Analysis

  • max time kernel
    84s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 17:22

General

  • Target

    levels/Monza/art/shapes/Breakable/Breakable.xml

  • Size

    414KB

  • MD5

    2f8d476d9f41c382b384d888a23891a2

  • SHA1

    34a55b161b6ff5a0114e10ce5ea969259db36302

  • SHA256

    d6eadd79dd7f24d4256026011c345e9ebf919d9ee62ac218616e9ffe934d4506

  • SHA512

    55105f82d88caa2270b8be934d78957f6b6465e35a4690128d7a9e91e859765572cb4f2f467aad81d4f69821a5acc4e4208c1cc3dcef28f6a6428430e5e81e38

  • SSDEEP

    3072:AKrA3K2ZuWAh119dcoUeZ8fztUSPbac0W5n:AW2oT8fzt5TacV5n

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\levels\Monza\art\shapes\Breakable\Breakable.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\levels\Monza\art\shapes\Breakable\Breakable.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3556 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    460fe13d503bfbb113c3ecee607f5a31

    SHA1

    52df07ae073bae09b9093fe2c60ccbe7e8dc47cd

    SHA256

    dfd7a4b3a98874808e3623cf75216dacd47b4389916e0faad7e0ed289743ce0b

    SHA512

    383f29a13884ec9268eaba1ee47bb73243ec7f4eabdaacaa77bdb2de2b0cde5f000b7ea527179c75cfa30666a06a9333268e06b4cfbef91f4d2b82c119818d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    4cbd848d2724a2c314322bf729495b0b

    SHA1

    9c6e26a261b0da8c5a760a209129adb653814e76

    SHA256

    1fab69830a4f802ab59e8b64e9ebfc66e56c1740d4f7c3ed68bb6651e771b563

    SHA512

    71a0963f7efee06e06b3d4eed88999dc982d8d2ee0d6d961866bb57f22a2648c738bb9ea941bb347c5879da61cf101dfe1b9be6ce97a584d71c9ca634999a9e5

  • memory/4428-132-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-133-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-134-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-135-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-136-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-137-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-138-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-139-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB

  • memory/4428-140-0x00007FF813650000-0x00007FF813660000-memory.dmp

    Filesize

    64KB