Analysis

  • max time kernel
    164s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_067.xml

  • Size

    1KB

  • MD5

    2ea4d19d8e19a56f31e927c88fae3647

  • SHA1

    efa92e0f6291dcb154dbc9ceac51587d16e97ff3

  • SHA256

    5cdffa62efe872ac2b4e9208171f172365daab27968ca3e4d33583bb09397d9d

  • SHA512

    9ccb9fffcd2df9390f9ca2847c9772be282ead959df915bded3fb4faee505bb3774ed7a89fb63aba94180801879fe4efa7df749b8a64eae5e21f4a4fe94c1905

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_067.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_067.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3980 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    2e25e0f4d933464fe616cab852b1fcd8

    SHA1

    bf44cee67a257ddccfbbdb0d7e66c0d50d93bdf0

    SHA256

    a76432f0d22ee3252938c5ef65bddd9fad1e563dd228b362553373d864660b8f

    SHA512

    15bc9e70071f024d19460490981d10a46ce3385adb78d6325a1589747819ac0a865a5a40e82a6824193c2998061983cb7c0231f12a9fafc50a92111076c16683

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0IXZ1PH7.cookie

    Filesize

    610B

    MD5

    fa818cd3f6b795ccb80800f7e9b4afd9

    SHA1

    10344138c90ef7079d3b91ecb3c7239f076b9b30

    SHA256

    00088ed18899931ae88f1e6a4c5871cf844705e889705fbd8a91ac940b34775e

    SHA512

    a85589556e0e100aba3db47eb67753d142b046edf7c35f15b306907389fdbb14a4813ae9a78a2365587f745645e8c9b385cd2e46e5bd77bf954b1345fb23365d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CQXMS5TJ.cookie

    Filesize

    610B

    MD5

    6890b016072db907d5369fa7ddf7410c

    SHA1

    3d44bf44dfed520d0bbb209696eb1cdfbf3a5893

    SHA256

    90343dda31e912e319e69f37e5fa682aad271d51885d98b679a3eb5a9435dab3

    SHA512

    e7a65aefffe42b8ef77be0ccc80a58a13a8e85a5748f95af38d3e0481b07fb7d87394b91a0dbaf0ec8704f5183ba77b9f56576155685c28f12c8b5dd4ea36747

  • memory/3516-116-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-117-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-118-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-119-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-120-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-122-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-121-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB

  • memory/3516-123-0x00007FFE99890000-0x00007FFE998A0000-memory.dmp

    Filesize

    64KB