Analysis

  • max time kernel
    149s
  • max time network
    200s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_061.xml

  • Size

    6KB

  • MD5

    056fd059a4a6748ddd2533fde9fde15e

  • SHA1

    4d740bfe098ff52ab0b8386b636a9936a42ff009

  • SHA256

    a53bf28486c727394c4172c26911023d2e6b241d8bf4106a1c95d2802ede02c0

  • SHA512

    e1a5d3f39165e4364b03333745b0a77d8949911044ab1e2b817646454b836b087d1967cece09ff75ad37a08d7ffacbbd76e33e5af4df6bdce878823b6e18bf71

  • SSDEEP

    96:bChj+l+FNaWmBDWh3ZDJ9tDiw5apyZuGT9whUyWZaFPoRCwkbCwG5dvlChMFHgfg:bFl+2WjJ9aGRWM1qs75j

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_061.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_061.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3836 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    c3ed607e024b37e33517fee9ecdba293

    SHA1

    b50f42a52abcc9d8246752636e811a24bf662961

    SHA256

    cc91b063fd9dbb8ffc05e4c527b70fa5d40f899937846b5486a76a0a03af4b93

    SHA512

    91f80f7d2ed92821f368fc1d00f1d75661f6817ddc26d3556e80dde465450542090d37eb0e83bcc97f9340a3f5ecc5dbc54a0635b04d74ed5e49a36afd62be94

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WCXFCSXI.cookie

    Filesize

    610B

    MD5

    dc2ac597f509841f3404a82dbd523323

    SHA1

    1ed7b81217114497fde33a3fbc9add52af8fcc4b

    SHA256

    782888f2eebb62cc5f77dead6b6dc10a65e3359fd0dbc75bb9aa3168803bc89d

    SHA512

    0501095c2448fc8b9c6a607ecd18499dbe74bad97eac31c4972ee3896a349cf8e1ea5a677de265971bb654ee1fed7a4cf3ac6fae9d7c40e8cbed0be426ea3e29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WQXO0HZG.cookie

    Filesize

    610B

    MD5

    f4998ac3882494ba1cb661d4961a9a93

    SHA1

    e8987885f6037f65705c5a57eff269fed8208df6

    SHA256

    0ca93f053d894ed224a53b0288c6c4a63ce737d5883ca092013a89721c125e3e

    SHA512

    632ba13ef26f156252f45d0dc915bc5f6b8a2fbc638226f19234c8848146df8136174623f461895a89359848cb81a27fc356fd5f38b5290a4d3407a5e681e2be

  • memory/2668-118-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-119-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-120-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-121-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-122-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-123-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-124-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB

  • memory/2668-125-0x00007FFDC5500000-0x00007FFDC5510000-memory.dmp

    Filesize

    64KB