Analysis

  • max time kernel
    170s
  • max time network
    232s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-02-2023 18:56

General

  • Target

    gd/Resources/DungeonSheet-uhd.xml

  • Size

    2KB

  • MD5

    27ba105952636545dddebc4e8337c7e3

  • SHA1

    ef45e7d19370d3c4a65bca01b60d94339ea009c0

  • SHA256

    4f93ece615eb1f276d22cdd72d873be10a2d4bf90266743e80a1cf5d0dd67291

  • SHA512

    e4dfd2b6ccf4fe0760027e922450d6dea7b820d457acf3bf0b04ee861a40f1169bdeb1b101e007b501ed135c8bf8179e0586e8a011ec33f0f0a37883a29c97c6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\gd\Resources\DungeonSheet-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\gd\Resources\DungeonSheet-uhd.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3864 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    779B

    MD5

    52459475bbead1cc9bba0ff24722c884

    SHA1

    1e6cddf21f19f4819050782cd075b72fc96abd7e

    SHA256

    23866b98ab3cc0c8db11f876560468be263c7bfd29c2de29cb36e6eb68c5c67b

    SHA512

    9fd1c809e66ae2443bdc9adb6e3bcc7b50a26eb6f518d317bd1b9a152cc9164145637fc393fdd6e4473e84dce947d638127259684a49bdd33dc5458385e6dbb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    246B

    MD5

    75635a66ac78fc0b4e13879f34e21566

    SHA1

    326c67d4813a3696721f39c71d1ba1fb660ed4f3

    SHA256

    7100a1e1f01ff6742fcab7799f886b3427e8adef270fe4138efaad032698c186

    SHA512

    ef882d4e9351011ef6310e2296f29fdc2e2c2c2b9af92684cd5006759151d5c03e64f2cca3d245c972b46cef97e0142ad6024b0027a5836b45747b36931202fd

  • memory/4324-116-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-117-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-118-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-119-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-120-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-121-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-123-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4324-122-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB