Analysis

  • max time kernel
    233s
  • max time network
    261s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 07:03

General

  • Target

    assets/css/fonts/glyphicons/glyphicons-halflings-regular.xml

  • Size

    61KB

  • MD5

    32941d6330044744c02493835b799e90

  • SHA1

    3ef91859cbec165ac97df6957b176f69e8d6a04d

  • SHA256

    d168d50a88c730b4e6830dc0da2a2b51dae4658a77d9619943c27b8ecfc19d1a

  • SHA512

    c4847ea43f1de7621fda5e54211f313c90d5aa043e39cca99a7c24842e69f3ae20ae28c47f5046b5d9d89872e2b8c1a49e74db3fc40b61aa1be92be1a2c637a6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\assets\css\fonts\glyphicons\glyphicons-halflings-regular.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:608

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JHU7SUSU.txt
    Filesize

    599B

    MD5

    2f5feaee4d04eae54f20b9c1ef6e735c

    SHA1

    d93f58b89190acdfe054d19e78724f94b5a66255

    SHA256

    e856f8ae95e1d5d916f1c4e9984a1a1ca968245968f0ac6f891723a877574bbd

    SHA512

    613ba4d12bbacff2c76eabc29ed99f95bf94d195a4fa4809f6b4183fc85f01e4cb646818e9b66c41b9fa9040cad9c21168be6a1d925e8f0d116dcdd179c6406f

  • memory/1580-54-0x0000000076531000-0x0000000076533000-memory.dmp
    Filesize

    8KB