Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    13-06-2023 05:08

General

  • Target

    machine.xml

  • Size

    33KB

  • MD5

    0869544722561f5aff0eefc83fc7b001

  • SHA1

    1e118f4b5c1c6a7b1858e3fccb1b1d1095561976

  • SHA256

    ef9b9387168fd1dd6c996f96c134d9c44f8eb06f9587004bf997252a520182d6

  • SHA512

    ced7c9a5363cabdb87b01ed6b4ca190a690640dddf5cbcc0438acdc611a8ee942cb6cd73c78d3fc2d59f70171f22ac832a10b1e23758dc92599ee24acd978ac2

  • SSDEEP

    384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuh:dkn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\machine.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\machine.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5092 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f00c651bd023e439cef538cb61938602

    SHA1

    7e49f7ce3c00bde7692a5fd85497e1f60b1f616e

    SHA256

    ac671834dcc3d8ef96272da936597334cccd7c1106beeac5919e6cb308f9bb66

    SHA512

    91ddece9b7c3fe2ab0d9b4891fbe522f344b58fedf99b5eee0f06e573770dfb96d69c0727102b94a22d34a671fa28cd51d90e4fd35b28443b260195a9ce53de6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    9c68a30774a4e70494e480348d3055da

    SHA1

    7421f2519cd6c4431ebc5a0985efffeb6de9150a

    SHA256

    855dc0887f1777de1aef05bda3faf5db888a67dc15f608ccb5be9f333697d6a5

    SHA512

    9464729fd0a040b9b3009fb491e15a6ef2c51a7c08227be0934bd5818354315b6b6dcbd3964f2a248cf40546082008176c28733e5c951fb2df9b9f4d06b41b14

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\suggestions[1].es-ES

    Filesize

    18KB

    MD5

    e2749896090665aeb9b29bce1a591a75

    SHA1

    59e05283e04c6c0252d2b75d5141ba62d73e9df9

    SHA256

    d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

    SHA512

    c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

  • memory/2616-133-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-135-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-134-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-136-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-137-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-138-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-139-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-140-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB

  • memory/2616-141-0x00007FFF1A970000-0x00007FFF1A980000-memory.dmp

    Filesize

    64KB