Analysis

  • max time kernel
    164s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_059.xml

  • Size

    14KB

  • MD5

    3844e769bb2fb351c073cccedef09eb9

  • SHA1

    471713f9b8fa3cfb87a93b2d1767e265b150cb37

  • SHA256

    1208c5db5fc31d47379df73dad04ee2263a1515738039370f15a827e8ec6fbaa

  • SHA512

    25dca3025b1c66a45504cea788f93483fb22fb0d828eeb37cd9a1d2cbee3c96e605d9ba41163822d5d5abb3d524584f908c9f1b5d5ba804dd8707991813f62d9

  • SSDEEP

    384:bupuNo/f7hAYXmq0O976O7PDt09+9GiMUdNRvOmDRO8:z45TTSZG1OmDL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_059.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_059.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    5c0de16f1c41e95ef3ebdb0a3673c1d7

    SHA1

    0f0086c9313b19ef0536cb9fb4c92645f5942d63

    SHA256

    47cc53517b05b9fbe6f1cbab1046e09885571189de970ef28080d42acf1050e2

    SHA512

    e2082f44bd9e07324a0dfe641819cc84f52cb411933f5ab45bddc834a0aba93b79a79048728514e35b5019a63efca2c0c305b9368bfa921423eb9add54efc6ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LPPAVWXI.cookie

    Filesize

    610B

    MD5

    a073771e475a845a526f5c27a635f3f8

    SHA1

    bfb9cec52b67546068b368a33cdef6640578fa7a

    SHA256

    1caba75ac592d05d92d26346b0ef07176df48d8af2d194cc3f59aa676f98af86

    SHA512

    28810e86d7099452b7a412e510f3c227087ec931b4edab72281402cb0a660e4b3894ecd63351db1bfb166ede4c5804f22b634dde8756e99ab08fc974a5022736

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UP0G5UF2.cookie

    Filesize

    610B

    MD5

    34fa86b8a861c927ac731fd2c348ca0c

    SHA1

    d1938b873dab4a36596ea9ac5ac62842664296af

    SHA256

    c4eb74d58106c1b0dde0bd6849f20dbba838b0af054977fea28a668745f53a49

    SHA512

    107a57de376588e6405ac503e9eaee8f10afb7ec37b961cdc52d303c504b9123307b773d7f5a54b276804b8c7978b4c3b41a33bfa66a57222d7e5bd21d3b331a

  • memory/2960-116-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-117-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-118-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-119-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-120-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-121-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-122-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB

  • memory/2960-123-0x00007FFE48530000-0x00007FFE48540000-memory.dmp

    Filesize

    64KB