Analysis

  • max time kernel
    144s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_058.xml

  • Size

    25KB

  • MD5

    7e95967dbc295641377f096ed0abbb96

  • SHA1

    c9518c9bd2e18e40aa64ff98f4dd69ec5a807302

  • SHA256

    e2f2b5e37b1b7c8dfd52dbe8a9f5fcc9f241912331c5967a7716e1c663620450

  • SHA512

    8d79783b16b0aceb0f34be1ff54fef72559766a5e7d705503fe56b570a0ea95a34ef5c7cbc9959e4ad55ec91223fb042e424e1cf640a088ed628ac0a9dfd2f73

  • SSDEEP

    768:in7g5YeRQs6Nba1G5csWhWW1gD4OdTd596G:y7C7QsOXesWhWW1gsOdx5wG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_058.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_058.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5016 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    88f7579ae6a8c42e5d072fe4c286c080

    SHA1

    c21b6fcd66ab2703ee4c60d0ea226e92f79550d9

    SHA256

    35c688836bad19d720d09d1c811f2c0b5818958b653b069f29c1d271dae87524

    SHA512

    6eee0168c352b246351260a9b9510fdab50daf7d37da975213364d8b89d3881c9af1c8c70deb3d546d3d7cf1011b8d3e3e81fd58bce42a69cfc9aac07b10c99e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BCOCSLBE.cookie

    Filesize

    610B

    MD5

    94fb30267d972e3306d82d496420dffc

    SHA1

    2f45b1625b931a9ea219e95ea9e66c4c88fe9c2f

    SHA256

    b4818eefc384aa029d0905a0830c76ad72f1912699046462409517d8063cd5ee

    SHA512

    9e6c13225e65e22b8d2dad0fd863b389e26aef19f80b8d6d9ee0bfcbacf3cca7b04dde0124cce9a25a0509fd9ea6914fd85d565472c34af784431c1e2c40a884

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SD4JISFQ.cookie

    Filesize

    610B

    MD5

    f793beb4e488bf469f28a7784675bfee

    SHA1

    2a7957818a0beb7563f5f1c5c76f910e42e1dabf

    SHA256

    8198b1c2f4f6a675cbb59cf11258f4a6153942f8177da6f1f13062e4afa59054

    SHA512

    17bc12935e185f4ac62f1b814d872102e7077015ba36617cdd915ab65585724931afa877c484d65f21ca2c99de09e4499ece96b97af659b7626d0ba8f41892bd

  • memory/4324-118-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-119-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-120-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-121-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-122-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-124-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-125-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4324-123-0x00007FF83D3A0000-0x00007FF83D3B0000-memory.dmp

    Filesize

    64KB