Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/05/2024, 12:26

General

  • Target

    EXS CZ44962878_S&K LABEL SPOL. S.R.O.+24CZ5300000A8WG7C2+4656000.xml

  • Size

    13KB

  • MD5

    6abefe21eb45c29547060e4d0b79f503

  • SHA1

    1e0d23fb244d977ec6ea99eaeff09b79910e5fb6

  • SHA256

    f2b750246ee28a84c4bbc0fbcf78f921f0529b2cff03ef614b02820ff62adb66

  • SHA512

    de0f250eeedb682e7fd00a7680cea0dacf73f257b0197989f7ceb9c27fe9f9781343191997f1e96b0cb260223d8770c0a1ed85f6a6fe4015d5264f896f00a4c9

  • SSDEEP

    384:nj/loOTbV/6CZqa5a74JzAfxZa9OFic48ewVoo0YwKRlSaiK:j/loOHqa5p+pZa9U48ewVoo0YwKRlSav

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\EXS CZ44962878_S&K LABEL SPOL. S.R.O.+24CZ5300000A8WG7C2+4656000.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\EXS CZ44962878_S&K LABEL SPOL. S.R.O.+24CZ5300000A8WG7C2+4656000.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:816
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:2816
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4464

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2740-0-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-2-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-4-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-3-0x00007FFD11143000-0x00007FFD11144000-memory.dmp

            Filesize

            4KB

          • memory/2740-5-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-1-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-6-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-7-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-9-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-8-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-10-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-11-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-12-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-16-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-18-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-15-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-14-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-13-0x00007FFCD1130000-0x00007FFCD1140000-memory.dmp

            Filesize

            64KB

          • memory/2740-17-0x00007FFD110A0000-0x00007FFD112A9000-memory.dmp

            Filesize

            2.0MB

          • memory/4464-19-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-21-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-20-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-25-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-27-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-26-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-28-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-29-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-30-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB

          • memory/4464-31-0x000001FABF010000-0x000001FABF011000-memory.dmp

            Filesize

            4KB