Resubmissions

01-12-2024 00:29

241201-as8kssvmek 7

01-12-2024 00:19

241201-amnnfavkek 7

30-11-2024 15:39

241130-s34npssjbj 7

30-11-2024 15:34

241130-sz6znaxmgs 7

07-10-2024 06:29

241007-g9dkbavcnh 10

Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-11-2024 15:34

General

  • Target

    language/ptb.xml

  • Size

    45KB

  • MD5

    d0d1e035f041f1e544754051847ef43e

  • SHA1

    fc8c8334d2a5aeee3a2bdd9e237c4b40e455a6d9

  • SHA256

    486ee610b4468757ce925931f1b7693c2286e41bec74c36333a92e2814beefab

  • SHA512

    3db863145ff32d2d354ad6672fce84e0a342954aa0aacaaf24885b2a9cf4148fe36cd7107fb00a180d9e828eb43f1c7f7d359c2bacc67cf90d58e04d45b9184f

  • SSDEEP

    768:q1HAn4ujAh0D2G8VMiPsnb5COVswHClLHEPcLwAIbq3jmNCMYthnNfcMWBZwCPpf:4HAn4ujAh0D2G8V7PsnbEOVswHClLHE5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\language\ptb.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\language\ptb.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2256-0-0x00007FFA71503000-0x00007FFA71504000-memory.dmp

    Filesize

    4KB

  • memory/2256-1-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-2-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-5-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-4-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-3-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-7-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-8-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-6-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-10-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-9-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-13-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-15-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-19-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-18-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-17-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-16-0x00007FFA314F0000-0x00007FFA31500000-memory.dmp

    Filesize

    64KB

  • memory/2256-14-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-12-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-11-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB

  • memory/2256-20-0x00007FFA71460000-0x00007FFA71669000-memory.dmp

    Filesize

    2.0MB