Analysis

  • max time kernel
    142s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_078.xml

  • Size

    1KB

  • MD5

    3bd2e29ebcd20f320d5a9a27cdf937ff

  • SHA1

    2cbe0fc2e48e97c45984d7d699bf36fd69a1ece7

  • SHA256

    2fd9e43bf824b3da1f616d80e8c82db234b5d2aa936dc8f60b8fd293f8e63cb8

  • SHA512

    3e0ad60ab955b411a8162c88efd12de0fc3f5671cfcef8a2abb0c08aed17912abee201cae3b2abda055512d776a50cc13539b8c429d707eceb863bd1d1c47313

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_078.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_078.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    562c006a76179b0395002e23a948559a

    SHA1

    3f4f52c6bd3ae3719db9169d2e6acc97344dfe3c

    SHA256

    51c4af592b77a333d5869558aadbd4e83a9ff7822605ad9b3947a1f8011e117e

    SHA512

    2aeaa6ab116cb6f5c6630fb6178e81d856eb26a0411cf51fa349b17080cb86298c0d2a71bb87dbe8c15828668a67ed3656fb6375d09eb27e207175c774d93e02

  • memory/4960-116-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-117-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-118-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-119-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-120-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-121-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-122-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB

  • memory/4960-123-0x00007FF991080000-0x00007FF991090000-memory.dmp

    Filesize

    64KB