Analysis

  • max time kernel
    136s
  • max time network
    242s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_057.xml

  • Size

    1KB

  • MD5

    891223d75c88f06a70281a33e16111b9

  • SHA1

    d44943be450e6a166c414019fb150d1f91c7d980

  • SHA256

    a513e78de4f7553fbfd9509457b971005ee4a9385d45fa04588e94f1637bffd6

  • SHA512

    27d57c44d92446b68c63f1a112fd18fd5d64fc0ade12460071a1f8faab8d118d15922e88a77007f8c84d2bea34f6ae924300dd2303d393afde7b16b3c61b64a0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_057.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_057.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    31df8b673385f0fd54b8ff71133ca02e

    SHA1

    2a46389f55d3d8f6f27ef9fd595e24c29ff172aa

    SHA256

    951e360b40558c6979c9856141691b927cf2889db6a6e62294ec07cdd95d2a65

    SHA512

    23bb0b4162e0cee52ebe51848d56a5756a9f1d4effa9415f8a1c71613574417ec3cfa7c91210aad1238a62c166f4ce527ea381d725fc28d626c746cc03f89d22

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\AVRA9J08.cookie

    Filesize

    615B

    MD5

    c7f230e49ccf6aea2a15a024a281033f

    SHA1

    b5e209b13085790cd8e08acdfe43781be7ec7dc7

    SHA256

    efb5f547ba6098cc78cad6b2c375467239d0deea0bdf0d6b8f705bd50c73f3af

    SHA512

    fab9394d2b5d688ed77eb5929214ae67b12cc08a532bf6ce1f69e57e9c5fffd1ce171adad7e68443a8e239e0df1b4e350dd3a9dbc6084de2fa9daeb19ef826f5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HOUTEO8Y.cookie

    Filesize

    615B

    MD5

    25b7127377f41102fe1c05c8e53fdcf9

    SHA1

    41efde319824fb8a489fdfe2af171d1461bf117e

    SHA256

    92ee1f7001a79fbb14789216d4b38f6a80ef80fbe96eaa19547ece7392a8c005

    SHA512

    5cac2263a61faca290ae18d765546a176e6da243d0023593505c1305c2b1f5c8b6849c56f2e2d7c03c5563e43f7a0cc86a7c9cf5ca4bd888563c9c03710f58d4

  • memory/2132-120-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-121-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-122-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-123-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-124-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-125-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-127-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB

  • memory/2132-126-0x00007FFC640D0000-0x00007FFC640E0000-memory.dmp

    Filesize

    64KB