Analysis

  • max time kernel
    135s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_056.xml

  • Size

    1KB

  • MD5

    4e0404f0d07dbeacf99ca6e8256cf4b3

  • SHA1

    a8affcbaea67a2e3c8d990a7d3eb8391731cf344

  • SHA256

    beced13b114643ee560c62b9731e237345471ed24713b819d6588dbd0ced7df2

  • SHA512

    1feed65c990586074178ba86f129cb2b8dacb6ebc43814b82e8be53818e704a3eb93f487c62324cdb87bbb01519d2351a1ce9dbcc86287236460f4211dd9640b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_056.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_056.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4784 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    77f831d12d0056d3c8151d7e7f2273eb

    SHA1

    3e047a7b23e1b30c9f1b719f01f2ca73c13aeee4

    SHA256

    9516c7e7102fbbc1d18f6110af857d3042f64a81f1317d433a519fc8cf343668

    SHA512

    6ccb73d09ccbb590149321c5ebf2064957d450bfc1d77fb468c88e0b3a1c7b82e7a5e19505f1c4048b926bf0256b522a8b0e3aea77715cd175deae16c59979a2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FIU3957L.cookie

    Filesize

    615B

    MD5

    ce50bcb1a5875f7971eeb79d68b88d2e

    SHA1

    b183111f809c61cb67d19c89651c9e95149e6459

    SHA256

    115e7eaa6ac0f9587756e16df15c2e80ef7e50c03a39a807363ebaab81be6b90

    SHA512

    57367bf3f7ad6fababa557bd9212f983544227eab5b7083696a431f4c903035413eedf9fcec19a9b4dd3789104a041c7b25f5585a601ecc769b50e5f7d923ed8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KQGPSWPR.cookie

    Filesize

    615B

    MD5

    a7c4c1474ced073909cb7d0dd130f9a8

    SHA1

    15639f706bfa10ef6e032f0f0d7f6babb8a381f5

    SHA256

    1115ef43eac5b72ba4740d817794df8feea613ece759d011fcacd89b1f75cf8c

    SHA512

    114104756b8ccb518f0f5c6d6eef189486a75d9c27980411560e2b08d9a0c1a351a268212c31fa5c12c3114e3d098c2c0a232dc5bf06acbed6729c25e59c0208

  • memory/316-121-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-120-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-122-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-123-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-124-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-126-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-127-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB

  • memory/316-125-0x00007FFCD2610000-0x00007FFCD2620000-memory.dmp

    Filesize

    64KB