Analysis

  • max time kernel
    7s
  • max time network
    5s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-09-2024 03:00

General

  • Target

    Languages/Polish.xml

  • Size

    7KB

  • MD5

    90c85da1a793104e89789e7d20356463

  • SHA1

    78253adb716bcfc980320250dea39d9d41dd37b0

  • SHA256

    dbbef50b4e01d4dd91a3d846a1882381f1226618d533dd966f3421a314a667dc

  • SHA512

    a53beb0cea2d555e69db5002d56ac46063576c64352e9742789e454680b3f203e394b805c6664c14dfb08d2cefdb7e72c45ffec10af3e0d67eb9e98507d98594

  • SSDEEP

    192:3HYbMU59/gB8w+kRzgKaC3N9Ukq3a67smzGi69vl7XU:oQU5906smyF7k

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Languages\Polish.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Languages\Polish.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:4984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2228-0-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-3-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-2-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-5-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-6-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-4-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-1-0x00007FFA09D03000-0x00007FFA09D04000-memory.dmp

    Filesize

    4KB

  • memory/2228-9-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-8-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-7-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-11-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-13-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-12-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-10-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-14-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-16-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-17-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-15-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-22-0x00007FFA09C60000-0x00007FFA09E69000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-21-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-20-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-19-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB

  • memory/2228-18-0x00007FF9C9CF0000-0x00007FF9C9D00000-memory.dmp

    Filesize

    64KB