Analysis

  • max time kernel
    1349s
  • max time network
    1144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-07-2024 22:27

General

  • Target

    BoratRat_Cracked.exe.xml

  • Size

    5KB

  • MD5

    3e645ccca1c44a00210924a3b0780955

  • SHA1

    5d8e8115489ac505c1d10fdd64e494e512dba793

  • SHA256

    f29e697efd7c5ecb928c0310ea832325bf6518786c8e1585e1b85cdc8701602f

  • SHA512

    ea7e3a6e476345870f05124a56dde266e1ad04b557b2dde83c5674cfdf3be00f26d3db6a14a8d88ecf75e2c9e3a12e6955f6c85654ba967c17664e9acc3d4f1f

  • SSDEEP

    96:Xr7T7Kc7KnreNRrqAbGxRN3ZV/Kw4YpyMasJ8J4YqJyM/:Xr7T7D7or8E3ZV/Kw/pvasJ8J/qJv/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BoratRat_Cracked.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BoratRat_Cracked.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3112-0-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-2-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-1-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-4-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-3-0x00007FFB08C83000-0x00007FFB08C84000-memory.dmp

    Filesize

    4KB

  • memory/3112-6-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-5-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-8-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-7-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-10-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-9-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-11-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-14-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-13-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-12-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-19-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-20-0x00007FFB08BE0000-0x00007FFB08DE9000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-18-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-17-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-16-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB

  • memory/3112-15-0x00007FFAC8C70000-0x00007FFAC8C80000-memory.dmp

    Filesize

    64KB