Analysis

  • max time kernel
    240s
  • max time network
    254s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 10:22

General

  • Target

    img/broken-bicycle.xml

  • Size

    19KB

  • MD5

    aab8b48d58c4e0f7f6845f963e1e9506

  • SHA1

    6a50ea51a4e4348035bbdc0d035ec40c985e3b3b

  • SHA256

    79f8e1cf48d5fdedf05b851f054a65236785caf126f81afedd675a20bf31f654

  • SHA512

    ee8f58d202f75a1f054ad16b6d00a0ae31728db8dc806e0cb4748b512f1264bbf6dab682334b7598dae2d6db5afdb4e7ef2c707e9133d97d0d5b787514344f94

  • SSDEEP

    384:dyPJouYqrD56FyXcFHijWjEVZaPExf0RiVB6RSSWYVKdgq:0xoM56FyXcFpjEbaAf0RiVB6RSSWYVK/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\img\broken-bicycle.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:296

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\17H381WU.txt

          Filesize

          608B

          MD5

          0449e0444714561c9c4f4ac68e5769c1

          SHA1

          cd0e9e376c38ab0e220df7f7abcfa29d462e999e

          SHA256

          f67712261293e0683ae3f3fb46c4e0d7e009939485d4997f7a690dd99ceda714

          SHA512

          44a0a74ddfc650a4b8911c292ecc5dbf7dffaaf0f9e01a6ad6328247d35ace02948faa7d68ba6bd1da1514bbd17cfdece681ff30c87749a0c5d784d23e5993eb

        • memory/660-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

          Filesize

          8KB