Analysis

  • max time kernel
    300s
  • max time network
    306s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_055.xml

  • Size

    3KB

  • MD5

    568b5635c163feda44b7b02ec5d0d1c0

  • SHA1

    13acf036f2db0bcabe5633f789118fbea5017d84

  • SHA256

    722f4de7f9b3bf70cb17bbd01c9ffa75096a3e3a4b68dfa1b3b0784b2b959d3f

  • SHA512

    f45e914b286979af71b0f261ae9ad2ae9e903fe775cef5b1e0b70c7cf0839460823a133cd90560815f4f52957668e9d6f9b37776ec36cc135b30742c7acdb33b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_055.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_055.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:380
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:380 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    4aa3fcad5fbb72ac96fef7769c768dba

    SHA1

    6b1a1dbeb27309ab07d72dabf4dcb2956e4a0c70

    SHA256

    95b0b053346b6f6100093b111ee42d8b990def54ab50b01a583e31f646b01721

    SHA512

    e989758c75f9b6f7a1e9e28ca068233b23d2954e041b886d4662b502c3065b4a95b0bc50e042dbe7e1d64f0a7add355e04cfa2a060393eb73c1b597317ce7003

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\G8VEAD9J.cookie

    Filesize

    615B

    MD5

    5be209439ed0b765768aaeb052f6f69a

    SHA1

    414b995624cbcac01b6e026d32272debcc3bfe82

    SHA256

    622b99f65ddbc1aeb6949dab956b44f3be77c89c50ed2aa8ede870b998cfd7b2

    SHA512

    a18d5c1ff1c21a49429a866c95638c492aca02662291f18f27487de8b464b9550c2014886598b49277b9718d0876932bbb1084a817d013e693637e1089e69051

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VDOCLI0E.cookie

    Filesize

    615B

    MD5

    1fc3de1038cb4773d411b978ef5f2306

    SHA1

    70cb40d5873824e9b02f9c930892bcd9821fbfab

    SHA256

    3b9887ee58bdb4e06d6a31d7052b81199bacb9af7cade45afefd96f99a441a45

    SHA512

    94d9c581599c78dd190665943b520f2accfb5d21c1452e1f7b4b04084756cf51a921db066352c7aa81f130c8c117a6d4031812eefff557ef419ae73d02f14d58

  • memory/2724-120-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-121-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-122-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-123-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-124-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-127-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-126-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB

  • memory/2724-125-0x00007FFAE0AA0000-0x00007FFAE0AB0000-memory.dmp

    Filesize

    64KB