

  • Target

    wp-asset-clean-up-pro/assets/icons/woocommerce-icon-logo.xml

  • Size

    3KB

  • MD5

    5720092bba10bab79768360540f04126

  • SHA1

    2d8b23e54e5b18c5b2b95323a8bc194a992f14df

  • SHA256

    c8ae81d1eb9ee33882d4f8b5e8c627afd0c2b795dafdd6f0adb91af32882e982

  • SHA512

    547d4f0cb776018018085a4ea5720c7495072222b46743d8ece6416d0de43e688d5bd9264163194df6fb7a74ef24237479e3388462b44305e16dae1ecf58c340

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\wp-asset-clean-up-pro\assets\icons\woocommerce-icon-logo.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EHLURYM8.txt

    Filesize

    603B

    MD5

    9d5708260bf550715edc858dac627aa3

    SHA1

    f06e46b834fcc8c2da6bf8c17b2e1984c1736229

    SHA256

    040f0d8b118112e692ce167e4189120b7764ea0e63f40ee28f44587ada221762

    SHA512

    a27647fe20bdddbe0696e368b65c0d64d8ef4c7f7ac63608e5fe216172d5d59a15d9776067774f83d0b88d40f6de9d374d78aa444609b42ba77ca71351348431

  • memory/1468-54-0x0000000075211000-0x0000000075213000-memory.dmp

    Filesize

    8KB