Analysis

  • max time kernel
    143s
  • max time network
    227s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_062.xml

  • Size

    6KB

  • MD5

    98db3b85e03079fe22dd8b652ee78446

  • SHA1

    c5a85bdb25659b9b797d644a5fcf22438d41d5b4

  • SHA256

    1cd1f05715808a7ae3a196826ecf8acec44538b9e11ddbb6e0322c3111f9a210

  • SHA512

    4519f47ad223272ad9f78a5973c8fb76eec58bcc0398e92b791d119c1f0492164f953c7461e7c0432a9a6ce3de7a0dd8e78bd265512f6cb2d2bfb1a45dcd1e8f

  • SSDEEP

    96:b/hdqGWKDY5+DFIuEghurcSP3DDDPrb7//vWBDyRCDDDeDtqfzboFpixsPtqovMU:bzEF5yIz7v7/dDkbbE3V

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_062.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_062.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4372 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    2569eeec25c03b1f013a86cc915e7ada

    SHA1

    82ce89ae625bc8ad0f1b807834973cbfcb1f6d74

    SHA256

    209cc7ff2097fa1039fecde08ab17e50079e0243afee29ee4e3c03a49bbd6540

    SHA512

    48e464de2e2c2cf61c85eddbcd105a9bda44bcc78fb47225e950152d3f4639f36dccbf4d35b95f2eed03c580d9dbc219882711f307655c268e495bf3a21d9c08

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\P1VMYYOL.cookie

    Filesize

    610B

    MD5

    6e36371bc718a8a398b95e032cfd27ca

    SHA1

    bd7fea22c2be602d164df97df44ad8d5cbd94cf3

    SHA256

    ab4ddd87e99c28c073fbdf3557f710e1203f772864fa8ddfc65faf4ccb41ef8d

    SHA512

    97dcb2b9929e8021cd83cb40462aaadc661e01a5fab6eef8344251b8764bf71256636c65e81247138422a4a5d5b43639e973942bba102c6d8436f8ca3a02e92c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\PCH9WG76.cookie

    Filesize

    610B

    MD5

    e6493d162c082aace4358a757c5d7ab4

    SHA1

    9ed8b3e58b8c6a1631d236cd626db1c5ca733b09

    SHA256

    013d31866c39ca1d2565384cd2f16e8a2a89da303da076d11ce8b56e4bec105b

    SHA512

    5b93c3379eb40b2d4b144631edd9c263f75de077a5a8a77e7af5deab6a81ace4b8a1676575b1a32791b8fa50ae8d476a9deceaa335b4942bfc92bf60836fb898

  • memory/1756-116-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-117-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-118-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-119-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-120-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-121-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-122-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB

  • memory/1756-123-0x00007FFA5CE30000-0x00007FFA5CE40000-memory.dmp

    Filesize

    64KB