Analysis

  • max time kernel
    122s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    13-06-2023 05:08

General

  • Target

    settings.xml

  • Size

    2KB

  • MD5

    ba17ade8a8e3ee221377534c8136f617

  • SHA1

    8e17e2aec423a8e6fb43e8cbe6215040217bb8a3

  • SHA256

    ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8

  • SHA512

    c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\settings.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\settings.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f00c651bd023e439cef538cb61938602

    SHA1

    7e49f7ce3c00bde7692a5fd85497e1f60b1f616e

    SHA256

    ac671834dcc3d8ef96272da936597334cccd7c1106beeac5919e6cb308f9bb66

    SHA512

    91ddece9b7c3fe2ab0d9b4891fbe522f344b58fedf99b5eee0f06e573770dfb96d69c0727102b94a22d34a671fa28cd51d90e4fd35b28443b260195a9ce53de6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    8aa3fd0a82d69db7414e3f58c7683a9f

    SHA1

    dee0134d8224f32ea5fe52854157d0ddec5dd3f4

    SHA256

    94081f29996fbd06145011e231215e77faf13c857c01f24ebc3a7d4e6dfeb87d

    SHA512

    f37aaad87052b3586df4dffce4ce856fd24cf76d947c9c2a4890da8bfc62ca956bb7030b59b41015c8e60c624cad15cab030644c8b9c85337391df8c451016be

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9YACFB9R\suggestions[1].es-ES

    Filesize

    18KB

    MD5

    e2749896090665aeb9b29bce1a591a75

    SHA1

    59e05283e04c6c0252d2b75d5141ba62d73e9df9

    SHA256

    d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

    SHA512

    c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

  • memory/2028-133-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-135-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-134-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-136-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-137-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-138-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-139-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-140-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB

  • memory/2028-141-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

    Filesize

    64KB