Analysis

  • max time kernel
    94s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_065.xml

  • Size

    4KB

  • MD5

    685dd7fce786b74e4cc861e6441ce460

  • SHA1

    dfe8891b2a678705147d208cc1738820fe3b0465

  • SHA256

    efde0f813e80bfa3c0fc0e235d535c7e9f1076bc6686b9ffce754781fdd94cce

  • SHA512

    c62f539a9d07b634553ac7c04f0ba024fb0eed59f633de991cb841818e755e5195763b7683c81249e3b9cd42ded602376e7817edaf29beb5b8133139f643770e

  • SSDEEP

    96:byhe8DDRoDgeBZtxqDyMSYDOM8UrWt/4ODGOQPDsUBU:bzZiSfKrWwg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_065.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_065.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3760 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    8a6a5e117ac131d0f9513a67d5b22c7c

    SHA1

    5ba96fa123e3610316f294589f77ba57210384af

    SHA256

    a70497ad872fc75628d635c87a03e20542370e0dbc3d9bd0ba26d5271366c3e6

    SHA512

    334d57d3c8eb72dba981a35c89d202211468187d69ad9503c8c45f2f72d1f308ea749ad3657259ac17912aae1bcde14a6c20b288673aab07c2cc590d760057bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\77QXN707.cookie

    Filesize

    615B

    MD5

    50b5129b37f076691f50060e56302090

    SHA1

    6e16b1fb8b12d4352f90d218a73d64cb2c01ce28

    SHA256

    fa87cf9c122d116d42281d67abd15144b7ff8ee412bf7f0faa279f77d3c4cdf0

    SHA512

    4baf6c9db7d997fb61441272eb70d3de40df05e08ec05b5a5d0b3db5951c8f5801c8e126c83564e13fb25fdcea36c397e785c467d258561c9b51852b3a9d1a22

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YEUKNOE7.cookie

    Filesize

    615B

    MD5

    8c4d99b8da22aba203c64f1ca93f597e

    SHA1

    afe507739a000e1fca95fdc33bde8d33ea4b2dc3

    SHA256

    087f3bdefe6b32af6dafea4cf67b14b50c81f50664172c4fe1654290607bbee0

    SHA512

    18c57f8311450c152b96532fb6635ad730415b94c65c650b88fa1f448357dffb7e8f29e2b286c958d0c0b37f7568a5841b83a264a5ee99817963510717b3278e

  • memory/2172-120-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-121-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-122-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-123-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-124-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-125-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-126-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB

  • memory/2172-127-0x00007FFBCA880000-0x00007FFBCA890000-memory.dmp

    Filesize

    64KB