Analysis

  • max time kernel
    90s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2022 08:33

General

  • Target

    var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml

  • Size

    14KB

  • MD5

    0e55270998fc0c67aa140fc2cb9117e1

  • SHA1

    be0b50a0d2d306f15fd81b97a3a22384ec15b54a

  • SHA256

    16954b97a5218be8d0f5bf0a96db937ed436ec395ec6a28523d6cbe31850e257

  • SHA512

    49d4b74d7603c1645566efe54dcd5084a3273229ee96389cac0ff6eb18d22d930e531505edd73b73d8d410d94baf676e67f832faad915850b86069b872d0df3c

  • SSDEEP

    384:TWHLM3ZLBFNRFOdyN15FzfIc0AFqrORK9+fbtbnehCqXjhK7K:TmWpBFDFdFfIsUSRKYRDwpXjhK7K

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\www.scarlet.be\customercare\_fonts\myScarlet20170504.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\www.scarlet.be\customercare\_fonts\myScarlet20170504.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1088 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3460

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    35b6b5a1266ffd7f45cb92dc368b2f1f

    SHA1

    8c6a245e00c2f517086b7db9a2c24e876cc79f85

    SHA256

    94904b4d34cd577e29be5042bb21d65e685047f3591f3051c2c9850681d53ccc

    SHA512

    bce75bc358fb0bcfba3c071e86634dfefbfbcd9c3cb1057d4e4693b0b19318ca0ec837e8a2d7ec9308042a71f49650cec395bc6a054d12e7da7564af2fccbbae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    45fb6f1bfb3578edf5e57338ccff218d

    SHA1

    db75cb18daa78292df06a15521bb58196d7880cc

    SHA256

    1f845d4a2e4dc72c895e0281cbaed3728cf5c56ec2a6fa7a0f887edb94928252

    SHA512

    e7eac110d85299cdf2029ee09c00319bd90cde0d45176a35b1fa57e5bcce0e196e242b3284b9d3b3cdfb25873780c5a831a5054fb98562821443ff57622cb099

  • memory/5012-132-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-134-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-136-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-135-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-133-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-138-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-137-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-139-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB

  • memory/5012-140-0x00007FFF1A650000-0x00007FFF1A660000-memory.dmp
    Filesize

    64KB