Resubmissions

05/01/2023, 22:52

230105-2tv5mshb5z 9

05/01/2023, 20:34

230105-zcsl3sdb79 9

Analysis

  • max time kernel
    73s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    05/01/2023, 20:34

General

  • Target

    SAT-20220411-89287719(error).xml

  • Size

    1KB

  • MD5

    15ac83516ba1a66b3ecb06593d722986

  • SHA1

    f2133c904dfd27c92bb38102b383be0f0de0c0c8

  • SHA256

    81bef0a2a0c8acaf78af6430f1fa9c28f1d6687ad70c55b6e3ff39682baad0f5

  • SHA512

    32a01054b08e16ca69cf9d91195bc619f9492fe18f89726a07c62a55c89d424fbf793c4310b8c9447afec4ee7378f5f420c6abc150dd88089d73b299fd243237

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SAT-20220411-89287719(error).xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SAT-20220411-89287719(error).xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5052

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          d0fa3e14aa98e722c09df687a47d7e47

          SHA1

          862090d91c3e7a7febb6802565711bdb162a1996

          SHA256

          0a77019c86c91365155246e0dfd1b87604b9b59dd473fd8e3196c79b92e46005

          SHA512

          9ec6f58d71dfd92028caba9cbda737ef9b9df4a300cef25d23c1ed3280f2ca0679bfc97a9da46aa0e6b87f0462266b721329cbb31c93989665667b013225f476

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          a1e65aa55c923e55d6e64c6ef8165ac5

          SHA1

          84051321bb9ca1249e5ba3237505091b0959176c

          SHA256

          0d8c45dbb541b8e6be471a6a4f69547d202fbc6d2754d3b898826ddb25aba597

          SHA512

          4f12e9aefc2776c687853b1a7e4facb94434a744096e7f73e8c4627cb1ed93be2bb2aaa3033b391d8f86dc869a351cda9e0011c2cb150b40617e6c6eeb0d7778

        • memory/4984-132-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-134-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-133-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-135-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-136-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-137-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-138-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-139-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB

        • memory/4984-140-0x00007FF8E38F0000-0x00007FF8E3900000-memory.dmp

          Filesize

          64KB