Analysis

  • max time kernel
    91s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    04/07/2023, 10:32

General

  • Target

    Adobe.Acrobat.Dependencies.xml

  • Size

    2KB

  • MD5

    d88e88c4ac39c34cb41783ce46e2d8a7

  • SHA1

    11a49140ccdb35b09bdcee731e7c8211aaa49f08

  • SHA256

    cd1dfc56ef24b3208ed92cca3b6050bf1b5c35108ddc21381dbffd344d395aa5

  • SHA512

    1d8fb91a79e55a4cbb740d901e938b49646191dde554f9db3ace1c9c473d6b8e8c8be20514a28369c1b275557563642d11e48e4350ad3c271e5001e19e5f10f5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Adobe.Acrobat.Dependencies.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Adobe.Acrobat.Dependencies.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NB3GP0NJ\suggestions[1].de-DE

    Filesize

    18KB

    MD5

    cc5361b5fdccfc6830217e2eb9972dd8

    SHA1

    e4a1206d9190eccea3e6a116c954d11da0aeba66

    SHA256

    afd57b0b6d8166e25bbef7cbc97522677c11c9a930fd4d4a204d1b7ae6258492

    SHA512

    ef63961bd7f0d3357d352a8f9c8ea57d0271e0fb664b1be179c38cd2d559bbaa4864f64f3521f26f868cc074f97994e2658c6d652021a39dc5207d45411691bc

  • memory/2272-133-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-134-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-135-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-136-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-137-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-138-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-139-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-140-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB

  • memory/2272-141-0x00007FFDD83D0000-0x00007FFDD83E0000-memory.dmp

    Filesize

    64KB