Analysis

  • max time kernel
    135s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 05:37

General

  • Target

    eshopper/fonts/glyphicons-halflings-regular.svg.xml

  • Size

    61KB

  • MD5

    0a5c48c69a25a93e37ed62db813387fa

  • SHA1

    ecee9033d9183117d8f59df0e7238e2b24002b24

  • SHA256

    cef3dffcef386be2c8d1307761717e2eb9f43c151f2da9f1647e9d454abf13a3

  • SHA512

    c5552d0f004a5fc5d7ab43e31336e8e93294a4f33d362df9cd71ceb5960d6cca4b8535ad90066dd81fad643a73800b0f8f163abef92c6695a21e0b8b1b4475fe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\eshopper\fonts\glyphicons-halflings-regular.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eshopper\fonts\glyphicons-halflings-regular.svg.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3748 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/572-125-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-122-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-123-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-124-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-117-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-126-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-120-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-119-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/572-118-0x00007FFB2BCA0000-0x00007FFB2BCB0000-memory.dmp

    Filesize

    64KB

  • memory/3748-127-0x00007FFB5F830000-0x00007FFB5F89B000-memory.dmp

    Filesize

    428KB