Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-06-2024 22:52

General

  • Target

    install/browser.VisualElementsManifest.xml

  • Size

    585B

  • MD5

    452f6c49c49e0dfd6f2889051be44cad

  • SHA1

    bf7ef560ec8b9bccacd9abf1d738d8c932c0385b

  • SHA256

    1f5796532069af1a770b29646a067d4bdfbdd297094fff815bbbbec7565cb937

  • SHA512

    45741a8b7a0ef0c6df67f1e3a2647936e5b2c40dc6330b2f6a442a9191f2fbee28cf43dff7ccfcf58ff50b8134fe1867fc361bdb7db2ffc94d183e89067ea504

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\install\browser.VisualElementsManifest.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\install\browser.VisualElementsManifest.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3556 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7d3b85dddbdd4fdb82ea4c9e4eb4b386

    SHA1

    ec55434869bf1ce79d37ebc36af1cea98309ca89

    SHA256

    9ff2020f99ff7cefa80d5551715f465a89592320ea24e72c001e11a216445cb1

    SHA512

    0d595242ed30e20906f2f50fd4fe454a963498bb07a34b2b892d9fe5a2cb7b76d195ac766342034b422e3d3705c7760ebaa5fdc4a9076f60dfa7c61336d51d03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    74da1a3ad590a9682eb29fe299dc9c4b

    SHA1

    13de8b57a2ef6620b99988bf8c9b9ced10a49357

    SHA256

    96a9dd79f3710e502fa8ef6e2feff9d9868a7e55b159c97adc10471cb49af407

    SHA512

    fc281133c96dfaef98086d21931d65c53b0a44d5d59b214d8aa4469dd84aafbd7de58d3ba8f8c6118f73b757270f9249432500415e0605f7cb02283d00193175

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verED5D.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\H33M99OW.cookie

    Filesize

    545B

    MD5

    95c5f4a053361cbc216e5fd69a18c4bd

    SHA1

    f8866e3ca8dbd6088ae2ca8fbd303e724ccc8ee0

    SHA256

    eb1b50cb158d2acdfff4458f7ff8546b3cc6c9239340b5dc1de13bbf72057aff

    SHA512

    a5e8e7b4d4f6492fa46aa6ba53ab8064f875ec120f56117c2f7dc7bd68e05bf2bb4ae0d1f846ed2da8a9e0af708e4462756a2b018d48aead3b4ce155e2eebd0e

  • memory/4764-9-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-14-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-8-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-7-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-10-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-0-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-11-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-12-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-15-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-6-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-13-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-17-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-16-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-5-0x00007FF80FF60000-0x00007FF81013B000-memory.dmp

    Filesize

    1.9MB

  • memory/4764-4-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-1-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB

  • memory/4764-2-0x00007FF810005000-0x00007FF810006000-memory.dmp

    Filesize

    4KB

  • memory/4764-3-0x00007FF7CFFF0000-0x00007FF7D0000000-memory.dmp

    Filesize

    64KB