Analysis

  • max time kernel
    119s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 05:57

General

  • Target

    dhl/dhl/fonts/material-design-iconic-font/fonts/Material-Design-Iconic-Font.svg.xml

  • Size

    233KB

  • MD5

    381f7754080ed2299a7c66a2504dff02

  • SHA1

    8557b1551b91a0dba3ea6273b4aad98885ae77ac

  • SHA256

    dcb3de1ca419903bcee5322ca91f2895b9c6482919423e0cce263d62bbe171ea

  • SHA512

    fc49ac4e9712f3aa53d177af4db6b5a913193ecc8887850c08856a01d684ad96612f11f814b908a1aac296f0675949e2a80ae9f90bba91fad354a544bce06875

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\dhl\dhl\fonts\material-design-iconic-font\fonts\Material-Design-Iconic-Font.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1208

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VU701JSJ.txt
    MD5

    adc80529a74fdebc84908f41fc331b26

    SHA1

    c0cfd6b774b56db33b8ff21dc1e21fa028ad731c

    SHA256

    517ea1de63b3ea4daebc27f7ab0c4c0f3237bdd40e0f6f53ea428fe0b23d2409

    SHA512

    a02a6ec58dc6b974b86ebae212ddab13efc40a174a99aaab19f3609a1876f407042392bf5cdd5ecc04e75858a98089ff48e3b80110e3ef64b78aca32350b2a8c

  • memory/1028-63-0x0000000000000000-mapping.dmp
  • memory/1028-64-0x000007FEFBBB1000-0x000007FEFBBB3000-memory.dmp
    Filesize

    8KB

  • memory/1028-65-0x0000000001EE0000-0x0000000001EF0000-memory.dmp
    Filesize

    64KB

  • memory/1048-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmp
    Filesize

    8KB

  • memory/1096-61-0x0000000000000000-mapping.dmp
  • memory/1208-66-0x0000000000000000-mapping.dmp