Analysis

  • max time kernel
    304s
  • max time network
    311s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-11-2022 12:00

General

  • Target

    text/part0000_split_063.xml

  • Size

    3KB

  • MD5

    7d0e7879987e36d07b49481b541c2b22

  • SHA1

    47654a3ccb9bf8187c991b18d732eb537df0ba21

  • SHA256

    078540f69ea8c9e61ad5e630bcfb8a1e751e52b2da304ae65c87b49e50e39f6a

  • SHA512

    241faf60cf7e077b373c70c4a93791e811bc2b1deb48810f1e26cb4872c50f82ed8df257a36f3f1dd6dc16be5552e183d9cade050905e13192f806bfdabc3486

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_063.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_063.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7b35d09c8d594ddc91418302b68198a6

    SHA1

    74cd30ebe4bb6d31cb7a0b2987590f9ce9ff8659

    SHA256

    286981a655ce6984be66771a091daa1bea33a43cb7233ac74d2f43825281ec05

    SHA512

    a19a14c619d3ae1600595c4e21a1ae9112548029bfacfe0fb877ff0a7cf5d147370364444a044b94b69a088f58ce8035d42ef33d756f9afcb970fe2c32b8dd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    661daeae365971173d8935a906b3526e

    SHA1

    ef0deecd6ba43ad8ecc226b641178a438cfb4bef

    SHA256

    4856ae3ad2b1f87e7ac33e618feb44587dd98231a7f80af8e69090cdbbddf179

    SHA512

    ed658e760ea4d60e9605c226a1295746c1addb7480fb5f8a8379487f54104e2bd389bf0197c66b2649e0d9d7ca290458062f3034753a9514bc0f0af1a2ad1360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\P2MFX4IY.cookie

    Filesize

    615B

    MD5

    11cce94f1dc91a6d0e28628cf5c86b3e

    SHA1

    9737aa3ddc0af4c58b0037f1d65e6d990cf246c4

    SHA256

    73a42ff76c0be0be1e7dd9b78966a9fa5d485fb49e9d7ae0ac7f911ed722fb5e

    SHA512

    82ca2727dd1b5654e532136d83a625bd4dbc58287d249a5504f6cb8e1e6b3042130c46671262f76f6a4aac995245fd2c8a3f9916b569be039ce61535b79787bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\S01SWAZI.cookie

    Filesize

    615B

    MD5

    430e5c7b1523dd3fd3e45b21d18eac90

    SHA1

    9a20954453ebdee7d7feb1b1a76743a95b10feb3

    SHA256

    90ded6ee30f7a4e799bc5177e3cc839e39050248d65f66a2906ec4c5c49b0484

    SHA512

    58396559f5729381dbbad3e983e617171287adf204f2eb63455c7f690574edde715f707617ae56dd5e6780ca441b7c3a6e019de47830994800ebb198bea1091a

  • memory/1180-120-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-121-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-122-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-123-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-124-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-125-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-127-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB

  • memory/1180-126-0x00007FFC93420000-0x00007FFC93430000-memory.dmp

    Filesize

    64KB