Analysis

  • max time kernel
    92s
  • max time network
    226s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_086.xml

  • Size

    6KB

  • MD5

    582528de3d8b1434983db9a1ae0e1fa6

  • SHA1

    0dd0d840d60064cd9bb28834265ccc9bd91db68b

  • SHA256

    c46a2051c283a69e4e2f5e31c5141b225f34e1e8624fdb028bafcb6f8e5631e0

  • SHA512

    a9630e799ce3399b9bb6609d74c492a33b71e35fd54f057af183ad91108979ae820748aed8a3ed975f1d1efeb23453ccc49af9fa274bdfc0f8aa28885431406d

  • SSDEEP

    192:b0XhucKheMlQzXvxhHWhZLygXn9hqYGnZeWItJrPIgt5XtuCLXag5HfRYWEdb/1C:b0RucKheMlQz/3H4ZLygXn9hqYGnZrIj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_086.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_086.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    af447b1f68b7fcab39c736b07c844168

    SHA1

    e5c8d7b055cd8ef14812762fb6677b5d26a4c8cc

    SHA256

    211c2deaf2805a6b76c794cf731aff574bccba8767555692806a90de904c2df7

    SHA512

    bf6c6df731f08b75ead408cb2b4313562368a978180f21afd36b7e096884056b3c69208628ffaa0526b3617028fb84cca1ec43e0046c91b1aba14fd8492bc8d4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\06PS7RPU.cookie

    Filesize

    615B

    MD5

    518fb161f168beff59a5483eb5e3624a

    SHA1

    cf7312cf48cc50561cb6df32bdfea8bf23b2b5b7

    SHA256

    7aa7047a1383c38348c18e242aa39fa58f80bded09f7d90a0a231cc63a87f601

    SHA512

    73a8bd7eea360a98c527ab8005da1cb1050921e4008489695a00e1a951f3448f016488b801e3371f107e615fb314757d180abcdd51a221ea2aa79ffc1afd0ab6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7N555SBH.cookie

    Filesize

    615B

    MD5

    728807f94bb9cba9492bb849b9393fa8

    SHA1

    457e43bd3c29cf7a65474585a11ee1eb5467a61a

    SHA256

    210edf3a81a6e6c38296b7737dcad75cabd30f2cc6e7a3ba41dbf25dc6abe17c

    SHA512

    b25469f9dfd74cac99b1b08cd52407413b865156ad710dc49eb871558712993fc47c29840d06d7eb06f574c982ef601485fb27a311de3488c9e3c1a1b8442326

  • memory/2844-120-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-121-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-122-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-123-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-124-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-125-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-126-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB

  • memory/2844-127-0x00007FFA36200000-0x00007FFA36210000-memory.dmp

    Filesize

    64KB