Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/02/2024, 11:25

General

  • Target

    $APPDATA/EaseUSOS2Go4.0/os2go/bin/TBGetRemoteNetInfo.dll.xml

  • Size

    616B

  • MD5

    f45fedfcce4a78fd25ea62ce9c2f089f

  • SHA1

    ff2f255a5a9342f3b494b96bad04f3687623f0a7

  • SHA256

    355f202ffd0106f6af1810742223cd92f96a63f0e4867d963152cb52b171653b

  • SHA512

    01740f858ac78561f447710f00590f160e9faee7e7ac085ff4ccdda0ac9a0147bad8c810f52ae78cad13b8dc81f6fd2869121beb3acb3bbc04a48861bbfb59a3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\$APPDATA\EaseUSOS2Go4.0\os2go\bin\TBGetRemoteNetInfo.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$APPDATA\EaseUSOS2Go4.0\os2go\bin\TBGetRemoteNetInfo.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4440-2-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-1-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-0-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-3-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-6-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-5-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-8-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-9-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-7-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-4-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-10-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-11-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-12-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-13-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-14-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-16-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-17-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-15-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB

        • memory/4440-18-0x00007FF9072D0000-0x00007FF9072E0000-memory.dmp

          Filesize

          64KB

        • memory/4440-20-0x00007FF9450E0000-0x00007FF94519D000-memory.dmp

          Filesize

          756KB

        • memory/4440-19-0x00007FF947240000-0x00007FF947449000-memory.dmp

          Filesize

          2.0MB