Analysis

  • max time kernel
    358s
  • max time network
    368s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 22:38

General

  • Target

    docs/fzdefaults.xml

  • Size

    2KB

  • MD5

    bc0afacd8028e222472bb32474db8148

  • SHA1

    826f5ec70527440c72e0be67cd4744d95f45f288

  • SHA256

    0d2e249a171a07a0b412c9f3eca041e772d530991d6333f9c96600c8c0935027

  • SHA512

    d65ac28f18ae9886f05f19feb209b6b26199c9353928f304ed705efa9e0632b66442fde52e6fcabdc81a9b3b42bb3a751df5e08929acea14ecbfb43294214664

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\docs\fzdefaults.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2624

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7bfbfd677dbfab4b41a9c622e7277f5f

          SHA1

          28814da03bf0d85920536737e22c9f00a7013728

          SHA256

          0070f4d299e36954444d54551e0574a8093cff035b0b6ef6a5a84e8cd749b4c5

          SHA512

          9d53c5b6f1a20692190e2a89e5641be36e869970780b2e3c26408301348de1482b99df263a88fddd6a46f9620bd3f5e6d535b43685e5ab06f623586176bb2124

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dd432615638c952d502a3d4be9c6686e

          SHA1

          25bf79118d188a369de2e48136eef00b96d8a905

          SHA256

          ddc57aa9e57a221daaa6a652d1d154f087c89720d4c6ae60ccca333d2bc5404a

          SHA512

          ded5219b848db3a22f5f339acc96639d5b23a87830342f032b8edfaf6ecd0274c941548b443f862054ec5e084b3b1c4e0e84f65e2be9d8c409253b60292a56f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          eb42e830dd11dd77e80ca87458649818

          SHA1

          3e937e0d1a126131807ed5663bcd46a82519fa4c

          SHA256

          3269011065cbf91b986b7bc63f34190468e8667c348e75d59c47c9b4e032f86a

          SHA512

          dcf36d1978df366be344f61756edd87435603b47d540ef9698dc83d39f1afa2314679f438a3db0c01f0633f8e5c7d11b07a546dd56f95f0ebafe608b1db243dd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7892c078157ed57b02cd635fb051c395

          SHA1

          a4e305fae61c9e532b16c2a2114267dc62e0e8e6

          SHA256

          9886c6e057c4b03536102d0796f7468e989a90e44f1c0cd93e26f581c99de57c

          SHA512

          e7b78b77dd2bbed6ef734bef384fde3bca4ca9d5380acb351fb0f4395a7c5ff4dd7b2047a4a0ebdbd8c91dec65e6ab015bf704357388681d4bb55f3cb83a5c9e

        • C:\Users\Admin\AppData\Local\Temp\Cab9667.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar9765.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b