Analysis

  • max time kernel
    129s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-02-2024 22:49

General

  • Target

    resource/message_box.xml

  • Size

    7KB

  • MD5

    fba45b18ad2ac3207f92432656d01aee

  • SHA1

    602136ce69866e3d3acc51913a9263db6ad4b8c1

  • SHA256

    687b4b93b6980baa43d472ad6bb9317d0c7b4705c40f317b222c304f195a74ba

  • SHA512

    3a02d2a64808dced8a91c83c9243529c00f371063dec5a8ce1b258a10e541dac4a4f2d3fdf07ffb15571eddd49f24440db7475d304e0d577397360d7eb2f2961

  • SSDEEP

    192:gGkkKPap0VQfQtkEp0VQfQrZUVw/wMNZUVw/wph9Kp0VQfQ3NZUVw/wb:+f0F0tGrCGwn02CGq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\resource\message_box.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\resource\message_box.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3188 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7bde92ff965b73dc76190e608c2fbb93

    SHA1

    95547789d183bbf9ea20ef6ba4c6b2f0249fb30d

    SHA256

    821420f187b512f853c8b73d9439e940e6e04c499532561343a739717a9a76ee

    SHA512

    21406b04613e8be9f2036f5057d6d3de568ec1aa4eb6471cd457e70e6ddadfc3b988d5f4c2d316e548b21b2850944a78d75a44ec3bf929e71fe61fb6b0de4ec6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    e1f2f175d794567b4778eed4a27d245a

    SHA1

    bdd6b58029721f8b9396b2bb3f71bda959d63c0c

    SHA256

    2daa788d93826727bce93761a35a85f2b448b548f5987d79f3a21bd595f1bf09

    SHA512

    e812ac164e876035218c106eedcc4fc6efd215c4953a14d686190330468fd538bba5245950bae3f43af9afa40f8d15e60e5d650c7910b2e3376270ea83f2c13e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    b505b2846808f394c4c52e76c159ec12

    SHA1

    9e60d73797a04e788d078f5bda7f608561ecdab6

    SHA256

    c9c2995762ea2dffc3cceb9064986a14f0449bd6ed8327b225e84e93a1307e63

    SHA512

    5ebf541d79e916ff906372ea93a868ce0967ea4fcf0ad2fb7a8f17ea7fb0cba322fbe32ebaf56a299b73fb7b66042524d5796a2d920fb9e879edef7ec390a4d9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verFA8C.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BVZRWQOG\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\RAQVRLD9.cookie

    Filesize

    545B

    MD5

    eb62c7454a9ec7d39a63275a7da2c99b

    SHA1

    f9e7c74ed3241230c632306826623161a5ae08e3

    SHA256

    85995c8046824f0f993909693ecbbab12e53c93785b49b49b8d1093ee7999d12

    SHA512

    ce844a3de6e0f1fd0463a90b8c48d314f11250909aa488c35b860ea1c1c1e4b631e7d007f1a8c96c029354de7c1a3541455836daa470f798716afce4815197d0

  • memory/4788-16-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-21-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-7-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-11-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-10-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-13-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-14-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-12-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-15-0x00007FF8D3B50000-0x00007FF8D3BFE000-memory.dmp

    Filesize

    696KB

  • memory/4788-0-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-17-0x00007FF8D3B50000-0x00007FF8D3BFE000-memory.dmp

    Filesize

    696KB

  • memory/4788-19-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-20-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-8-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-24-0x00007FF8D3B50000-0x00007FF8D3BFE000-memory.dmp

    Filesize

    696KB

  • memory/4788-23-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-22-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-18-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-9-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-1-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-5-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-4-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB

  • memory/4788-6-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-3-0x00007FF8D40C0000-0x00007FF8D429B000-memory.dmp

    Filesize

    1.9MB

  • memory/4788-2-0x00007FF894150000-0x00007FF894160000-memory.dmp

    Filesize

    64KB