Analysis

  • max time kernel
    145s
  • max time network
    256s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_080.xml

  • Size

    1KB

  • MD5

    6f4b507f7155fcaac432edc908ed147f

  • SHA1

    b1b8925aac9ca520c6f1eff2944a5567220373d0

  • SHA256

    1b12f3198e0aa1031b47059cd0ae509434ae7905ca61dac954f6f2aa5f33afe1

  • SHA512

    960359ace001b9d31781eb9032e30db93bfbf1709717f062dc6d2cd6961135fe9d81290ea0fbfefb25afe4d246e249bd907ee72cc5b4d3133d10f64140d56864

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_080.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_080.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4456 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    dccd4fd33972928354525f007623d438

    SHA1

    5c63a0aaba36014d967e62088ba13857497e604f

    SHA256

    93ab9761eed68ae9bad6dbd3220d0e29dec147f4655e7efa4818a49a4f7fa960

    SHA512

    a5e46659e11b4477ffa08d5e7b20a3f98cca8d6081eae25ee92674f4ed0865f33200ecb94b2af2e3cda8c095dd7694263926cf6f42bd524a30c1e60f34da217c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5SHZSDP1.cookie

    Filesize

    610B

    MD5

    245760bb2c7f308ac90feacf5085c2b7

    SHA1

    430e0f3d90d1fba771b86fb33e47a912258a5823

    SHA256

    a0040825699dc9760fe0f9a0a976b5d8cb5eb3c399d899bab211bb1a9e270956

    SHA512

    5a3e22a9a8b215e9f503e92c45b962c6afc8238a98f003a63a304975f06c23effbe66002e1cbd7270c6eb6f09ff8abf3b90c066bec31b4d46d2e3d35f0a6d7e3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YDDFZ2LG.cookie

    Filesize

    610B

    MD5

    b1932f58cf8ef3eb0126430838c23988

    SHA1

    58f8a6285e1deb871aff1d321133c34290c8c4e5

    SHA256

    820469881c33ef37bf79430554a5e947097ef991cff65c1a10fae0fc07963e99

    SHA512

    b180d4e2d7269653decca05e8366adc52b7e23ab1dbae9811ca55576696c94435702405e0da4c223293873cc81a1981d873c46884c69285335cff4944bfcf973

  • memory/3512-115-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-116-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-117-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-118-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-119-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-120-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-121-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB

  • memory/3512-122-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

    Filesize

    64KB