Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-04-2023 20:08

General

  • Target

    BlockMap.xml

  • Size

    27KB

  • MD5

    a95364b67a2282599dc18637a1342ab0

  • SHA1

    a31ecf6bb5f51f39ba7cf4cae1955f89725d7b84

  • SHA256

    59a695c87157ebadbf54e31bf96bd56ef183578e62c76b0e08d7e602a29db4fb

  • SHA512

    5961c7763e2e4f1c104d4b55ed204c6fb7c7c76d8577cc8139c4fb1f1470dfe1366574026a633acca296e52e7910e86b84b75d610944f34fcf4c51d660e7b58b

  • SSDEEP

    384:z41Bl63JfXTnaUNE6MpjR2KT6XKsyc9VAoVWZsRytMdD20EVe0DfzsVRzLc4yDmx:8jSfe2LM9/syCSoVWSQKfkUVR0K93

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BlockMap.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BlockMap.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4164 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    dd25eece262055fa2e7c798da8245627

    SHA1

    7f8dff5bf53fc2a6775d657cf30e43c712333a5e

    SHA256

    67d71d2d39ee7819764bef14658bb14d434a0969010f4a63936a478e55441637

    SHA512

    268aba5ef911eb1dec777fd52bbe230adceefae7b6c145e41d1ab4531b6e3f2858141325d4da67422078181fdf7641df475bb68384cecb334a3c24bee62676d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    91dcbe05dc6687fbca2b9b0ee3175788

    SHA1

    d856a00adc93caa8411c95b6bc413b770be30c6e

    SHA256

    5eb93f41d877635b23f310e14ef319208406c6e85f63c1499f996a4ef3c6fbbe

    SHA512

    0087b6e0f8f8d89e31b0f927e06d0e823b445f75cea77b6cf79ac23771942ccc6b40915c033d62f68b3e443083036dd3c23dbd6f89829e94fefdd79f4ef80a3b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B1FTPK9F\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KYJR4Y7S.cookie

    Filesize

    615B

    MD5

    3732c580b9239799debffa2424b19cfc

    SHA1

    586f21a73f5b5d502577a03fb04975a7dfe182f6

    SHA256

    268444ff5a5066a5a1d65dbad74a744bf94d45b4873c0ffef60ec409b1cf16e4

    SHA512

    c10f97e2581e22763856665982250d268931d1d096101a2e6b30be4df5671c59a0d4dd98652fb332f092d07a33af1857ceaa54e0e77300166cf7de32db12f28e

  • memory/3664-119-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-120-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-121-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-122-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-123-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-124-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-125-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB

  • memory/3664-126-0x00007FFEACF40000-0x00007FFEACF50000-memory.dmp

    Filesize

    64KB