Analysis

  • max time kernel
    156s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2023 20:18

General

  • Target

    Squirrel.xml

  • Size

    871B

  • MD5

    2c81bb6726f5a086a09d847c592e7e7f

  • SHA1

    e33b825837bb3b82430623e22811a533a558e058

  • SHA256

    144c82b31c3c81f32ae4e7d1ceb9a37fb4697661e07f00a5a6c6a7601addecf9

  • SHA512

    5d20d6e4844ce0739d773643c0676aca69d57bc6409b60b9211cd5d67683bf686d22c9e27f129d1c9b4c2d4207bd0a1e97a6102770553ac5df50e748e873adbe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Squirrel.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Squirrel.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4812 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d215e8f258878362467ca56e881e503c

    SHA1

    bde8ed9da4b8297b2efeae31e307b3a724cf6c26

    SHA256

    00898cb46fa389fc4fbb5965b2d5a4a19a7fdec1988491a7d6b66a45e2032770

    SHA512

    241daebdf2a192eb34b69b36af731f78fa241e030633777d4a3ec37d6ff994e2e7f646d9aecaa7ab8a9fa91c4db135ad22c7ff585b0f9d52231bbb22245b7144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    df8d5a1762f39fedfe3beec9cae6cf31

    SHA1

    c225a051c971051e225a1ea8205c5e553e7bd562

    SHA256

    695798de5ce1a2817f2cc46f9d50bd7e0a438f42f92eda69c6f6ed831f21c4ff

    SHA512

    486e13dfaf51a91981cf7fe249dfbc6d8ab42cebab16ca063687a21f569c37fb3260fc4ba689ba8362fd40b32338c30426726f09bf14406bdcdabfb58a220ea3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P8NMKCW2\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/3956-133-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-134-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-135-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-136-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-137-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-138-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-139-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-140-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB

  • memory/3956-141-0x00007FF7C7450000-0x00007FF7C7460000-memory.dmp

    Filesize

    64KB