Analysis

  • max time kernel
    183s
  • max time network
    250s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/12/2022, 19:43

General

  • Target

    App Settings/FileSys.xml

  • Size

    6KB

  • MD5

    499e7751b019078a8a997d67e8805686

  • SHA1

    8d3bc566a990569dcd87a4862f4ea74b5a8d7696

  • SHA256

    bc713bc684b0bdda9342da9fa7e36caf7f328f32915144c6eca49b674917df88

  • SHA512

    0ccb75c55eeddfaaaf658087904bfca12c520d542789527e1248785ead66bf9f3de8478b2661814f549c6ec0bf8ebaefa1ec250199b1a6e3ccf95f6f60637d12

  • SSDEEP

    192:sYl9Bi4JFLHTSRPTsOyA0VXAQsMAy5PVzRMS6l0TE:ztJFLHTSRPTsOylXgMf9zRMV2E

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\App Settings\FileSys.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\App Settings\FileSys.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4600 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ef882f1932c9dd68c8afda2ebc27364b

    SHA1

    4593fc073e078220e8d3e5fb6cf205430119c058

    SHA256

    5144288105e9dfc259e9526551a92ff8f2edf2c15f395c4b3948930139bece23

    SHA512

    abed9efc412039e8364507af7c857e2bb88ded864ef4d7754e6b4ea4ea750217954a672efb3a6c663498858e5c7660a33b02891f0f0d2b11a9616bd7c138931c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    28659fc00db9e8b79cacddb5b01a9f1e

    SHA1

    14232eb5daf41e28454dc9d5e59bb4b66459581f

    SHA256

    c08d35e39110d24a09a13b2bba8418612013e2720b8a58a59eab05f985f181ff

    SHA512

    3ad95e570337361342c562fe732f20d5651adeeac828302bde288accb8acb04e4108d1d8eb0a95a6274fcbc6cc716c131df6ffe146547858a3507d188ccf3cfd

  • memory/1156-132-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-133-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-134-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-135-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-136-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-137-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-139-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-140-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB

  • memory/1156-138-0x00007FFC36B70000-0x00007FFC36B80000-memory.dmp

    Filesize

    64KB