Analysis

  • max time kernel
    123s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2023, 20:25

General

  • Target

    Software-PC-2023/playlistformats/resources - Copy/MissingLinkedElement_Dark.xml

  • Size

    1KB

  • MD5

    29f044467dde443be87dcdf7518f9b9c

  • SHA1

    bcd4fd5bc8987a6e10095253e0de2d76abcb0bbf

  • SHA256

    16f2efcbb0246a503a86f50b8f966fc250a72a8ab8c3736bc0cf79cd7ed957d7

  • SHA512

    a60b9505fbf0bf72389ec574e4971c3b13fb3db87abdedb453fa3e9cbbc966e3e4e95df89149a0d519b08bbe9a2057c0b0256b831702da4c946699faadacafd4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Software-PC-2023\playlistformats\resources - Copy\MissingLinkedElement_Dark.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:324 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K2XD8G1S.txt

    Filesize

    608B

    MD5

    19b922059d05bdd34588b8c5710fc0df

    SHA1

    aad591db194d7e53fde76edb2b7d024bd874321f

    SHA256

    7761e1ee991e55e2f09103689e2f5320853a3a62e4ad6fe386bf2ca420aaf2dd

    SHA512

    846ee5368b16071b2dd3835ffd2587f00abb758bed44990e949a3045323117c63ad932f1fe4e4bed58815c0b3255764d71c58e53e0dd566ebce35c51cc586f1b

  • memory/976-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB