Analysis

  • max time kernel
    127s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 16:54

General

  • Target

    temp/ppt/_rels/presentation.xml

  • Size

    976B

  • MD5

    30458f5e03556be70306d60af7fd4440

  • SHA1

    491a488a3193351732dd80623993be7a638c1c89

  • SHA256

    6c38eb3088da6ec9ee6f33f157e329c366fa21ea95fcb45bde372a249590822e

  • SHA512

    a881588ee40b18f012a39571b485463afb21323e0725c2d395d808d5131701cf97ce5247facac8a7fb8ee6d782cfd7c55ad93f54eb22753bec9a89a10200d3d5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\temp\ppt\_rels\presentation.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:564

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\74NBS2I2.txt
    Filesize

    603B

    MD5

    dce07c8135ca657128033ad2c3ac3b29

    SHA1

    0f829f234d55a81df7be31fc8103d6c18171f79b

    SHA256

    a02496803c7fc64cd63c7ef01b3bb6344655755d2ab596033544ad68be76abb7

    SHA512

    3edefef51d4ab8d3d77118df1e5c5716df4007c9c51315a32b01e2944e26a54e49fa32615f59dcd5ad90b978bf7c70cbbc4589f351361a22a92f325c56715e1b

  • memory/1296-54-0x00000000761F1000-0x00000000761F3000-memory.dmp
    Filesize

    8KB