Analysis

  • max time kernel
    98s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 05:33

General

  • Target

    masam/assets/fonts/fa-solid-900.svg.xml

  • Size

    708KB

  • MD5

    1d220cf9da36861171fa90d3c164f4d3

  • SHA1

    48dd075ebb76553a349ca1e7303cfcdc29e3b837

  • SHA256

    5b6feb9b79633914763b4665a7866debf9a7a6bf9f3f73c2b5edff6eb7c61639

  • SHA512

    625f587836a244c565c976180b8b84b733ab8f5dac79b8c170ba9088dec56899a1cfb844757c42ccb65168be4f3ec09f2559b1cc2e694ff17bfb43ec61dd31dc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\masam\assets\fonts\fa-solid-900.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\masam\assets\fonts\fa-solid-900.svg.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3740 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-122-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-119-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-120-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-121-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-114-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-124-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-117-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-116-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/900-115-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp

    Filesize

    64KB

  • memory/3740-123-0x00007FFD5E710000-0x00007FFD5E77B000-memory.dmp

    Filesize

    428KB