Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-05-2023 09:35
Static task
static1
Behavioral task
behavioral1
Sample
xss.svg.xml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
xss.svg.xml
Resource
win10v2004-20230220-en
General
-
Target
xss.svg.xml
-
Size
368B
-
MD5
b2191c36c5dda0f0099cf3b3f5c08875
-
SHA1
8c44dc68c59453777459f23b82ab497dbb0061c0
-
SHA256
e44901e51a734fc6227e786466c8359735f37771fdcfc5acfb055c197a75c732
-
SHA512
1fdb128667c314877ceae6775f6e68f5bd1c2360783c2661df24a4a4d79d1a8a9443bfce36af0a93321f1fa0d1b6e4e64ab296a4563513b5bf97f6a69549b627
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4817D481-FFA7-11ED-9076-CED2106B5FC8} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60323321b493d901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "392297920" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c34aa6df07c9d84c8cd011778e6d398400000000020000000000106600000001000020000000735e95b194ed509c60411146741de46e5a98db8947d7eeb72e10ac026ff0e84f000000000e8000000002000020000000682695864a9f16f62a07830cd1444d96418cbad7ce7a04109df656faf53b9b1720000000ed9e824dffccd99b4c894ff3c5ee814cbb0950da5335deb553423e7f2c4db477400000000c34516966ce49cf71979ab9d31109f9c51a844f60611b6d509970fc2ed3adf566776058657a2cfa2f7757b9447c04a5514a2cde7c17f644e6a26782a96d9f92 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1184 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 808 2044 MSOXMLED.EXE 29 PID 2044 wrote to memory of 808 2044 MSOXMLED.EXE 29 PID 2044 wrote to memory of 808 2044 MSOXMLED.EXE 29 PID 2044 wrote to memory of 808 2044 MSOXMLED.EXE 29 PID 808 wrote to memory of 1184 808 iexplore.exe 30 PID 808 wrote to memory of 1184 808 iexplore.exe 30 PID 808 wrote to memory of 1184 808 iexplore.exe 30 PID 808 wrote to memory of 1184 808 iexplore.exe 30 PID 1184 wrote to memory of 592 1184 IEXPLORE.EXE 31 PID 1184 wrote to memory of 592 1184 IEXPLORE.EXE 31 PID 1184 wrote to memory of 592 1184 IEXPLORE.EXE 31 PID 1184 wrote to memory of 592 1184 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\xss.svg.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:592
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ef9586f2edb57b7eaac4a6e395166e9
SHA1af7ed0912082a86abf2c9371cf445e75121ccb06
SHA2569660bfb180089bec4b643d94ec2b13dae78f34614d6b2990a6499551ade74b86
SHA512fbcf2a3224ec35f474abc141cd33a1a174649ce421892d597554da734a8828575b0bfd72be44a3ab47c88efc1bee9d58d119a375a2916f327b6ad5b6a9e59feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a38ded8c5044accbcc7b99e221c187
SHA16fb0b9375cedbffdbf42fc710ed0378644da16be
SHA2563940d571cbc646d5bd7b59c6c1406e3aefca6a6a6dde05e4cfcbe24cdc69ab22
SHA512511a3cdd5ef465f2ef5849c7a98ffaaf5c01a7f375e4de7a667ffbb1e26d62384782beeb33999970cf8fc048578ef9701b3d29cd6bb71eba17fb0e4502482fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5891c02dba213a7e34dce81fc8fb8a8bd
SHA1c64fd6542646007fe08cda3e747ce3de23d0bded
SHA256dcbcd0401ddec4a8bbf3979172e4c4a11c35567dd8649375805322abf8d3fe06
SHA512644ec7b1053c0b9b2aff1cb0d7fd9362d8d4332ace43f356fa46cadf26d1ab229b4c57131e13c079eaaaa7cf7280f2c75f030649bbbd12fc18fe423d35fd72f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571bf34cc589c53389925af1c8c7d0e78
SHA1b2992e93bd2e99f122d37c755a549019792aa371
SHA256fd0648ab8477cd674a84e469273d586811392b2cb5f5b5bf45eec6fc001d7598
SHA5125e995d796bad42f6ed81b1d61da123ce78efd3a441c61eb474046e57663559d656162c65db83733bdf0939ef64ebee31554a170d83bd3b4072b668b970c82911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baa0fcfc470305a28f307eed49db14b7
SHA1998d5a683a6775d2b1ca5b3ed7b05c2daa0ff2a5
SHA256a3b8d2f5873c5f47f9d63d46a17810e47a9573a44cb8f0403f60a1cbb99adcff
SHA51268c303b85a213981bec89a402dce2d598f41e822e040a9e7cb45960957856f90bfeee64da2929042f6a5e942af39f04de37435ec81d760375f17e1451136735d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c353134b5b7bb8a36e8788b7459f0f41
SHA11517482ac678a29fb8d79502def9b7b94e945790
SHA256febb9968643759d01c7222161d67bfab4d036349e7c3848739d3ea44cb95521d
SHA5126b5104a9fc45979d5579b3972abe9c95680b2545e7515b1b0766cf4fc4dd2543b31d28b4eeb943d385384ee641e588bb919c3cb90e04951fa2e4de0b8e491cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2d0ae3f49b5d53fa759b32d13537c0
SHA1fe468cb69f763a99fb1d4fb13f3733671927d623
SHA256213570038b4ff3d65813c0b4185810fb29ffe87864a7e909300553959f87338b
SHA512450bad842a56cffc8cb9270c299315344030d5144058359c5146f281498de3d784f24c5904e4844747b55ab3d0c6637e5b2713bb85f01658e9317ea7f1ac518b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55376830c46ecf62b2bcf52199574a7d9
SHA1810e4dafaad389e1e486d053888d775988b5eb60
SHA25662140d5dbf8df9c193f55537c257fba06fe7b0f4e2dc600082e487d708dd8848
SHA5120b1f97ed5a4549b0556525d3c6d2e6822f91aaa079077d42a70435cfaea2fd2cb20230da0b95cb084412116210a9f73eeccc95229f24d17f1bf5ae02e803893f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QHKTFKHM\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD522e12943fdc5ae70a1dce2cf30155859
SHA1ca8747230d5421d0ba03be4add8529f3e95e5ac0
SHA25639c399ac706f0d137358a68f4956223be8b7a5f2225a4d59d475e3e48b5c0574
SHA51200b08dff45ef4bf161c938361b0a861c13dd7c23b18f0799b5966e8e33ad6467673092e2603122f52f9fc85c507c426a3ff972f4db15182db223666da55890b1