Analysis

  • max time kernel
    136s
  • max time network
    240s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_076.xml

  • Size

    1KB

  • MD5

    103e01f10a110cbb1cd3c2a2aa38fa77

  • SHA1

    8dc76b7093658513b8cbe7530d65b3ad6fbe4eea

  • SHA256

    f02cce6f4d7a281e3843c339218b359ea85b49a56ccf6b8dd2fc765108f82b99

  • SHA512

    f20be5d73541a87a137411d98f73b55802ad7dcfa6fd7ec6340f79e1266e3bd039d50a2552661149e9b95246537662d255b46c338905eb43d426fd3a4454867e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_076.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_076.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B3HOO98G.cookie

    Filesize

    615B

    MD5

    44bd8d5dc1b449098feb5f558dd28094

    SHA1

    125b7f6deb8acfb0e2d9fcf2035e2982ab054778

    SHA256

    1615b21da1d924af8d07c86b277c680262a02530da3fb2089d94d860999b7fe1

    SHA512

    2641217810f7d204162fa2d49377dfa697a2aa8f0d9efe295acf167d35bd04c247a91330a7ea54a484072a28293c37b74d041fba169ffc53a58e7d1c61ba5911

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CWVEETHM.cookie

    Filesize

    615B

    MD5

    d94dd339bd8843f0731720bc20c345d6

    SHA1

    f8391d4467d3410a73f5f6fbdea95fceebb9c00d

    SHA256

    4014f9695affc25de29de958f57000cd100b8b7066f345e293aa141ac056a77a

    SHA512

    e331b1e6212de4815594c730b40506ca9ca328648f0ae5db1bc4af613f73001001220f4397b22337de489e53defa7b4b43bba4a3851c810e00c972c763428439

  • memory/2180-120-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-121-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-122-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-123-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-126-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-125-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-127-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB

  • memory/2180-124-0x00007FF97A1E0000-0x00007FF97A1F0000-memory.dmp

    Filesize

    64KB