Analysis

  • max time kernel
    73s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-04-2023 20:08

General

  • Target

    BlockMap.xml

  • Size

    21KB

  • MD5

    fefb5406508b06502cac2a4e898c0cf0

  • SHA1

    6801d1b27a86081ae8fdcc3824b2394c2146a9cd

  • SHA256

    b2eece73fa8034f30ab734f0adc1abfcce8d19f580a3adbeeb60daf7bb26e87f

  • SHA512

    5a76dd23d34671173652f758932a617a32e32e2b85f85ba10077772c22b9337fa510c3fb35ab5467b00a985191c6a7538d2114254ff7b5bf29a9005d456668eb

  • SSDEEP

    384:H2rX5JeSOGP0/Ri3LvOj33PGT4tlYZ8eu:Ha3eSGMa8KlE1u

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BlockMap.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BlockMap.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    dd25eece262055fa2e7c798da8245627

    SHA1

    7f8dff5bf53fc2a6775d657cf30e43c712333a5e

    SHA256

    67d71d2d39ee7819764bef14658bb14d434a0969010f4a63936a478e55441637

    SHA512

    268aba5ef911eb1dec777fd52bbe230adceefae7b6c145e41d1ab4531b6e3f2858141325d4da67422078181fdf7641df475bb68384cecb334a3c24bee62676d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    91674a75a260506da84d476e53d0ba1f

    SHA1

    4c96132b0cd21ca765fd0496ec7810e01612f2ac

    SHA256

    217dec6df520237462d15619dc29e87730afa823b7cb33a09456e3cc2ecc1730

    SHA512

    fc191e514b8713d5b446ba9c4525b3b60b8ff83f01f2c39fb5e757247d439c0da46cecb5f8ebbeda82b8aff247d48f418eb7eac91971c5cbbcfff377ba6b4599

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZJB0AHXO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3QB0A3VM.cookie

    Filesize

    242B

    MD5

    6f9a2c5e923a61578c29ee9feaac13ac

    SHA1

    e97cace6f51974677ae68e648a26bf32c31f2561

    SHA256

    348740cea5b60abb792d5c7f676e763783ca5e79f2a3622ad7453df0ec76f232

    SHA512

    66fd72964c0c405a98fa7f4ba71f10e405187d7cc34dd77addc06b8f71c2d73a99fb41ca137cba616b526b451d7b9724358f528890f52dfeaaf718db36e18213

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\NDUNQ99E.cookie

    Filesize

    613B

    MD5

    24cbec13fcaff8fead8e0903acb5f8db

    SHA1

    1127b89746ac3c8961bcf4b421839ae4bd06fd9e

    SHA256

    41970d36a65b1632492faa6153b3c8197a90c1e409ce86d8ae38d750ff9dec3e

    SHA512

    d279e768945b7e213e975dd91b16f525e223de9241086727cf2da86ba7667a9c2230b049a54093ee77f93d5014196728ade44d8219195370f5e63b41ecc17cd0

  • memory/996-123-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-127-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-126-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-125-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-124-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-120-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-122-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB

  • memory/996-121-0x00007FFC1A2B0000-0x00007FFC1A2C0000-memory.dmp

    Filesize

    64KB