Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2023, 16:53

General

  • Target

    Office 2021/files/Configure.xml

  • Size

    896B

  • MD5

    833c73375131be102adee8d3634ae817

  • SHA1

    43314c61d3e3c3a2f0590b31edb48c475eba0952

  • SHA256

    564bb48f40ddd861a0603487dd46dab646beaa672259c7899141d8424a673e36

  • SHA512

    dd5449677c18c95406eab01a51554087461adaa1bf65cf6069c26cdd42736cb02222d637af4b00bf002fb745b20866e6a1302d1a2b026d59c5ddc2c1320b14fa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Office 2021\files\Configure.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1132

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HMCU8ALE.txt

          Filesize

          608B

          MD5

          864f0f47b76f4623ffad2dd8991fec60

          SHA1

          ddeaa5d65704b4af808e64bf14b16596911fe73c

          SHA256

          a35f739172830d0c58a24b6bb80cbc7b2a7c19ed069465cbb8b543c99f7d5799

          SHA512

          12fd78f19332c1f9df5743c276fa07448b0c98cf43a559ee016c6b897c033ec8844af0a3eeeddbb30e7f2eb605d40f5f6f65dcae98afaf8b87245707724f2910

        • memory/1016-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

          Filesize

          8KB