Analysis

  • max time kernel
    143s
  • max time network
    226s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_085.xml

  • Size

    2KB

  • MD5

    12eaad3b3a578a1290bb027c2fc281cc

  • SHA1

    141c46fbd735df6c59c636afad45098f0ee8f068

  • SHA256

    37b14a6b7dfdb2d179aa504cd68c02e5be0637b0ef9eccf99734cf9221e95dd1

  • SHA512

    9055ccc961b1360cdcb8353295c3a8417da0d8ca2b8b1258240ba892fef19f5cf41c9433e12b33f97992faba206aef642a351ff497620676c0fb548283c5f029

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_085.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_085.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4760 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    b91b30c18772f25d3b9c45bf9da475c4

    SHA1

    b4215e48908dc3a0c36a358f50683991b2886880

    SHA256

    23930153d6daca433306ff5b3499615dd0f5be373913e1e8e2ac3cdd87cedea0

    SHA512

    7a6b4f51e2f00aac44e36d2f003f33537c3bf15fc4bc875226e3263b30104fdcbee7e4d6123dce73bd9dab75f2b3b68111c387bc5b0606869913f79a0f997883

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\44HI90HT.cookie

    Filesize

    610B

    MD5

    a851f2b4cb71c27a23d93ae3e3a917c8

    SHA1

    75b9623f681de217fe844a21491154a9750d2743

    SHA256

    04ab1f3bd802a3020d0a9f685de7610619e8d60aa52176079ab8ed33d78eda7d

    SHA512

    b70095ffbba9ff33804c75b05e34d038e961451c0ae3c0c4a163c732a1b7f79fe314a480ba5361165e6e4424d01a9dccc8b8f2abeeed3c3d79b6cd8dc32f23e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B0F50ZLG.cookie

    Filesize

    610B

    MD5

    f61c1dbf85dc91a04bd71c4d02e2e0f4

    SHA1

    de49b5b1dd5e186dd6fa8e4b5a015acae632ed58

    SHA256

    25251a5ba11a475404bd717fb264b563bfdc0539c526e87d59887f82423b6b49

    SHA512

    651db692f382c1143909cc81dc0633dd71cafac2dd701d683af98d9e64be4892bfa0b535ff44afaaff471f1c9d3d45d1767af93ec33986edaefb6f131fc84181

  • memory/3836-118-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-119-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-120-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-121-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-122-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-123-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-124-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB

  • memory/3836-125-0x00007FFE31BE0000-0x00007FFE31BF0000-memory.dmp

    Filesize

    64KB