Analysis

  • max time kernel
    120s
  • max time network
    267s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/01/2025, 12:09 UTC

General

  • Target

    MessagePack.Annotations.xml

  • Size

    1KB

  • MD5

    9302722ba45e0bacd8735a1fa5a77ef9

  • SHA1

    0862c10735bb5193b3729b935ac4e3a74d1fdc7c

  • SHA256

    f6134d6bacbf696afd122462a5ec55bfe86a7b447aea82f19152efd72977e8c3

  • SHA512

    ef62317c386738abd0c803fad4f8449818faec324f494b57ec8c59fc1eb2d270e08b7ea2ebfabb94482572c499fd95b20d9dac8d4e650aec098a161426710f09

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MessagePack.Annotations.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MessagePack.Annotations.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3600 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1600

Network

  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.42.69.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.42.69.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    161.19.199.152.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    161.19.199.152.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • flag-us
    DNS
    22.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    iexplore.exe
    2.0kB
    9.1kB
    23
    13
  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    73.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    73.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    241.42.69.40.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    241.42.69.40.in-addr.arpa

  • 8.8.8.8:53
    161.19.199.152.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    161.19.199.152.in-addr.arpa

  • 8.8.8.8:53
    200.197.79.204.in-addr.arpa
    dns
    73 B
    106 B
    1
    1

    DNS Request

    200.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    22.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    77f9653fa64f382075a75a06f6817ce0

    SHA1

    f28cd7c2a4909fe6fcda36043f7577ca2c1f74d1

    SHA256

    9645d4fe322c6336789821189541946c466d71afcc31d2e7346862a23dc2f1de

    SHA512

    f0f0c084283cdc847a7f2b5b91aab105e21688a0c3d090117a6420b0f2942cc6002953add42b1557c2142516de5f84c0a170639aab56a90ea6eba326ce7ddbc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    d98d32b974d9442451f49e4324390b30

    SHA1

    3a772dee01f21b1a56dd7111b315ee3891c4001e

    SHA256

    3e5d437428c14c176ed710c231474006e38dac3cea8757ea61f75ec657e143ee

    SHA512

    a2348e44d25913a6abac72fba4759110a4fcddaf96cd9019c79c6eb85bc081fa088113646847fc0f15744c87f6906ac096733754862d3d86109a9709a5e2b260

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KMZNQ6LU\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/2044-14-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-17-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-1-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-0-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-3-0x00007FFF3330D000-0x00007FFF3330E000-memory.dmp

    Filesize

    4KB

  • memory/2044-9-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-8-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-11-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-10-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-2-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-15-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-4-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-18-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-16-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-23-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-22-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-21-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-20-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-19-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-13-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-12-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-7-0x00007FFEF32F0000-0x00007FFEF3300000-memory.dmp

    Filesize

    64KB

  • memory/2044-6-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-5-0x00007FFF33270000-0x00007FFF33468000-memory.dmp

    Filesize

    2.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.