Analysis

  • max time kernel
    144s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_070.xml

  • Size

    9KB

  • MD5

    a5b17a15e0a264bfe14355ac8d0fdd5e

  • SHA1

    868dc6e37be61e55f44658be175254bb42097ae5

  • SHA256

    a27a2214e7d3b9f8e5bd1d8c72146a9193876d5d6195d1a1d04b31919c5489fc

  • SHA512

    8906d3000b09a8c4a1a3f42a4b1cb9a866549942c5b6d52be6f7b1a984a39dda0456f99c44614cbe9b926128bab830210e2c53c12770751e323c4f3bbda763db

  • SSDEEP

    192:bgvD4hNdYXec77Lme+PfXhWoPvYuBbYvT3Z:bwshNe97XmeuXhWoPvYuBbYvT3Z

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_070.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_070.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GRZPDISD.cookie

    Filesize

    610B

    MD5

    ddfe66cf9ee2b3f606ce9efb40539658

    SHA1

    bc5baf87c61cc8981f7c77730e048ec879e811cc

    SHA256

    0523355c01aa301a79265f98081236bf6b3441ce7dee4311c4c3f3e68da08f7b

    SHA512

    3a2ad805d51eabe4d369705f23d0bdb7ba980e832d09737611d3f2afc0e77d6afbdb8c9de8718c212d3f1dd8472290c85d628fb48a9f1b7fd8e2eea868a7713f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\OVZAIGQU.cookie

    Filesize

    610B

    MD5

    ddd4d210d16a4a25424e6f9dbbb57e81

    SHA1

    6af7edb8ca53f715d556fb677d779a3e39295c47

    SHA256

    186b080e9d712ae1e6674d7dabb850fd85b971a3ee328d69878971d5ec39ccac

    SHA512

    4bbf3462cba699252eef939e2857c208cf828195063b7612017b5fb8b7209dd499b2e2bbed0d386bc9a17ff1a6596730c74b58c6c131fef5834d31f86d0f28c8

  • memory/2336-118-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-119-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-120-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-121-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-122-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-123-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-124-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB

  • memory/2336-125-0x00007FFEF57F0000-0x00007FFEF5800000-memory.dmp

    Filesize

    64KB