Resubmissions

04-02-2023 21:43

230204-1lbwcseg47 10

Analysis

  • max time kernel
    133s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2023 21:43

General

  • Target

    VSCodeUserSetup-x64-1.74.3/upl/locales/docs/defaults.xml

  • Size

    2KB

  • MD5

    bc0afacd8028e222472bb32474db8148

  • SHA1

    826f5ec70527440c72e0be67cd4744d95f45f288

  • SHA256

    0d2e249a171a07a0b412c9f3eca041e772d530991d6333f9c96600c8c0935027

  • SHA512

    d65ac28f18ae9886f05f19feb209b6b26199c9353928f304ed705efa9e0632b66442fde52e6fcabdc81a9b3b42bb3a751df5e08929acea14ecbfb43294214664

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\VSCodeUserSetup-x64-1.74.3\upl\locales\docs\defaults.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VSCodeUserSetup-x64-1.74.3\upl\locales\docs\defaults.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4316 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4816

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    8a7207e4856d7203b09f88754603c2a0

    SHA1

    05fc6b1d3b6f392d5b4d5c30bf4625ecb9a6167a

    SHA256

    11233063afbe9a4dd8dd99bc27cc126ffb19a5db3f50f4834127c40900e5b6f0

    SHA512

    095f97025cc8567dd07c91862906e9e0bfe3aafd99cd7f45f3e1dbd326ee3f2f5156406e3cd8b281900ce51a7bbee151c0a8b380310a9542a82eb24a25fc40c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    854e937e0256ec064e3ce8338c5bd088

    SHA1

    5e763a2f0ee26c9cc9876135d9985ceab33f287d

    SHA256

    107a4b07963b297d79df12697d9f182a7c4c95604fe9480202adb4048bbe9928

    SHA512

    4cb25cac6a8ee9338b1fa32a0a100ed5fd9168f6c12240cbb2cdbdaae59b59ef2124d0530f0b1015cbe96587701572aad4cd5148251aa50434d30b0cecaa0606

  • memory/2596-132-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-134-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-133-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-135-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-136-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-137-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-138-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-139-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/2596-140-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB