Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 05:33

General

  • Target

    masam/assets/fonts/Flaticon.svg.xml

  • Size

    383KB

  • MD5

    f3425e20da8e7a8da3d61e45ca8aa362

  • SHA1

    f71c09f2c63cf43128b63cc310198d1833daaf23

  • SHA256

    a5ab573b316351179d070c23e72f767541c2ec260c6672d4a32cafebab2704c7

  • SHA512

    89642835a3a5a1b0d27597dd870ccbab33a51542bccbef37313bcaa347ac2fa10d81f65f4c02017fbb113e0efc01c36baf58167ae145ed70431ef05eb15e4cbe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\masam\assets\fonts\Flaticon.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\masam\assets\fonts\Flaticon.svg.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3664 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1108-119-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-121-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-122-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-123-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-124-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-115-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-118-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-117-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/1108-116-0x00007FFAB7550000-0x00007FFAB7560000-memory.dmp

    Filesize

    64KB

  • memory/3664-125-0x00007FFAEAE80000-0x00007FFAEAEEB000-memory.dmp

    Filesize

    428KB