Analysis

  • max time kernel
    164s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_068.xml

  • Size

    1KB

  • MD5

    d61b0f2c4ba9624d16b206c9c8f01dd3

  • SHA1

    0f805930a7b58dbd25be5cc60261315efb51a2e6

  • SHA256

    83f83a2ea9b770a9d2e32b5fe1b13e3911609087da4ac9bb44cccbf47db880d5

  • SHA512

    5bd47f4e989e7b412847d280df062b9268c1d9d51fbd21ef93bfcac7bd121ac9813cd16939449b19416983f139b0bd25d0143d6874cfa999b70dbc6513640422

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_068.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_068.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3660 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    07a994f0d45fc98229eebfa1b7a4939e

    SHA1

    19e22d5b76eccdb15bf96b78d180d9ae428c274e

    SHA256

    44a39e7f16c38b60f89ae7d54f0a35976835b704ffb36797ff2ad0d8ba014a6a

    SHA512

    6ffccac75aca3f0b6f7b9201e6d82a24ea614a2a7121ae647f35221ee89f0f408805c71394bf899145e261c0952b75c98f75a975dc2a4c1acadaf7178648a5c8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FTWW4Y88.cookie

    Filesize

    615B

    MD5

    7c06e0931a6bd1ce55e5d79b631f70c9

    SHA1

    363cda7a6202c341b83949226b2394403bef0a49

    SHA256

    b46fed2f55eae0a15e696b5538519a386f1a13bac80aa63c1916e0893cae117c

    SHA512

    02ec6b39b6b00d67ed3764ba77b089d2d804275399f02e1eef017963e94fe107937afdf4e9d1c4d30f9f1bb81371c2e0e609dcc5799a41256c5941e9c34b379d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\S1U0KYT8.cookie

    Filesize

    615B

    MD5

    bfe4f133c72a399a55be064ee315fa4d

    SHA1

    e8c2a9abbcf9a9f1264b1bf8e725ae869695ef57

    SHA256

    b07bd1ed3f8f8ff843ebf7e1ef3d19ef65d3a5d72cc72f613523669244d2ff83

    SHA512

    2cb3834db0d78661e1ee3157b56294f1942beba0dfe24e79abb2f14fa515ecd815b26fcabd1e418cb6cafd3c525174e4ada13a7fd2e8c9929e60ae1155b90d6e

  • memory/2656-120-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-121-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-122-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-123-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-124-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-125-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-126-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB

  • memory/2656-127-0x00007FF7DDB70000-0x00007FF7DDB80000-memory.dmp

    Filesize

    64KB