Analysis

  • max time kernel
    104s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 10:22

General

  • Target

    img/FacebookLike.xml

  • Size

    26KB

  • MD5

    61afc24c2852e7424235e464df6da612

  • SHA1

    dc1cfb80b1bb74723cd79898d72ddecf2dc9b4c4

  • SHA256

    e09f208c4c046e66aabdc1ab55d9c90bfbc3a4a5764b7177c28c52b3391b73f1

  • SHA512

    fb04adb71a7d80fe3fdedce4b5ede0cfac196cf1ebc25dff94c3485285d905396220e3f09c0e7de11df9ff23624116a171c69d8fc792a575151d8eb408209362

  • SSDEEP

    384:sFdR8VpN3PaY8ncMbQFagp7vw6CCtQeT27WWGFReQhX2BsP4WvXYjNOtMdBeWXs:sFdR8VpZaPUFtvie27QRBpEW8SCBeWXs

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\img\FacebookLike.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1816

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2Z3J4DCA.txt

          Filesize

          603B

          MD5

          2aeee51be878ab04b791ae82ba40124c

          SHA1

          e58cd799e0af5d46e4cdc078a6536766195209c2

          SHA256

          f90704c2a3100bf6bb559fe28ebcb6fa9c55787dd1acac615ce4d32588248ec5

          SHA512

          771fcc8bf055d8402fdb0b4a5079f3c9a09b3ebeab5e165c3bd1105a29ab4472ef1a73b5f0fc5e72e5229039038ae644c27a79625bb7aaca8fcec4b31ca39622

        • memory/620-54-0x0000000075711000-0x0000000075713000-memory.dmp

          Filesize

          8KB