Analysis

  • max time kernel
    59s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 06:14

General

  • Target

    ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.xml

  • Size

    11KB

  • MD5

    179859857a2960f22142026f075534f5

  • SHA1

    3cb45d1e4b76fdcdeb52ec804b3802ddbb18de2e

  • SHA256

    c76408e442991448f4c05dc3462d28db32c4fe85515431716e1a4f31473f44d0

  • SHA512

    f203c460bd52b4b86b2be0878180a43f5c94fa9f101b97fa1b6b72bbf8dbc015f80d28aac89795bc95e18cb15c79aee0cd521ade94d3c0db807cf0d6d13ba9dc

  • SSDEEP

    192:E7kEqgkPp4T6U53CEqpCQ7EqCkPp4T6U53CEqbfQjwZibRZnpwwi6Rwnl:vDvqCrCQ7ZvqC5fQjwZibRZnpwwi6Rwl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ThemidaSDK\ExamplesSDK\Protection Macros\C\Visual C++(via ASM module)\vc_example.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ThemidaSDK\ExamplesSDK\Protection Macros\C\Visual C++(via ASM module)\vc_example.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4928 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3fbb8ee33354096d9f116c557a402d14

    SHA1

    f75756c42d45d1047eb04fa54bd7702f5560df4b

    SHA256

    13e2696561dd0955e1d61f7e18166c8bd7a02faf1dbfe04e738b5d68cc2ca57e

    SHA512

    cc21e56f9278282b3c15964b5618d42bdfda83b245d7bf01d12550aabd69a9747d1deaa5a9a9830e6d6a47465f580e21e0a7621cf992b56244ad4bee8779c338

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    da1de5b2445607545542e508a703005b

    SHA1

    75566cfd87264298e0461db93aa6269ea59ccb1a

    SHA256

    fb4fe1b908d8105e67a113c40daa6ddc295bfbe7cc5c7f36d2d1bbb3263a5380

    SHA512

    5023d297df0447d2455e033df251e8fd6f64d95c0635cc7fc727fe40d431cfd5ef61a67e79593731b0c8743017d70cc9d595f8da9d3fd6704201a6f4ac38e362

  • memory/2236-133-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-134-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-135-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-136-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-137-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-138-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-139-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-140-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB

  • memory/2236-141-0x00007FF9644F0000-0x00007FF964500000-memory.dmp

    Filesize

    64KB