Analysis

  • max time kernel
    114s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2022, 15:38

General

  • Target

    word/fontTable.xml

  • Size

    3KB

  • MD5

    d88f9d8f1ce15ea58010620c285c29a9

  • SHA1

    84dd01cc90b50b72a2061431376177b630c97a27

  • SHA256

    8b00be639ecd61fdbd5e1f83276b18fd12beb8cbc507cc5868a3a3472f584137

  • SHA512

    2c9756a3d50b53a35c8af198f49b98a545b587dcdd49c75b9c5ad97b9569107eb6d69bbf30bc94e9c6e9b813c106cb9ab63062f92774fbd6807eab086890f76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\fontTable.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TWL0UOFU.txt

    Filesize

    601B

    MD5

    7636c1e934c57bf67ea222e047b16012

    SHA1

    7ba9c3354b259fc53eb13dcc06b63abb8aeb0e96

    SHA256

    a5a7333b9f2c257342d86d548e68a5f8f91fa75a79ba0dea79a566283c4c956a

    SHA512

    8f40e277efac6c4f520f86a9deb663aaefe3be0f08f8a360fea1a373695dc2e02b67cb7efc0b378b883f990cdf0201bccf9df2aa872bee8f75ea204d5f18f2e7

  • memory/1148-54-0x0000000074C11000-0x0000000074C13000-memory.dmp

    Filesize

    8KB