Analysis

  • max time kernel
    440s
  • max time network
    530s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2022 05:06

General

  • Target

    SoftInstall/About/en-US/AutoPlay.xml

  • Size

    4KB

  • MD5

    935c602dad3f4335bd16c269e66dbfaa

  • SHA1

    3df4dc6d55af20f0593d807fb4fdefb23cc3355a

  • SHA256

    8773998440c8d534fa69833174d05d09088f07e6e5c0e41d7c04a229c7903879

  • SHA512

    05abffc0ce836f7438bc711a9d2b5ceb8f3f1c48be2ac9c1a91d286aed6fc4c8d740ae802dcd2cc65d066972dc8daa84ad8a10fa775d66cb5f3de34688d975ec

  • SSDEEP

    96:LeD5pmCRsKp7RqiPKhB3a1jejcM64iVDJaqV:ELRRp74a1AbodJ7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SoftInstall\About\en-US\AutoPlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:364
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PEX7JKBC.txt

    Filesize

    594B

    MD5

    0979a5aa60434506b98576607f4a50ce

    SHA1

    e293447c82a56636dc9958ff4e01d58cf3dcb564

    SHA256

    9dfb598d18bfa8c889ada6f08fbdcc887bda54fe919e88d4c549910d47f2cf96

    SHA512

    b9afc97624393dcf18392be6bdfc830aebbadfd5818d9502ccce707d6bf016adbf6b4ccc28a46ae8ebe52e8c83584ea2cec1bce33a1d2f2f06497ba5aeb03ad4

  • memory/1400-54-0x0000000076041000-0x0000000076043000-memory.dmp

    Filesize

    8KB