Analysis

  • max time kernel
    163s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_072.xml

  • Size

    12KB

  • MD5

    ba166a6f79b409935f79c7a20cf9c762

  • SHA1

    5c2369b62d6eab566a150ab9c12873aff6d4b234

  • SHA256

    6a0d5bc093f4c511c83d09a655ada0663a013545f6d3d79aafbc407c106bd650

  • SHA512

    fde58b70f1bb683ac88ec8f8e04cdb2dfde223b95f0feaafbc9f7ddbbdc7bfeb92a96f8f251bf11ee7c739d0f056ba11c110da8a6782921bbd47c05d7b87b56d

  • SSDEEP

    192:b4LLhsX2z7soRwXBzJsJbfGk2oEAhlSErmKt22qF:bEdsX07s0wRzGJjGk2oEAK2c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_072.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_072.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3816 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5OCX5JPU.cookie

    Filesize

    615B

    MD5

    d139527242dd4e3bf83c26d4a1abd641

    SHA1

    15d40f4c69eea619219d22c0655178b190ebfcc4

    SHA256

    55d06e8c6abb67658ca21bde411e3a72488c257045a011d3bb67962e1cf053b6

    SHA512

    f4be3839ca0eaaa49c098d6080b1d6bc332b43582939c9a041766fc5f98555798823578171c25da9881bba61373c305682f254ffc7d78937666cbf973781e475

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\S0L18KPW.cookie

    Filesize

    615B

    MD5

    92845c83b2ca4397e77f5b4bf0b73d90

    SHA1

    a77c39184dc83f1cc26f25980101246d7933d7f6

    SHA256

    dcc5fa55324882be5f18fb970df9fff90e34d07b6ea45d7467d1a409a1ee5a6c

    SHA512

    f6d02099a67f0a44d38f51fbde195de12a5fddb013638db77388a4b50f3d23821e5cbc0a1578433a2663bf775b7bb6fb20ce2f5eaa5621bc059632e6ab76c8c8

  • memory/3048-117-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-118-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-119-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-120-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-122-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-124-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-123-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB

  • memory/3048-121-0x00007FFED6D40000-0x00007FFED6D50000-memory.dmp

    Filesize

    64KB