Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 05:00

General

  • Target

    MODELMAPEO-IBRA2022-Mina2v3/meta.xml

  • Size

    918B

  • MD5

    c35e97a572c97c42483d982865253d2d

  • SHA1

    a4ca4db52e36cb39a083c12e350d92e05eeffd6f

  • SHA256

    b4d2d44bde9f4fe720addf21c13c3056b2c61a807e102fecf8e0fcb83e3f94f9

  • SHA512

    91216656edb801d0aa02fbb96a5c1ef012ae46c601bd563598451754f50aa9f3e311a8b2bf3613f74d1c3c5f626053a10b398a7b1c6670044646c0f125b45587

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MODELMAPEO-IBRA2022-Mina2v3\meta.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MODELMAPEO-IBRA2022-Mina2v3\meta.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4252
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4252 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    03c43ce055f8989a6508481c8acb6608

    SHA1

    3dc33276158435396c4272531a62707a18a4a875

    SHA256

    1e977bad400e43c86966889b895bbf3b00b929b4bf497c791ad0ed2a0749fd3e

    SHA512

    fb69a674b2c2aa697a7c1fc94490298949831762d9d9612266314727ea85f84035df089f62e1aec24474caa1fc52fc94ea704d161335d37c1cf746c72af1f8ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    360b1efb02d5f1131550dd701c28b64a

    SHA1

    a9bac9a9d1beab804b7cfd4f43a47c89b732ba37

    SHA256

    df024de8af29b412ffe0ebf79ef140f5ff4f5f56fde498d68b0397ce967107c1

    SHA512

    e6946a82e24f1f94b481828a61fabfb743d7dc10b1533de2f0b12861fce6cfb0d60cab128e0feda3b89c306cedc1d4e5e1bc672497ec7c43072e27c5fb1106e4

  • memory/4160-132-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-133-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-134-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-135-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-136-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-137-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-138-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-139-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB

  • memory/4160-140-0x00007FFA01630000-0x00007FFA01640000-memory.dmp

    Filesize

    64KB