Analysis

  • max time kernel
    98s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    28-12-2022 18:25

General

  • Target

    publish/share/icons/Adwaita/scalable/status/semi-starred-symbolic-rtl.xml

  • Size

    7KB

  • MD5

    436a6308d075793b72ba4d32e2ac59c0

  • SHA1

    4efaba46259016b32dad665b33697464cf0b7f6f

  • SHA256

    8b05daeba04927b256bc7222641265a22b400e43312ec910c797adda7429384b

  • SHA512

    3a75f731ddc5b7bc99fa9b97f9a992c940888ab13992203cbb19175fe3414f5b8a2ddc4c51ce5e72bbc3038422072d3bf9039a89ceb0db0beb885a40776222b2

  • SSDEEP

    192:BkY3alVUOkLcQaVG2DDYg5PzI2yDj39CV33qaOjzslduXgcbtyC:aYbtLxaV9/Y87ByDjwV33qa+zr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\publish\share\icons\Adwaita\scalable\status\semi-starred-symbolic-rtl.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:280
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1780

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8X6336GY.txt
    Filesize

    607B

    MD5

    45611c98b256ca90e556279e3ecb0331

    SHA1

    3a103358e7639bbbd7ef7a9fc9d518c1ff178989

    SHA256

    36ef3e5a65f2a9e2ce5adecc8beb9910e02d285b93ee6ff1235d0a500ac562da

    SHA512

    e442b4b74528b58f28dba2f7c9486dd2feb4c827dea568c5af826a558487590d946d9a83030a1456961bfc9b0bc7323bd8fd04b6305878b96666ec3a7b1dc09a

  • memory/280-54-0x0000000076601000-0x0000000076603000-memory.dmp
    Filesize

    8KB