Analysis

  • max time kernel
    90s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-03-2024 17:34

General

  • Target

    attachment-23.xml

  • Size

    1KB

  • MD5

    c992b33e854e1fdd910083d3ca394295

  • SHA1

    927a1bab24def8548bfa4727c39c8daea8a98e39

  • SHA256

    6a7869bf0d02d418b28f4edc1994485a598a5672d7a46df84ad048e2827856a5

  • SHA512

    ddff7e08fdb6588f7263d6f3fa9c8f082463826712eec352fa8baa44a9b6c8beba5196b5ef69e9a836d2886034d8ae59ef6d442701e8e89827ea2c92c64c5939

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\attachment-23.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment-23.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:1824

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4204-0-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-1-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-2-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-3-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-6-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-5-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-4-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-7-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-8-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-9-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-10-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-11-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-12-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-13-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-14-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-16-0x00007FFA59430000-0x00007FFA59440000-memory.dmp
    Filesize

    64KB

  • memory/4204-18-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-17-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB

  • memory/4204-19-0x00007FFA98260000-0x00007FFA9831D000-memory.dmp
    Filesize

    756KB

  • memory/4204-15-0x00007FFA993A0000-0x00007FFA995A9000-memory.dmp
    Filesize

    2.0MB