Resubmissions

04-02-2023 21:43

230204-1lbwcseg47 10

Analysis

  • max time kernel
    77s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2023 21:43

General

  • Target

    VSCodeUserSetup-x64-1.74.3/upl/locales/docs/defaults.xml

  • Size

    2KB

  • MD5

    bc0afacd8028e222472bb32474db8148

  • SHA1

    826f5ec70527440c72e0be67cd4744d95f45f288

  • SHA256

    0d2e249a171a07a0b412c9f3eca041e772d530991d6333f9c96600c8c0935027

  • SHA512

    d65ac28f18ae9886f05f19feb209b6b26199c9353928f304ed705efa9e0632b66442fde52e6fcabdc81a9b3b42bb3a751df5e08929acea14ecbfb43294214664

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\VSCodeUserSetup-x64-1.74.3\upl\locales\docs\defaults.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:336
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:336 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\13HEI4GH.txt

    Filesize

    603B

    MD5

    ac0fc1a69ca5ec0f1ede8b2b7a176ded

    SHA1

    185011004ba78d6efaa03b1341d50b49d38fec99

    SHA256

    9373b8d8cf353d1e98536ceaad909bff24677cf7a1543aff96575bd861a466ce

    SHA512

    726ba7eb6559bff89304945d932dc56f9b248ca7f7656a9809cf13b6b5e18c20fe6570ceecbe298dfd56a927872d0e0475751c6757d052f92f923b75d682952b

  • memory/1696-54-0x0000000074E41000-0x0000000074E43000-memory.dmp

    Filesize

    8KB