Analysis

  • max time kernel
    55s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 16:16

General

  • Target

    Nihon.exe.xml

  • Size

    1KB

  • MD5

    7d19eb310a21b0aa152d02e3f5d98693

  • SHA1

    c53b56aaa9e15d4f6cc837c490bfc4be19ac01c3

  • SHA256

    6aca3177b0fbba5bbffd7163645ff5d74f97be015c916893f6b761423a90f4f9

  • SHA512

    2722497034f387d1975b0fe34e9efcce330159771d59e5b1fbb3948277a5d3a5c80546c6872166a75d8f1471c660784c5bb98ddf60bf796211387a14bf117a4d

Score
1/10

Malware Config

Signatures

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Nihon.exe.xml"
    1⤵
      PID:1928

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1928-0-0x00007FF98EF70000-0x00007FF98EF80000-memory.dmp

      Filesize

      64KB

    • memory/1928-1-0x00007FF9CEEF0000-0x00007FF9CF0E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1928-2-0x00007FF9CEEF0000-0x00007FF9CF0E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1928-3-0x00007FF9CCBE0000-0x00007FF9CCEA9000-memory.dmp

      Filesize

      2.8MB

    • memory/1928-4-0x00007FF98EF70000-0x00007FF98EF80000-memory.dmp

      Filesize

      64KB

    • memory/1928-5-0x00007FF9CEEF0000-0x00007FF9CF0E5000-memory.dmp

      Filesize

      2.0MB