Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2023, 00:27

General

  • Target

    idle_master_extended_v1.8.0/IdleMasterExtended.exe.xml

  • Size

    4KB

  • MD5

    5bee443e098ae02d6c3028f59ccab87b

  • SHA1

    950bcebb1a9dffc204368b1d895b0de2bf5d0cc2

  • SHA256

    67daa487204c6131338158473b44bb0128acb82bfbcda60453bffc4d238f5878

  • SHA512

    47fb13e325eda48d0afa95b0d74fb424261ea7e57391c0e4414ac9ac47d0fa9824e4cdba6be58a3c169e8047a0a75a87bba130759a2ed66c372683d089fe256c

  • SSDEEP

    96:ur71O7Ka6JkZ9AvmvLAvjAvUAvpIQZnsvOAvPognbAveuBvxivOvfMAvKnwHAvDi:ur787VYAMr0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\idle_master_extended_v1.8.0\IdleMasterExtended.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:268

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GP90SM2U.txt

          Filesize

          601B

          MD5

          cfc1c9eb7dc681b8ed7d9dac14bfc5fa

          SHA1

          904c39607655e92e0d8f18f139ab0909d56c7bc5

          SHA256

          f7366f6d68eb81dca6a734c5c123ebdb04c26c44fef3d19d9e5643ee5f91bd45

          SHA512

          522d34b21bb51a9fc33696f8def55982a9a577cefc7bd9e452ef18bc08e41ba42490a8a6784ee991bd097aee47e86b32c71e41d16803808669f41b38a3ee4178

        • memory/2024-54-0x0000000076391000-0x0000000076393000-memory.dmp

          Filesize

          8KB