Analysis

  • max time kernel
    231s
  • max time network
    354s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 05:07

General

  • Target

    Meeting_Agenda.app/Contents/Info.xml

  • Size

    1KB

  • MD5

    34d8507fa6af3f52c4261459135815ef

  • SHA1

    49607cd7d1ef6bdb8387cc8522deafc8452d1564

  • SHA256

    1ed70921fe4c0df16031054a9ed835053b3657084d15ce7e1de68bddcc88cee5

  • SHA512

    485bebdbf797f5a9191df6856661c19240703741d2604a45e64ade87c426ade21bc63428d6f96ae3c879cdc3d0bad3804308d741e84c4254a3809ec5c126342d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Meeting_Agenda.app\Contents\Info.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:768 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YMSAYJO8.txt

    Filesize

    608B

    MD5

    ffe59e00ba98f1b447b0d434d5176706

    SHA1

    5c3c221b49f2ed316f80a5a91ac419a10b71b64d

    SHA256

    6426c1961b52a487f9697c81594e05033261a059e518b57b5ed7afaabca4b855

    SHA512

    2d6f53af1a4d76d16dcc234d698af73f1a19e86d59b55826d12b5648a7e114d3d1412e84e3a809ef3749929dd06e5143e7e7b44dd50fcde012d87dd299372d54

  • memory/756-54-0x0000000074E61000-0x0000000074E63000-memory.dmp

    Filesize

    8KB