Analysis

  • max time kernel
    371s
  • max time network
    435s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/02/2023, 19:10

General

  • Target

    bin/App.xml

  • Size

    184B

  • MD5

    13ff21470b63470978e08e4933eb8e56

  • SHA1

    3fa7077272c55e85141236d90d302975e3d14b2e

  • SHA256

    16286566d54d81c3721f7ecf7f426d965de364e9be2f9e628d7363b684b6fe6a

  • SHA512

    56d0e52874744df091ba8421eeda9c37854ece32a826bd251f74b88b6334df69736b8cd97104e6e7b2279ef01d2144fee100392744cc1afb7025ebbad5c307a8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bin\App.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bin\App.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4936 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3e472b0f5a701aa836fb601ca75b32f6

    SHA1

    36058caf014a2a437db05da767e8992cf44fd7ab

    SHA256

    8b96d03923483c423948faac348c850ec54cd35621836d1612259b825f6498ea

    SHA512

    5885c94f81236f2aedb5c30fffa128550eb5b52e609ef5ae2bc5a21b50500cc08652bdcc4eb037137ca703b7c9b18e47965d33906f8b3b7b028347681b7470fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    c61d3b011b7ac613a12030b40d5dab87

    SHA1

    b44b8f3d1fef9dc5818dc914e5751f6a0dd4735c

    SHA256

    c6d51564bbede8972f6713a41725766735692d531767997a98ff0888b2c1351b

    SHA512

    c23f1c036fab9750aaf370dbf700387938ed816caae222caead334a1be6ac759bce8dff3e25bef015aacc67c1c64b5cc00afd2dfba9394118b6ec724bb720790

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\PNATKI61.cookie

    Filesize

    615B

    MD5

    b5ec6a1fc58c678198e1f94011f3c289

    SHA1

    4d5a5db62b0f1921fc17cf491ca6a9c7f7c2569f

    SHA256

    a923883559c5ad4335c19ed092f19a14298d0c715ba4d39b49804bf4ca730f07

    SHA512

    777f235f2d51cdb67fc19fe89dc8929953465f1873d4aa93c0c85c00d02baf5dc6b0af207dde148b79cc766a56e8731d8825680e6f5bd09883eb8416e121fa1e

  • memory/4760-120-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-121-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-122-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-123-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-124-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-125-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-126-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB

  • memory/4760-127-0x00007FF9D8990000-0x00007FF9D89A0000-memory.dmp

    Filesize

    64KB