Analysis

  • max time kernel
    135s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_060.xml

  • Size

    15KB

  • MD5

    d4458b9ee4f4f389f2d9cb310bb98d3d

  • SHA1

    a3ba2c045f20dd82d09b002643e48481f8d6ba0e

  • SHA256

    56774ab2700d91928053dc16947eac6f6577d5ee6bdd6424dd9464e2946bbe3d

  • SHA512

    3e5bc2b38fc1b4a2fc409bddfd68d80cccebde34820c241876002fec04348d6d6d7649a5865b59bcf8f15ce9d98d3d9296000ef1de92a8875788ed570b76c2ca

  • SSDEEP

    384:bPKIxX7X7L7st7E7ce2aHASl5lbJVDZpNG1D/wq76aXFR67DO57zC80oOG:DZxmaHjl5lBGGqG3HO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_060.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_060.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4608 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    a31773bb3babe54468e5f897020ff5b8

    SHA1

    3d1a0ba3af7ed75a056d2cbaf6189368d5495a85

    SHA256

    63d4de90c1ffa9ec4fbd700bc13e8c2ba16ec1882ebe8d8926e732afb19b6637

    SHA512

    53448324f74efef5be135a7af2181b52707595f40200fe72739826022962ab0d254532c209de493abcd55a2cb943868986e082deb354c60454aa5b64fecb6a72

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GRALIEKT.cookie

    Filesize

    615B

    MD5

    a807b77785e8fef94df536e2f248c515

    SHA1

    dba13f686c1a380eab15b5b97bf5d5c6d9f76d53

    SHA256

    59a65135b56e30845e882a8c677c65ceb1c7c4f658ac4f398ebb0dae40e8ba6d

    SHA512

    37e4ab5fa58abb9298033a31e1ef677c7f093623db278252f758fb0f67657adca841d461b73e37a27f703baac974f0bf9930f9c3fcce90d503eed88f9e00f72e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HCP83SPS.cookie

    Filesize

    615B

    MD5

    6bbd1d8653ac90cbdd9a1cab881e4420

    SHA1

    33acc5920e23d027697896f2d4be3ded7f8533c7

    SHA256

    07bcdb3f67953549e1707d631386f11c14777507a359455c4ed5852531d17edc

    SHA512

    2032b8e94b3fa0e7ce5d16c6feeb9ac024c94349b12d8e052c249a34dc78233ae00decd0eaecc5193adede4634dba3cb48e4eb51f0c1e72ad898001ce55715b0

  • memory/1928-120-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-121-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-122-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-123-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-124-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-125-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-126-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB

  • memory/1928-127-0x00007FFF48C50000-0x00007FFF48C60000-memory.dmp

    Filesize

    64KB