Analysis

  • max time kernel
    95s
  • max time network
    226s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_082.xml

  • Size

    1KB

  • MD5

    1c6d7bc91d5d498196ec9f38ea51b795

  • SHA1

    a124bc3ddfd0f2d8313e5e7a6f4819a7ca3d24b5

  • SHA256

    81a13510441f8663c7eb3339df03364a21df5fc62086dfb41ba7447c48e71232

  • SHA512

    40d808beacc8760c53082750fe8ddc8271d8c0b36bcf6e8afc3cee7ced5598b2dc9566703a4cd19d2480995d45513d1d01849f8eb4b23473fa6f96259e566713

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_082.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_082.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3868
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3868 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\2ZP1AZ6N.cookie

    Filesize

    610B

    MD5

    2eaea345e300195426e106fb99cc74ab

    SHA1

    28ceb23cee985594701fd1a6f4feb86889d6ac1e

    SHA256

    6fb1a11cd492422a6e23a18d0f765ae2ce771cf38fb12e443085b9d93103cfbd

    SHA512

    4aedda5c0224d6520e142a7729672459d7a1a5515f3a75ae68a6e61069a6ce64c9304907c9e630c38ae727648780132e5d3b85f88df6ba7d418e9000a7cb7650

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U3FQ53X3.cookie

    Filesize

    610B

    MD5

    6ee6e22929da4b171e408da5e0ccca5f

    SHA1

    8c05e6d0862f9405d93fefd0ca3d597b5a714096

    SHA256

    f16637d497d09a70029fa3f8ba3b0d322b97200be8f984217172ebec724131ea

    SHA512

    dcd664c15d69075ef404087ad17a7d48b8753382cb4cca58fa8225982e3d4a1ede0584a8f0c07688a6cab614d15dd77cebf34db4c7725816b99e17821fc483e9

  • memory/4236-119-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-120-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-121-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-122-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-123-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-124-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-125-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB

  • memory/4236-126-0x00007FFAF0250000-0x00007FFAF0260000-memory.dmp

    Filesize

    64KB