Analysis

  • max time kernel
    436s
  • max time network
    440s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 12:15

General

  • Target

    Portable_x32_x64/res/cravats/broachOneill/shaleDashikiBajoire/ecuadorCapers.xml

  • Size

    42KB

  • MD5

    7411966ba263e7ebaa428c782fe9fc45

  • SHA1

    8b3bee6e129a04255f2b31bbc336524123fb1262

  • SHA256

    8c85e34d186c96a65990d7b2c0b47c261fd7da381679c604a30937cae07be62f

  • SHA512

    329a494d2cdf57aabb91938625338552986a914e813ced0994ee78185a5a2ee05f1b4c7790b07516da1039f99bb20d2e241b2fee28a56611099d0a97b54e424c

  • SSDEEP

    768:AbcR03Pbz/Lw+HqmaNkIZ8kfCEDW22I1Iea4OytHKegD:TMPMMqJNNBP21ea4JKD

Score
1/10

Malware Config

Signatures

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\res\cravats\broachOneill\shaleDashikiBajoire\ecuadorCapers.xml"
    1⤵
      PID:1132

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1132-0-0x00007FFDF5B90000-0x00007FFDF5BA0000-memory.dmp

      Filesize

      64KB

    • memory/1132-1-0x00007FFE35BAD000-0x00007FFE35BAE000-memory.dmp

      Filesize

      4KB

    • memory/1132-2-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

      Filesize

      2.0MB

    • memory/1132-3-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

      Filesize

      2.0MB