Analysis

  • max time kernel
    132s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 05:00

General

  • Target

    [IBRA-2022]Mina2/meta.xml

  • Size

    371B

  • MD5

    b8aff0d3a15ef9e4f2d2fb5061e071ea

  • SHA1

    2625b7f1fd8630405d36425eed8dd7b18255d331

  • SHA256

    6a19deed347a04ee8969b64245c5e5ea9c8b1a036c74234f17bb4ab88abec15d

  • SHA512

    5576f3646d89e08303af2d1f842b5b66cd97c7198ae7cd7162684f3e5d9cfe426805d0b67a449bd30acf32c5addf0d27099accd31dd5bea5cfded46b25bbf732

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\[IBRA-2022]Mina2\meta.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\[IBRA-2022]Mina2\meta.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5016 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    03c43ce055f8989a6508481c8acb6608

    SHA1

    3dc33276158435396c4272531a62707a18a4a875

    SHA256

    1e977bad400e43c86966889b895bbf3b00b929b4bf497c791ad0ed2a0749fd3e

    SHA512

    fb69a674b2c2aa697a7c1fc94490298949831762d9d9612266314727ea85f84035df089f62e1aec24474caa1fc52fc94ea704d161335d37c1cf746c72af1f8ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    fb0413a804abea26c4011a172e20cd3c

    SHA1

    2906ab573cda6345926e0885ecd47e4ad8b6884e

    SHA256

    8297e3602a4aea1485e6f6ac81f729e663a902502f9a1e1e4b3ceba105e45c32

    SHA512

    b6b7abe581b7dd53f5ab0ceafdbce1dc3d512b211900cf337ce1ecea6830bacb689742129d5ee5cf9218a435d7a50f9b683faf095987a8a2ea0481ac26438a20

  • memory/632-132-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-133-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-134-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-135-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-136-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-137-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-138-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-139-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB

  • memory/632-140-0x00007FFE73230000-0x00007FFE73240000-memory.dmp

    Filesize

    64KB