Analysis

  • max time kernel
    109s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_083.xml

  • Size

    9KB

  • MD5

    c2c1aa7028ef2c6fd3d804473ad98eb9

  • SHA1

    31c2ee335ed1ac294a72d44221124411b4575a06

  • SHA256

    ad55da1b71045d9046d440c3cec5b5568735e75da5b69d2801d1021d10594b12

  • SHA512

    4dd9121781ee131c309d30cf8d03378e5b843145b708f12337edbf4637e785dc9b5282ea70611534d6ff215aa773b75e50666255c6c27819d6eacc13594173f8

  • SSDEEP

    192:bba1Ygzf7WUtWZVFzcTfU44XlWHKXPwGGZ9:bW1Ygzf7WUtWZVFzcTfJnqXA/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_083.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_083.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4740 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IPR1739V.cookie

    Filesize

    615B

    MD5

    7632dbca87808c00abf20fdc2cf72dd7

    SHA1

    5d20e4a5ef2ed9d9926ccf89b0cf0c254e99801e

    SHA256

    bc0023fefdf7f0a875039e5344ece4fed8b8cae3401338df8b3c628014066f89

    SHA512

    bd6ffe817a31b285faa9d820b7ab47a407218b49d4418927856b46fc627a04fb6b40438118849d34a0d3dba31fd48576e7246dfc10d86ff87ab76579ec8ce230

  • memory/4888-117-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-118-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-119-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-120-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-121-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-122-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-123-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB

  • memory/4888-124-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmp

    Filesize

    64KB