Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 10:22

General

  • Target

    img/Twitter.xml

  • Size

    20KB

  • MD5

    bef487f0d21048dd3cebb38cb7e5e347

  • SHA1

    9e5dc5871ac9347b017a0800822c78ced91659ad

  • SHA256

    5930ac428fbe704f3b697937b1f78d5392be2f6ecbb398e5257a0c065179cc47

  • SHA512

    824ffca3afa1f6283377c93f8ff41a6eb118daeb305b412efb1387010ac3fe05cdd43d18887112525177eb9dc5583c83ddee93ff2e29a9fb5c2c2996b5692c74

  • SSDEEP

    384:s2ket0N3PaY8ncMbQFagp7vw6CCtQeT27WWGFReQh7lXmIz:sjet0ZaPUFtvie27QRBplz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\img\Twitter.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KVY8J98P.txt

          Filesize

          595B

          MD5

          8f86f6bf8f2dd5f4651f6353b1c9864a

          SHA1

          52f5edba050aac1a1c7cd0f89c53e098db42cc1b

          SHA256

          e36abd4b9448ebe0f4129877227de5a924f6c5a9b3ece2477c65e4637a7a9aa4

          SHA512

          1835306c8c6212b1932b222ea014473c5903b5882f008a06cedaab3a4aa1f0aab85364d9813315328360037c5991744fab12bc682b2231f847abf1168dd82150

        • memory/1720-54-0x00000000762B1000-0x00000000762B3000-memory.dmp

          Filesize

          8KB