Analysis

  • max time kernel
    126s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 07:56

General

  • Target

    packages/Assets/Assets.xml

  • Size

    1KB

  • MD5

    230955481388f2c0f33bedbf0a34aec2

  • SHA1

    c3215ac5986e79f62ad4d547e733647c4ffa22a0

  • SHA256

    312fc9721a900f9407009f56881ee337ebdb3c5b563d235ac5b2b4b4d2712132

  • SHA512

    a4b60dc3839b9a65e1122e397d4b6ba29ab94e59da5ba459a00d61bd8b912162be6ec72ed0c2398aa2f89258b3054e8c6471cbc4a325010251152a8332051acc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\packages\Assets\Assets.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T2ODJ94S.txt

    Filesize

    607B

    MD5

    ee9a20e7aee262205bd338d828b51b6c

    SHA1

    ed57eb57eca1bb0e09d41a56dfd91fd6d841b07c

    SHA256

    4b860b90599332cd9142304a6c3629be21be72b16cb6716e485bd6e540bdd4ad

    SHA512

    311d7e204014f9a677ffbc66e399ebaffa547e95e4a7cd20a178ffbcd7d895de909d6976c0fca9af51ca5f03773f83e5e9f4bb67173c659d015f91baa9122a89

  • memory/988-54-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB