Analysis

  • max time kernel
    136s
  • max time network
    242s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_069.xml

  • Size

    930B

  • MD5

    26ec0173153f430c47b8b41274696756

  • SHA1

    517dbe52764f2148a5e142c98ce5e5fd65ec9f2e

  • SHA256

    0796e85ea5a066a02ed7566e9453cb196313fcdd6ebee0232528ecc32f202058

  • SHA512

    0afc97912964167ede1b968c337bf0bdbe99d8356124a720aab607001f3ab0a13e90ce1e8a69c516b89107b6e1850b0385fdb4289deae1f90b0ee8545c38cd82

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_069.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_069.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    225732384d8a1f20a10278d451d59e52

    SHA1

    04d1185089d8c1c30582228f02c359d56901e8ab

    SHA256

    94fe47b67e38446b25a9367fd4d20dca038e7dfa3b8c835c4ef8b64a493ffd08

    SHA512

    f851546a9cfcc37ceac74a825630e83725a645ff1af3e221b0eaeb3a990599124c801e2406672c0b496ef58fcba67a167f44ec644020077f1846f88e7f3a2b65

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\G1SBAN8O.cookie

    Filesize

    615B

    MD5

    d2de21fb634d5cb0f7899858e6a7acc4

    SHA1

    cd220f1833249625019b0b4d48c4b77be672ccfe

    SHA256

    142cccb7a88d221e2d6b09741b09137974d75386b3a18689baa040163b9b966e

    SHA512

    b76be7920c8e4f674089f3cea2a8898091fdae5d462628c3f66394653756c209d9a21949867682f3a521a058d32be3bda481768f0ddd422c38cb30a489b1a5e8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\L12NLCEY.cookie

    Filesize

    615B

    MD5

    cd6f66082f7277369d046aa8be906ef4

    SHA1

    46987d8cf91e6de5c72bee6252f7bb494553a678

    SHA256

    f53ad5674011eb771e7fa6d27fcfb398a0116a5737a8683f361a217529f89002

    SHA512

    55c906921b549cba067c5e58fcd64c95accc524277f8645f17a51317fce58ca73096f4fcf115a147f482bfdb112ae0cf74ba445d936b24f6f799c3614bd0df32

  • memory/2344-120-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-121-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-122-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-123-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-125-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-126-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-124-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB

  • memory/2344-127-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

    Filesize

    64KB