Analysis

  • max time kernel
    99s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2022, 15:38

General

  • Target

    word/settings.xml

  • Size

    2KB

  • MD5

    89461ac012863f5ea670580c912d56fa

  • SHA1

    d6120b3024831df41a9778a6c9bab837cd8ce726

  • SHA256

    9e4e008542d7990b2cb60737d60808146fd7960d92918776e32e310b76fcae2f

  • SHA512

    8c01830262442c8e7803fc72a1652a4f465d12c210414a635c33ec73d17170fd465f004ba390a44c8933c479dc95dba7284595e0f1ffc3d6199ed38b41552845

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\settings.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6PQY091Z.txt

    Filesize

    603B

    MD5

    767978302035d04311ab5b7f394423b6

    SHA1

    10ef5f58d426f686684025f4f07721918efef225

    SHA256

    960fae596d13de1683ed206c1e0bc1a462fe601ba5391e9ebe5d1639cffb6dde

    SHA512

    5a60e712cb1e4c139848a459d133d712d4ec51dfc93a5b191b3fd2e0150fe25b52da5ad24b9a0b601b14ee3b2cf52fe28b7ef7299b227725159f7a4e49403780

  • memory/740-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

    Filesize

    8KB