Analysis

  • max time kernel
    418s
  • max time network
    466s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-11-2024 20:30

General

  • Target

    Wondershare UniConverter 15.6.1.25 Portable 64 Bit/App/DefaultData/UniConverter 15/Lng/ESN.xml

  • Size

    254KB

  • MD5

    cf751aede00a35bc42981b8d8d7ceb70

  • SHA1

    5bff2e8b9c2a63fb06fb002aea98f95f75fa553b

  • SHA256

    cd9cb7858532d73fa23621939ceec6815cff51f842188c697b542cbd19d086cb

  • SHA512

    0bf197ce3302309672d46a71814af94fea0dd6aeb58ab7042e962e15801521f32abeef5ac17dec77e158063eb76869192694ad5e0dbc71779251e4a6801aba52

  • SSDEEP

    6144:yvx0Kk/VAGzFNh2cbLi6F6cp8JdMpKzVT9KvbeM4s6RyukUHw8KjqtTqK1AwpcJw:00Kk/VAGzFNh2cbLh6cp8JdMpKzVT9Km

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Wondershare UniConverter 15.6.1.25 Portable 64 Bit\App\DefaultData\UniConverter 15\Lng\ESN.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Wondershare UniConverter 15.6.1.25 Portable 64 Bit\App\DefaultData\UniConverter 15\Lng\ESN.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:4204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2340-0-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-3-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-2-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-5-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-4-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-1-0x00007FFA01983000-0x00007FFA01984000-memory.dmp

    Filesize

    4KB

  • memory/2340-7-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-8-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-9-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-6-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-10-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-11-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-12-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-13-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-15-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-14-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-16-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-17-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-21-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-20-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-19-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB

  • memory/2340-22-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

    Filesize

    2.0MB

  • memory/2340-18-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

    Filesize

    64KB