Analysis

  • max time kernel
    106s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:04

General

  • Target

    base/RegisterUninstall.exe.xml

  • Size

    270B

  • MD5

    455e49ce62c15e710109e27d796bc07b

  • SHA1

    c5fb946c32bbf485298ccce382dd7ef360e2b80f

  • SHA256

    6353cd37e2d0debdcec72ecad91e6022dc14b355462a1cc0350993f8a268017e

  • SHA512

    09e45a644654e477116ca6d8fe96f2cdb3b1fb5269c4a694cb7e8e3e387ce440e250bea4f9b792d4ffb56a057379447e1d7ce49aa3416fe0181ef0f5b53f532e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\base\RegisterUninstall.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:740
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:740 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8SEPI4LH.txt

    Filesize

    608B

    MD5

    4a2922ee2973db521f34a312a8beb80c

    SHA1

    56c21b3f7bcf25e566ea9efffa51bdfd7adca1de

    SHA256

    42ffe100d7c09f664ea9a8d176d991c95c607c034b89455265772e0ff3e3a97b

    SHA512

    177835eaca1bce4bd3ab0160ff233eab7351ac3a0ca19dd5bd03f527bd415261ae5062e7a02552a04fc22369f77ef675c4bc56c9314a064a61296b6a3babb42b

  • memory/1252-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB