Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-04-2023 20:08

General

  • Target

    BlockMap.xml

  • Size

    1KB

  • MD5

    0a2f905f3ad824ba476bc6cc5a9d63d3

  • SHA1

    90437f072fc847a2b4c0024b1362ec8443e32ecb

  • SHA256

    4e8e0684caeb9a31c6c538f44670c25f33efa65737dd5d2706d782d4aaadba73

  • SHA512

    892f7d8050c99c8554cdf64c6fe291ad6b9058969ca0c72d336d06e167bc047804894302070ace011994b4932959ea9a2fdd39a8aa77e951572ddba7c879beb2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BlockMap.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BlockMap.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    dd25eece262055fa2e7c798da8245627

    SHA1

    7f8dff5bf53fc2a6775d657cf30e43c712333a5e

    SHA256

    67d71d2d39ee7819764bef14658bb14d434a0969010f4a63936a478e55441637

    SHA512

    268aba5ef911eb1dec777fd52bbe230adceefae7b6c145e41d1ab4531b6e3f2858141325d4da67422078181fdf7641df475bb68384cecb334a3c24bee62676d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    dab2f842a04415c9af34ecb7c1e96f69

    SHA1

    ebcfc3b8c1d096b2f078b32161e4ed73088ba1a3

    SHA256

    b9ab06e80b430549a8d54851dd5fbb7cf4958cadf10a048240e1ad4b0e5a8433

    SHA512

    cdce00ed6434c334b86995dc868e9a1cd8f1ce1b37ab1f2f222ae9cd5de1ba44dccf128d5d0560108028657bb47b5314a1c6321da2654aa679941a8377e1613f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TTLFUYWG\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3I47N0UR.cookie

    Filesize

    608B

    MD5

    05916b5d7e23ad2372c85416f4339500

    SHA1

    fbbd3e17b0db5bc4767587390364b789650d0832

    SHA256

    5a439c5b32ea3818ca5cac4392c718bf29c9a87fc57820cc75a9d7025801c9e6

    SHA512

    fd40939360b59b769bbe42dd97d280e1bfcb7c942681d3a9638cfca9f9fd3fb593ef8429c284266903e4d1b7f0040b50da0871e60abea332d363b1ac4851d41e

  • memory/2200-121-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-122-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-123-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-124-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-125-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-126-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-127-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB

  • memory/2200-128-0x00007FF7EC640000-0x00007FF7EC650000-memory.dmp

    Filesize

    64KB