Analysis

  • max time kernel
    104s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2022, 15:38

General

  • Target

    word/document.xml

  • Size

    1KB

  • MD5

    d80aef9d6aac04fdbc45ed96cb850df8

  • SHA1

    c524a6c480f309565d7e2acc868b6dbb056d6e95

  • SHA256

    7cffe291d3950e647e382bd34332e0a8289440bcba7d4d1d0f1d3f718025034a

  • SHA512

    c97ae26435be5b4f6065a97880ecce00604c82547d1c430eb5c3586607759a1fb54de6972ea0c9f3725d1332f61274119f4db8726a9a5bd622652b9ecc61a6a7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\document.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\57YY06YZ.txt

    Filesize

    603B

    MD5

    f6ad285ed24d17263b4f0ad29725a169

    SHA1

    254f40c930ad603b6a3b9bcb47168c80d537c8fc

    SHA256

    9621b719587d7b5d040989e34f294d492bb679d811d5e9c3f2566d16ae47bd1d

    SHA512

    12874457f263c2617a00cb0c3fc95456e4e0f51f01deb1a094ea2d65f8b4546ce403896a2f04c8fc4a7e7816d48d56c26ac3eea1c076cd63996fbb521afdd751

  • memory/1720-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

    Filesize

    8KB