Analysis

  • max time kernel
    137s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    13-06-2023 05:08

General

  • Target

    web.xml

  • Size

    18KB

  • MD5

    08101241b15b53ef0ab908f6d388881f

  • SHA1

    ea3e2ad6d71d483c54b12852dcbdcd0baa569988

  • SHA256

    15a2c7a9242bf54d3ccb3e07fa6d8f84ba8b303d8877243787a1103009941bdb

  • SHA512

    a1ee7f17bb069ac42483d1f98ca839ff1bd06f3fc15cd379dff4aca3732a5dac24dc17e15acc8f8fa39e60e186219f4fd70664f9ea284002274a4ff8609791ed

  • SSDEEP

    384:lJJuAr8F1mJ1ayCk5+HK5YaW41DBWTwa6st/tlLvSqwwU4FVXaS7L3nHIXYFXc//:jbpJi91Xbi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\web.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\web.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f00c651bd023e439cef538cb61938602

    SHA1

    7e49f7ce3c00bde7692a5fd85497e1f60b1f616e

    SHA256

    ac671834dcc3d8ef96272da936597334cccd7c1106beeac5919e6cb308f9bb66

    SHA512

    91ddece9b7c3fe2ab0d9b4891fbe522f344b58fedf99b5eee0f06e573770dfb96d69c0727102b94a22d34a671fa28cd51d90e4fd35b28443b260195a9ce53de6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    539ea5436133fd5435af4fb115ed3718

    SHA1

    378397ffe9fe73b4068d36fef053a620996daa0d

    SHA256

    306e4e5bc552d9795eaf3b2356e470dcb12485a94bb4b99f573455a2b08d3269

    SHA512

    a05850166dbe9b9be5dd4a8e2e582ffc7c4a0fdb93b5f824411d5faf579cf37e63feb9c826874c33a6b4b207ac06dbeceef7cf2a2f6c4002115b7b5717409ecf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\suggestions[1].es-ES

    Filesize

    18KB

    MD5

    e2749896090665aeb9b29bce1a591a75

    SHA1

    59e05283e04c6c0252d2b75d5141ba62d73e9df9

    SHA256

    d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

    SHA512

    c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

  • memory/2548-133-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-135-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-134-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-136-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-137-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-138-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-139-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-140-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB

  • memory/2548-141-0x00007FF8DA970000-0x00007FF8DA980000-memory.dmp

    Filesize

    64KB