Analysis

  • max time kernel
    131s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-04-2023 20:08

General

  • Target

    [Content_Types].xml

  • Size

    469B

  • MD5

    671f697929cb7be9d6cb4f138d1750d0

  • SHA1

    1173d78a57a1a795a92d404d4ccea2117f517467

  • SHA256

    3054f940f18b3f9c0a1db7658cf7f200e7b81e06a10823bc282d19528b1496d1

  • SHA512

    a6758da07e0b58c2a1678ce9f4e95a3e4900eea36e469f238197e2d096a2cdfad290f860e8db8f41324d2d98c0227ca5eb0e9b5bb701e08996093d5509ab80a6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\[Content_Types].xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\[Content_Types].xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4820 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZJB0AHXO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3BBI4CDO.cookie

    Filesize

    242B

    MD5

    fb8a63b54f1a9f169104b95d53cc39c5

    SHA1

    ee32e2600df583024ddc9563ed7c7fd43882c952

    SHA256

    4912a63c38c332e1a5b68b065c2a4131ffc46b8d6df42652f0b941c09fa0dd31

    SHA512

    85bb16bd52801c1dbe756dbab113a094492c309ba3ec22d07ef8dd249794f045d3c07e4f08fe007a928d002367c050a3b3912162e50746dd11a7aec4217b2b76

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VGB5BR3Y.cookie

    Filesize

    613B

    MD5

    3fac6c9f893b8f7e0287804a03e0f55b

    SHA1

    8f5cd736d1bfd990e84f92ef438b3b8983dd3e17

    SHA256

    60cca72e05fdbe831af8f9f2694311fdd0e48416cf4b9cf1eb4f51fb0f79f8fa

    SHA512

    9ae95f9ce91a8fb0af6870a75631e52e4bc9b96fcd12ee3019529b8a856579602f9e95b05a62f6c9b601cf0b81b5492f3af189ddbcc0e03090aca1fcf2516dfa

  • memory/4348-120-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-121-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-122-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-123-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-124-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-125-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-126-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB

  • memory/4348-127-0x00007FFC52780000-0x00007FFC52790000-memory.dmp

    Filesize

    64KB