Analysis

  • max time kernel
    174s
  • max time network
    224s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 07:03

General

  • Target

    assets/css/fonts/elusive/font/elusive.xml

  • Size

    87KB

  • MD5

    b3f49df7b18d8cf6ebed1fda03da114d

  • SHA1

    cca1a8e9bd1ef9fabdadbaa0df80078c09830234

  • SHA256

    5207f083d3571f600236281dd879879e9332ca05f15d5286a6422dc07384bea0

  • SHA512

    8597b978846557396fb54ccc188a687cb0206790aa8edc1c2ca471b0c3439ca89321a9f03757f3f74654d690e3a1bf05f0dbe672f64f61322e53129ba5031c91

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\assets\css\fonts\elusive\font\elusive.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:676

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZG4QCFBV.txt
    Filesize

    604B

    MD5

    72e55b2aca10ff997b6e19f2f7a76ef1

    SHA1

    64dc1909350214482a8c16ff4ca30b9a85705f7d

    SHA256

    cd20558918bd7e7583eadece740a970c42443fb9c2e44455c7683fac7b0a6b8f

    SHA512

    4d081dbb2ec9ef63a2dbb89b79e3463843cf659766e7fb4cb77edcd8cc35b00333cfa78f9393223a7290e5868eb9a773fe99c68ec6f87bb6f2c8faf2a597170b

  • memory/1596-54-0x0000000076171000-0x0000000076173000-memory.dmp
    Filesize

    8KB