Analysis

  • max time kernel
    99s
  • max time network
    205s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-07-2024 15:14

General

  • Target

    sheet rat v2.6/Server.exe.xml

  • Size

    7KB

  • MD5

    2083876ec03ad06e5c16490fcb4ab8b6

  • SHA1

    b8f50f08abd53225c046912471dfd271a98cf15a

  • SHA256

    28026de2c65972cb8fac1ff2865c33e24d1086f7242b2fe951cef172909ad128

  • SHA512

    b16f1fbe8e10b66079d83a46818423fb2e2e8619cbdc1427ce0cd27f06092af52bcc003755e939320cf84f8cc5a26c92e43041013fe3ef60c7d73d8624ee6096

  • SSDEEP

    96:ur71Qz7KR7KprDRnbWCPAnnAnBbAnGAnXjzAn+AnYAnTAn/AntWAn+yAnbAnNAnc:ur7o747orDd5P

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:4740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5080-0-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-2-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-1-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-3-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-6-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-5-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-4-0x00007FFB6CBE3000-0x00007FFB6CBE4000-memory.dmp

    Filesize

    4KB

  • memory/5080-7-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-9-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-8-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-10-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-11-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-12-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-17-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-19-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-18-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-15-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-14-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB

  • memory/5080-13-0x00007FFB6CB40000-0x00007FFB6CD49000-memory.dmp

    Filesize

    2.0MB

  • memory/5080-16-0x00007FFB2CBD0000-0x00007FFB2CBE0000-memory.dmp

    Filesize

    64KB