Analysis

  • max time kernel
    164s
  • max time network
    226s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_073.xml

  • Size

    4KB

  • MD5

    1ab6d18edbcf745960b19a3dedffaff6

  • SHA1

    6161afdd37e3d535e50adfe8246843f5e88d4aa3

  • SHA256

    29d0e839c2af94d799b8fe0fd59b467c14e7100d6ea82022454c0237d1bd4fae

  • SHA512

    91f2a86d136ec673ea9efe795db6baad9c1d4b6539d6baa7b953f39b4463d9205ee15a9ba369c4cc4e33553997bbe5edf7d3da7e231ca4fa56836a9be5308cef

  • SSDEEP

    96:b5zh57KcfQkMD85Drte3fV9XgAcsXyd1YZz8dAZtlFQUU:bBoQI399XlydGYdEbQT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_073.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_073.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4056 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    75debe0bd88e58443a906621c909d31d

    SHA1

    7cce471937a13672ab573d396bf70d9d1cf7d44a

    SHA256

    ecc17b838c52a4d6e8d96203bea68dd261dca686a9f368d3458cc574dd0052a8

    SHA512

    7235534dbb35148773c9e8e7256153024ed264820ce0556ec1f2f928eee868309c351d6353b92cba33d04736ff821c6b4f787f71ad0ee54855b68c8ced616d51

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FAKBEY8J.cookie

    Filesize

    610B

    MD5

    e1adf9fc03db102d66fb7784026030dd

    SHA1

    586f7650eea8f0210804ff2f31512c6fb9d9f4d8

    SHA256

    a01d76ef703bce13b5932a110e39e710677223033431718e28142a2376d37338

    SHA512

    6a96e63401790c02b5f43401bf30afda6dbbef3093998aaffb749057193007933c5ba700a2381d2a6a47c255fc0388cffb9acf33bf9398cdad304cca96d36f32

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KSMBT0IQ.cookie

    Filesize

    610B

    MD5

    1d82a85e1244e46815c8f79dffd98c77

    SHA1

    080aff3adb0ea314619ac10efcea89a74a32947f

    SHA256

    5722c029a10b8822264b3ebb29020c4b7088489ee850bfefbb9705e7f39bc166

    SHA512

    0f0dee784bce65da0a9249f980022ab88195a7cb0887c660b88b8ec206305b7702513aca61bd264974402f0c541946b175a6015214f0062be7c056421ca99e0a

  • memory/3488-116-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-117-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-118-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-119-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-120-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-121-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-122-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB

  • memory/3488-123-0x00007FFCE8030000-0x00007FFCE8040000-memory.dmp

    Filesize

    64KB