Analysis

  • max time kernel
    1201s
  • max time network
    1598s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-es
  • resource tags

    arch:x64arch:x86image:win10-20230703-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    11-07-2023 13:37

General

  • Target

    NitroxServer-Subnautica.exe.xml

  • Size

    1011B

  • MD5

    5258b3e435706e2d5bf1374853e84d11

  • SHA1

    6275d78bfa1995151953593e0c1bff3b1ad05bc4

  • SHA256

    29b6339edcb982893d7d94c3e5fe15e3d1af72e45ac0525e31bab7f85a878564

  • SHA512

    ba596623d108c0cd7125e8fd0cadd32d017c6ab611bbd8318dff83d09b3f584e04e97f11d3be03fa48a4df424260f646e56e66075791aa9d2cbbf9953c0686ee

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\NitroxServer-Subnautica.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\NitroxServer-Subnautica.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4984 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver1279.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UE8DIMVT\suggestions[1].es-ES

    Filesize

    18KB

    MD5

    e2749896090665aeb9b29bce1a591a75

    SHA1

    59e05283e04c6c0252d2b75d5141ba62d73e9df9

    SHA256

    d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

    SHA512

    c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\D0SPZJCY.cookie

    Filesize

    610B

    MD5

    1eb007181310fdb0139a09600c0e7688

    SHA1

    af874b52c783ef9b2b8733e0ff45af6cd9cd2a8e

    SHA256

    b38e5d662e7807e1a97b6bd0d7415c4adeb704edc53e7c4b295fe62a240d09df

    SHA512

    1634e406b82975ad7933bd0e30a817d759f96dc50b228c7b6e78aab6a8498090c1c6b02aa059e947d68169854c029b9bc5b1fcb0b183721c5e9e1b14c797199e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TYODAJ8A.cookie

    Filesize

    610B

    MD5

    40c0bb4a4a3b882646b6c19a700c243b

    SHA1

    f221d2b20b58be52f274fcb1e53f327367c0a9a5

    SHA256

    87bc7220dc6c31de1def87ebeda710c9251a79dc218e845915fe748e2c0dd18f

    SHA512

    7332cfce22ef173a640f87bbad16f1da32ba50dd3462989488796ac3b16baeaa26b3777e5935a15d466c6118302c9e31eb59b11a08e5f2161869c4cfa3ba329f

  • memory/432-117-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-118-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-119-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-120-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-121-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-122-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-123-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB

  • memory/432-124-0x00007FFDB2970000-0x00007FFDB2980000-memory.dmp

    Filesize

    64KB