Analysis

  • max time kernel
    90s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2023 18:19

General

  • Target

    lib/NitroxPatcher.dll.xml

  • Size

    541B

  • MD5

    eedc5cf14768398678b0e33ae76d698f

  • SHA1

    4c4bbe481ebbf2b91aad494ea44e9501ea7b3f38

  • SHA256

    775b821a4b95d9bf45b6f924ad8177808e8c015430f7ec1dd68cf72fec77b528

  • SHA512

    86c768c4710a27b381ac98f1d7a7da574b85a5aeeb949b8e6d01cfd05adff9c179cf0af0bd76e7ad13489156a1e8e400c5bb18152e949af541fef1d48d4d68ae

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\lib\NitroxPatcher.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\lib\NitroxPatcher.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4404 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ccb3ea965204795878736144d1a57796

    SHA1

    c74c7a85503f1a1ba0c1876cdeec774aabb3910b

    SHA256

    09912639ea660c3f744c3d70ee54d0a43b591074ee0bb150e5447fd20f8a4f93

    SHA512

    16916d8458a84465e7dd6e4af1b24adcbbd3ce830766313f6963fdf7e6ed0c66b76b04636e91b68110e23604833658cc040563d46eda2bca3309fd233cbb1ac5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    3ec573cb1bc20a68847edfbc6ff40d9c

    SHA1

    6a30788462cf590ac567a4278e91f8673f619fe0

    SHA256

    140c44940f9a1d40bb8b9aca3370cf1ca73de929d9e9ac93c85addd2f6564bcf

    SHA512

    af42d5f66fdd92787deb0a8d7f9eb7370e9a826682a1ebef7a112465ed62561680471a0506f24ecc410c1017fb83d75b5f10c3a663565a1badb51324df46af69

  • memory/1776-132-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-133-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-134-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-135-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-136-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-137-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-138-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-139-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/1776-140-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB