Analysis

  • max time kernel
    93s
  • max time network
    226s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_079.xml

  • Size

    1KB

  • MD5

    9f3bc40267f7287904f27d3497d868b7

  • SHA1

    65325c3f9fcabf69600ae8aa9073d94e1c56f143

  • SHA256

    de93c6a1f448aa3eb757cf3af718f5105f080e330720f25921e78221fd9aca8a

  • SHA512

    53a50c656900f57c97e95c1763163e0884550bee4bcfd0d9a69ed4c513e2ecfeaa02fd7131028586ed9a31298e616b4749ca200923869f9eb7dde6cf703120cf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_079.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_079.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3492 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    6db238cf7dfcaa2c84814c78679d89de

    SHA1

    2e51a61187a9eeab72295b5369666fc9917170db

    SHA256

    4bc0922cae1e40c7496cf58775d1880136d5daffce26445023f6b393e3272569

    SHA512

    cb81d6ee30ebaf42d9d5a221c4093979f6352d6ed1536c6bf4e9207968d06e2514d28b9c564db193b417dbcc11ab995e60b55ecac0097c32d1a7d24b2b2fcf91

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1XSVOMTT.cookie

    Filesize

    610B

    MD5

    ab84be5f671fb6619c66673c24e6a824

    SHA1

    17f7b7444f40bf76fee6eaa9bc20c518a215fd3f

    SHA256

    db288d46bcb71555ba25f94561053f2c55a7e793beac8be9d507f8296d4a94da

    SHA512

    600f2a7aeac937e79c3951d2a6c0b35fd5ba171950daf784ee508ae7fc140464889fc26a4082edd0853501982043276b366fad9d0d13e7096fb842a6aa99bd65

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WJAH901Z.cookie

    Filesize

    610B

    MD5

    15d5740c5cc481b02921f0690ba677e5

    SHA1

    95f1dc4dec59a5ae894cd01869b87743b77f1824

    SHA256

    43ec96cb992fb0b80465177da9e96f72344a2874e9ff6a66b352b6db2f6a2aa3

    SHA512

    acbb15dbeb5745f8213541a7bf1b57c6d197fe528a2548f2a578646abeb84941b04fe383fef261260549f13c07d5e5b6812b15fd95322156f8235aa0c41fd65d

  • memory/2436-118-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-119-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-120-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-121-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-122-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-123-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-124-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB

  • memory/2436-125-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

    Filesize

    64KB