Analysis

  • max time kernel
    82s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    02-02-2023 16:34

General

  • Target

    MICROSOFT OFFICE 2021 JULIANTECNOLOGICO/MICROSOFT OFFICE 2021 PRO PLUS/files/Uninstall.xml

  • Size

    59B

  • MD5

    364f86f97324ea82fe0d142cd01cf6dd

  • SHA1

    fc2a45da2ede0c018ab8e46044e6a25765c27d99

  • SHA256

    09d5b42140bab13165ba97fbd0e77792304c3c93555be02c3dce21a7a69c66dd

  • SHA512

    9b0a0944535e25c944e01bed1674efff119505292b176287c0dad3db70ffc4244cff21cccfd1fd94b09dd6d5f84221930b66b210101e482cc4bb5df3311a5fdf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MICROSOFT OFFICE 2021 JULIANTECNOLOGICO\MICROSOFT OFFICE 2021 PRO PLUS\files\Uninstall.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MICROSOFT OFFICE 2021 JULIANTECNOLOGICO\MICROSOFT OFFICE 2021 PRO PLUS\files\Uninstall.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    8795643bd9448f355f1e817b1beb8f13

    SHA1

    fc5afcd5dc1c57ec501109cb987bec2e7b628514

    SHA256

    c9a53a6962ee0ada77bad358699a886e9d54243a3ae24cc182acfeaef4dba134

    SHA512

    4a8bc9001359c55a68bb329ef000ea7506c003ef6a98d57d769ca020758bcde63d52b03add74e39294b7b0c52abb9a07ff6ec3bd1e66f9eca0e0675b2b9cd2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    180364797bae33613d66d703e362275b

    SHA1

    506de56b0775db54c3ceaa84640a7b22f0013501

    SHA256

    39b38f44f26e5b2ffe041facf24504b54fef87e9b3034b8961232a00c006331d

    SHA512

    836fa8ac3c55318bbe086c7d049006c6e34a525ca5133bf8498e959b571feba09a0482947adeaeefd90a99e3c6f152e92d7fc2d0178664eaf4006a83d308f433

  • memory/4260-132-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-133-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-134-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-135-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-136-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-137-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-138-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-139-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB

  • memory/4260-140-0x00007FF8A2910000-0x00007FF8A2920000-memory.dmp

    Filesize

    64KB