Analysis

  • max time kernel
    97s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2023 05:00

General

  • Target

    MODELMAPEO-IBRA2022-Mina2v3/meta.xml

  • Size

    918B

  • MD5

    c35e97a572c97c42483d982865253d2d

  • SHA1

    a4ca4db52e36cb39a083c12e350d92e05eeffd6f

  • SHA256

    b4d2d44bde9f4fe720addf21c13c3056b2c61a807e102fecf8e0fcb83e3f94f9

  • SHA512

    91216656edb801d0aa02fbb96a5c1ef012ae46c601bd563598451754f50aa9f3e311a8b2bf3613f74d1c3c5f626053a10b398a7b1c6670044646c0f125b45587

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MODELMAPEO-IBRA2022-Mina2v3\meta.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QZQLYOG4.txt

    Filesize

    608B

    MD5

    88c7a672db09df78e0081b3341510971

    SHA1

    79db1ac73d96bb8ce99697c44ded44b7769e2e1a

    SHA256

    aaad3be44847be3bb320e1c18d593e0eb62a16b2dedf7b2f0c73d696e676b357

    SHA512

    f2cefdb5a299181437356099b3785e2bf19d127f0c5fe6be4f3d6002c1a7fc0d62672469190271b9bc9645db1fffeef33bbc0c0a749951d2df41fa7d6364eaac

  • memory/2036-54-0x00000000762D1000-0x00000000762D3000-memory.dmp

    Filesize

    8KB